<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">O. Kursun</style></author><author><style face="normal" font="default" size="100%">A. Koufakou</style></author><author><style face="normal" font="default" size="100%">A. Wakchaure</style></author><author><style face="normal" font="default" size="100%">M. Georgiopoulos</style></author><author><style face="normal" font="default" size="100%">K. Reynolds</style></author><author><style face="normal" font="default" size="100%">R. Eaglin</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Answer: approximate Name Search with Errors in Large Databases by a Novel Approach Based on Prefix-dictionary</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal on Artificial Intelligence Tools</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.eecs.ucf.edu/georgiopoulos/sites/default/files/29.pdf</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">15.5</style></volume><pages><style face="normal" font="default" size="100%">839–848</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">O. Kursun</style></author><author><style face="normal" font="default" size="100%">A. Koufakou</style></author><author><style face="normal" font="default" size="100%">B. Chen</style></author><author><style face="normal" font="default" size="100%">M. Georgiopoulos</style></author><author><style face="normal" font="default" size="100%">K. Reynolds</style></author><author><style face="normal" font="default" size="100%">R. Eaglin</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Intelligence and Security Informatics (ISI) Conference</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.eecs.ucf.edu/georgiopoulos/sites/default/files/30.pdf</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">San Diego,California</style></pub-location><pages><style face="normal" font="default" size="100%">72–82</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">A. Koufakou</style></author><author><style face="normal" font="default" size="100%">A. Wakchaure</style></author><author><style face="normal" font="default" size="100%">O. Kursun</style></author><author><style face="normal" font="default" size="100%">M. Georgiopoulos</style></author><author><style face="normal" font="default" size="100%">K. Reynolds</style></author><author><style face="normal" font="default" size="100%">R. Eaglin</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Burglary data mining – A three tiered approach: Local satte and nation-wide</style></title><secondary-title><style face="normal" font="default" size="100%">the 2nd Annual GIS Symposium at TU</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 10-11, 2005</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.eecs.ucf.edu/georgiopoulos/sites/default/files/3129.pdf</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Troy, Alabama</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">K. Reynolds</style></author><author><style face="normal" font="default" size="100%">A. Wakchaure</style></author><author><style face="normal" font="default" size="100%">O. Kursun</style></author><author><style face="normal" font="default" size="100%">M. Georgiopoulos</style></author><author><style face="normal" font="default" size="100%">K. Reynolds</style></author><author><style face="normal" font="default" size="100%">R. Eaglin</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Burglary data mining – A three tiered approach: Local state and nation-wide</style></title><secondary-title><style face="normal" font="default" size="100%">the 2nd Annual GIS Symposium at TU</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 10-11, 2005</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.eecs.ucf.edu/georgiopoulos/sites/default/files/3131.pdf</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Troy, Alabama</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">K. Reynolds</style></author><author><style face="normal" font="default" size="100%">O. Kursun</style></author><author><style face="normal" font="default" size="100%">R. Eaglin</style></author><author><style face="normal" font="default" size="100%">B. Chen</style></author><author><style face="normal" font="default" size="100%">M. Georgiopoulos</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Development of an Artificial Intelligent System for detection and visualization of auto theft recovery patterns</style></title><secondary-title><style face="normal" font="default" size="100%">Computational Intelligence Conference on Homeland Security and Public Safety (CIHSPS, 2005)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Mar31–Apr1,2005</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.eecs.ucf.edu/georgiopoulos/sites/default/files/3130.pdf</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Orlando, FL</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">K. Reynolds</style></author><author><style face="normal" font="default" size="100%">O. Kursun</style></author><author><style face="normal" font="default" size="100%">M. Georgiopoulos</style></author><author><style face="normal" font="default" size="100%">R. Eaglin</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Development of an Artificial Intelligence Clustering Algorithm to Detect Auto Theft Recovery Patterns</style></title><secondary-title><style face="normal" font="default" size="100%">GIS Symposium 2004</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.eecs.ucf.edu/georgiopoulos/sites/default/files/417.pdf</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Troy, AL</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">R.C. Watkins</style></author><author><style face="normal" font="default" size="100%">K.M. Reynolds</style></author><author><style face="normal" font="default" size="100%">R. DeMara</style></author><author><style face="normal" font="default" size="100%">M. Georgiopoulos</style></author><author><style face="normal" font="default" size="100%">A. Gonzalez</style></author><author><style face="normal" font="default" size="100%">R. Eaglin</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">TRACKING DIRTY PROCEEDS: EXPLORING DATA MINING TECHNOLOGIES AS TOOLS TO INVESTIGATE MONEY LAUNDERING</style></title><secondary-title><style face="normal" font="default" size="100%">Police Practice and Research</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.eecs.ucf.edu/georgiopoulos/sites/default/files/196.pdf</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">4.2</style></volume><pages><style face="normal" font="default" size="100%">163–178</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>