Author: Wang Dawei Ding Wei Lo Henry Stepinski Tomasz Salazar Josue Morabito Melissa
Publisher: Springer Publishing Company
ISSN: 0924-669X
Source: Applied Intelligence, Vol.39, Iss.4, 2013-12, pp. : 772-781
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
EXPLORATION OF MASSIVE CRIME DATA SETS THROUGH DATA MINING TECHNIQUES
By Lee Ickjai
Applied Artificial Intelligence, Vol. 25, Iss. 5, 2011-05 ,pp. :
Network Security, Vol. 2004, Iss. 1, 2004-01 ,pp. :