About this Journal Submit a Manuscript Table of Contents
Abstract and Applied Analysis
Volume 2013 (2013), Article ID 308675, 10 pages
http://dx.doi.org/10.1155/2013/308675
Research Article

Crime Busting Model Based on Dynamic Ranking Algorithms

1College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
2College of Overseas Education, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
3School of Engineering and Computing Sciences, New York Institute of Technology, Old Westbury, NY 11568-8000, USA

Received 28 May 2013; Accepted 11 June 2013

Academic Editor: Xinsong Yang

Copyright © 2013 Yang Cao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. V. E. Krebs, “Mapping networks of terrorist cells,” Connections, vol. 24, pp. 43–52, 2002.
  2. C. Morselli, “Assessing vulnerable and strategic positions in a criminal network,” Journal of Contemporary Criminal Justice, vol. 26, no. 4, pp. 382–392, 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Xu and H. Chen, “Untangling criminal networks: a case study,” in Intelligence and Security Informatics, vol. 2665, pp. 232–248, 2003. View at Publisher · View at Google Scholar
  4. C. Arney and K. Coronges, “Judges' commentary: modeling for crime busting,” UMAP Journal, vol. 33, no. 3, p. 293, 2012.
  5. COMAP, “2012 ICM problem,” 2012, http://www.comap.com/undergraduate/contests/mcm/contests/2012/problems/.
  6. J. F. Sowa, “Semantic networks,” in Encyclopedia of Cognitive Science, 2006. View at Publisher · View at Google Scholar
  7. R. Feldman and J. Sanger, The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data, Cambridge University Press, 2006.
  8. R. Bilisoly, Practical Text Mining with Perl, vol. 2, John Wiley & Sons, Hoboken, NJ, USA, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  9. M. Sharples, D. Hogg, C. Hutchinson, S. Torrance, and D. Young, Computers and Thought: A Practical Introduction to Artificial Intelligence, MIT Press, 1989.
  10. U. Gretzel, “Social network analysis: introduction and resources,” 2001, http://lrs.ed.uiuc.edu/tse-portal/analysis/social-network-analysis/.
  11. Y. Freund, R. Iyer, R. E. Schapire, and Y. Singer, “An efficient boosting algorithm for combining preferences,” Journal of Machine Learning Research, vol. 4, no. 6, pp. 933–969, 2003. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  12. A. Meaden and D. Hacker, Problematic and Risk Behaviours in Psychosis: A Shared Formulation Approach, Routledge, 2010.
  13. J. A. Zhang and X. E. Guo, “Trust model based on dynamic recommendation in P2P network,” Computer Engineering, vol. 36, no. 1, pp. 174–180, 2010. View at Publisher · View at Google Scholar
  14. F. Autrel, N. Cuppens-Boulahia, and F. Cuppens, “Reaction policy model based on dynamic organizations and threat context,” in Data and Applications Security XXIII, vol. 5645 of Lecture Notes in Computer Science, pp. 49–64, Springer, 2009. View at Publisher · View at Google Scholar · View at Scopus
  15. Y. J. Tan, J. Wu, and H. Z. Deng, “Evaluation method for node importance based on node contraction in complex networks,” System Engineering Theory and Practice, vol. 26, no. 11, pp. 79–83, 2006. View at Scopus
  16. M. Perkowitz and O. Etzioni, “Adaptive web sites: conceptual cluster mining,” in Proceedings of the 16th International Joint Conference on Artificial Intelligence, pp. 264–269, July 1999.
  17. R. Cooley, B. Mobasher, and J. Srivastava, “Web mining: information and pattern discovery on the World Wide Web,” in Proceedings of the IEEE 9th IEEE International Conference on Tools with Artificial Intelligence, pp. 558–567, November 1997. View at Scopus
  18. J. M. Kleinberg, “Authoritative sources in a hyperlinked environment,” Journal of the ACM, vol. 46, no. 5, pp. 604–632, 1999. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  19. G. W. Flake, S. Lawrence, and C. L. Giles, “Efficient identification of web communities,” in Proceedings of the 6th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 150–160, August 2000. View at Scopus