{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T09:05:57Z","timestamp":1760346357130},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319054575"},{"type":"electronic","value":"9783319054582"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05458-2_7","type":"book-chapter","created":{"date-parts":[[2014,2,28]],"date-time":"2014-02-28T05:28:36Z","timestamp":1393565316000},"page":"62-71","source":"Crossref","is-referenced-by-count":5,"title":["Customer Lifetime Value and Defection Possibility Prediction Model Using Machine Learning: An Application to a Cloud-Based Software Company"],"prefix":"10.1007","author":[{"given":"Niken","family":"Prasasti","sequence":"first","affiliation":[]},{"given":"Masato","family":"Okada","sequence":"additional","affiliation":[]},{"given":"Katsutoshi","family":"Kanamori","sequence":"additional","affiliation":[]},{"given":"Hayato","family":"Ohwada","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","first-page":"602","volume-title":"The Handbook of Market Research","author":"V. Kumar","year":"2005","unstructured":"Kumar, V.: Uses, misuses, and future advance. In: Grover, R., Vriens, M. (eds.) The Handbook of Market Research, pp. 602\u2013628. Sage Publication, California (2005)"},{"key":"7_CR2","unstructured":"Flordal, P., Friberg, J., Berling, P.: Modeling Customer Lifetime Value in the Telecom Industry"},{"issue":"2","key":"7_CR3","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/S0957-4174(03)00133-7","volume":"26","author":"H. Hwang","year":"2004","unstructured":"Hwang, H., Jung, T., Suh, E.: An LTV model and customer segmentation based on customer value: a case study on the wireless telecommunication industry. Expert Systems with Applications\u00a026(2), 181\u2013188 (2004), doi:10.1016\/S0957-4174(03)00133-7","journal-title":"Expert Systems with Applications"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Khan, A.A.: Applying Data Mining to Customer Churn Prediction in an Internet Service Provider 9(7), 8\u201314 (2010)","DOI":"10.5120\/1400-1889"},{"key":"7_CR5","unstructured":"What are Cloud-Based Services? (2012), \n                    \n                      http:\/\/www.colorado.edu\/oit\/node\/7532\n                    \n                    \n                   (retrieved)"},{"key":"7_CR6","unstructured":"Abubakr, T.: Cloud app vs. web app: Understanding the differences (2012), \n                    \n                      http:\/\/www.techrepublic.com\/blog\/the-enterprise-cloud\/cloud-app-vs-web-app-understanding-the-differences\/5478\/\n                    \n                    \n                   (retrieved)"},{"key":"7_CR7","unstructured":"Fawcett, T.: ROC Graphs: Notes and Practical Considerations for Data Mining Researchers (2003)"},{"key":"7_CR8","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/11893318_27","volume-title":"Discovery Science","author":"G. Szarvas","year":"2006","unstructured":"Szarvas, G., Farkas, R., Kocsor, A.: A Multilingual Named Entity Recognition System Using Boosting and C4.5 Decision Tree Learning Algorithms. In: Todorovski, L., Lavra\u010d, N., Jantke, K.P. (eds.) DS 2006. LNCS (LNAI), vol.\u00a04265, pp. 267\u2013278. Springer, Heidelberg (2006)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Huang, J., Lu, J., Ling, C.X.: Comparing naive Bayes, decision trees, and SVM with AUC and accuracy. In: Third IEEE International Conference on Data Mining, pp. 553\u2013556 (2003), doi:10.1109\/ICDM.2003.1250975","DOI":"10.1109\/ICDM.2003.1250975"},{"key":"7_CR10","unstructured":"Kotsiantis, S.B.: Supervised Machine Learning: A Review of Classification Techniques 31, 249\u2013268 (2007)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Information and Database Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05458-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T06:22:11Z","timestamp":1558851731000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-05458-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319054575","9783319054582"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05458-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}