{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:39:03Z","timestamp":1704843543641},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,2,12]],"date-time":"2013-02-12T00:00:00Z","timestamp":1360627200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1007\/s13278-013-0100-5","type":"journal-article","created":{"date-parts":[[2013,2,11]],"date-time":"2013-02-11T10:41:58Z","timestamp":1360579318000},"page":"521-541","source":"Crossref","is-referenced-by-count":6,"title":["On information propagation in mobile call networks"],"prefix":"10.1007","volume":"3","author":[{"given":"Kirill","family":"Dyagilev","sequence":"first","affiliation":[]},{"given":"Shie","family":"Mannor","sequence":"additional","affiliation":[]},{"given":"Elad","family":"Yom-Tov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,2,12]]},"reference":[{"key":"100_CR1","unstructured":"Baeza-Yates R, Ribeiro-Neto B (1999) Modern information retrieval, vol 463. Addison-Wesley, New York. ftp:\/\/mail.im.tku.edu.tw\/seke\/slide\/baeza-yates\/chap10_user_interfaces_and_visualization-modern_ir.pdf"},{"key":"100_CR2","doi-asserted-by":"crossref","unstructured":"Bi Z, Faloutsos C, Korn F (2001) The \u201cDGX\u201d distribution for mining massive, skewed data. In: KDD\u201901","DOI":"10.1145\/502512.502521"},{"key":"100_CR3","doi-asserted-by":"crossref","unstructured":"Bin L, Peiji S, Juan L (2007) Customer churn prediction based on the decision tree in personal handyphone system service. In: ICSSSM\u201907","DOI":"10.1109\/ICSSSM.2007.4280145"},{"issue":"3","key":"100_CR4","doi-asserted-by":"crossref","first-page":"4626","DOI":"10.1016\/j.eswa.2008.05.027","volume":"36","author":"J. Burez","year":"2009","unstructured":"Burez J, Vanden Poel D (2009) Handling class imbalance in customer churn prediction. Expert Syst Appl 36(3):4626\u20134636","journal-title":"Expert Syst Appl"},{"key":"100_CR5","doi-asserted-by":"crossref","unstructured":"Catanese S, Ferrara E, Fiumara G (2012) Forensic analysis of phone call networks. Social Netw Anal Min 1\u201319. ISSN:1869-5450. doi: 10.1007\/s13278-012-0060-1","DOI":"10.1007\/s13278-012-0060-1"},{"key":"100_CR6","unstructured":"Cormen T, Leiserson C, Rivest R, Stein C (2001) Introduction to algorithms. The MIT press, Cambridge"},{"issue":"1","key":"100_CR7","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.eswa.2006.09.038","volume":"34","author":"K. Coussement","year":"2008","unstructured":"Coussement K, Vanden Poel D (2008) Churn prediction in subscription services: an application of support vector machines while comparing two parameter-selection techniques. Expert systems with applications 34(1):313\u2013327","journal-title":"Expert systems with applications"},{"key":"100_CR8","doi-asserted-by":"crossref","unstructured":"Dasgupta K, Singh R, Viswanathan B, Chakraborty D, Mukherjea S, Nanavati A, Joshi A (2008) Social ties and their relevance to churn in mobile telecom networks. In: EDBT\u201908","DOI":"10.1145\/1353343.1353424"},{"issue":"6","key":"100_CR9","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1023\/A:1006643109702","volume":"14","author":"P. Datta","year":"2000","unstructured":"Datta P, Masand B, Mani D, Li B (2000) Automated cellular modeling and prediction on a large scale. Artif Intell Rev 14(6):485\u2013502","journal-title":"Artif Intell Rev"},{"key":"100_CR10","doi-asserted-by":"crossref","unstructured":"de Melo P, Akoglu L, Faloutsos C, Loureiro A (2010) Surprising patterns for the call duration distribution of mobile phone users. In: PKDD\u201910","DOI":"10.1007\/978-3-642-15939-8_23"},{"key":"100_CR11","unstructured":"de Oliveira Lima E (2009) Domain knowledge integration in data mining for churn and customer lifetime value modelling: new approaches and applications. PhD thesis, University of Southampton"},{"issue":"1","key":"100_CR12","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MIS.2005.16","volume":"20","author":"P. Domingos","year":"2005","unstructured":"Domingos P (2005) Mining social networks for viral marketing. IEEE Intell Syst 20(1):80\u201382","journal-title":"IEEE Intell Syst"},{"key":"100_CR13","doi-asserted-by":"crossref","unstructured":"Domingos P, Richardson M (2001) Mining the network value of customers. In: KDD\u201901","DOI":"10.1145\/502512.502525"},{"issue":"1","key":"100_CR14","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1057\/palgrave.dbm.3250070","volume":"15","author":"S. Doyle","year":"2007","unstructured":"Doyle S (2007) The role of social networks in marketing. J Database Mark Cust Strateg Manag 15(1):60\u201364","journal-title":"J Database Mark Cust Strateg Manag"},{"key":"100_CR15","unstructured":"Duda R, Hart P, Stork D (2001) Pattern classification. Wiley, New York"},{"key":"100_CR16","doi-asserted-by":"crossref","unstructured":"Dyagilev K, Mannor S, Yom-Tov E (2010) Generative models for rapid information propagation. In: Proceedings of the First Workshop on Social Media Analytics, ACM, pp 35\u201343","DOI":"10.1145\/1964858.1964864"},{"issue":"36","key":"100_CR17","doi-asserted-by":"crossref","first-page":"15,274","DOI":"10.1073\/pnas.0900282106","volume":"106","author":"N Eagle","year":"2009","unstructured":"Eagle N, Pentland A, Lazer D (2009) Inferring social network structure using mobile phone data. Proc Nat Acad Sci 106(36):15274\u201315278","journal-title":"Proc Nat Acad Sci"},{"issue":"4","key":"100_CR18","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/S0169-2070(02)00064-X","volume":"18","author":"R. Fildes","year":"2002","unstructured":"Fildes R, Kumar V (2002) Telecommunications demand forecasting\u2014a review. Int J Forecast 18(4):489\u2013522","journal-title":"Int J Forecast"},{"key":"100_CR19","unstructured":"Gill K (2008) How can we measure the influence of the blogosphere. In: WWW\u201908"},{"issue":"3","key":"100_CR20","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.ijresmar.2007.02.003","volume":"24","author":"J. Goldenberg","year":"2007","unstructured":"Goldenberg J, Libai B, Moldovan S, Muller E (2007) The NPV of bad news. Int J Res Mark 24(3):186\u2013200","journal-title":"Int J Res Mark"},{"issue":"2","key":"100_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1509\/jmkg.73.2.1","volume":"73","author":"J. Goldenberg","year":"2009","unstructured":"Goldenberg J, Han S, Lehmann D, Hong J (2009) The role of hubs in the adoption process. J Mark 73(2):1\u201313","journal-title":"J Mark"},{"key":"100_CR22","doi-asserted-by":"crossref","unstructured":"Gomez Rodriguez M, Leskovec J, Krause A (2010) Inferring networks of diffusion and influence. In: KDD\u201910","DOI":"10.1145\/1835804.1835933"},{"key":"100_CR23","doi-asserted-by":"crossref","unstructured":"Gopal R, Meher S (2008) Customer churn time prediction in mobile telecommunication industry using ordinal regression. In: Advances in Knowledge Discovery and Data Mining, pp 884\u2013889","DOI":"10.1007\/978-3-540-68125-0_88"},{"key":"100_CR24","unstructured":"Harris T (2002) The theory of branching processes. Dover Publications, New York"},{"issue":"2","key":"100_CR25","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1214\/088342306000000222","volume":"21","author":"S Hill","year":"2006","unstructured":"Hill S, Provost F, Volinsky C (2006) Network-based marketing: identifying likely adopters via consumer networks. Stat Sci 21(2):256\u2013276","journal-title":"Stat Sci"},{"key":"100_CR26","unstructured":"Jackson M (2008) Social and economic networks. Princeton University Press, Princeton"},{"key":"100_CR27","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos \u00c9 (2003) Maximizing the spread of influence through a social network. In: KDD\u201903","DOI":"10.1145\/956750.956769"},{"key":"100_CR28","doi-asserted-by":"crossref","unstructured":"Kourtellis N, Alahakoon T, Simha R, Iamnitchi A, Tripathi R (2012) Identifying high betweenness centrality nodes in large social networks. Social Netw Anal Min 1\u201316. ISSN:1869-5450. doi: 10.1007\/s13278-012-0076-6","DOI":"10.1007\/s13278-012-0076-6"},{"issue":"1","key":"100_CR29","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/1232722.1232727","volume":"1","author":"J. Leskovec","year":"2007","unstructured":"Leskovec J., Adamic L., Huberman B. (2007) The dynamics of viral marketing. ACM Trans Web 1(1):5","journal-title":"ACM Trans Web"},{"key":"100_CR30","doi-asserted-by":"crossref","unstructured":"Nanavati A, Gurumurthy S, Das G, Chakraborty D, Dasgupta K, Mukherjea S, Joshi A (2006) On the structural properties of massive telecom call graphs: findings and implications. In: ICIKM\u201906","DOI":"10.1145\/1183614.1183678"},{"key":"100_CR31","unstructured":"NielsenWire (2008) In U.S., SMS text messaging tops mobile phone calling. http:\/\/shar.es\/cuRKw"},{"key":"100_CR32","unstructured":"Nitzan I, Libai B (2010) Social effects on customer retention, marketing Science Institute, working paper 10-107"},{"key":"100_CR33","doi-asserted-by":"crossref","unstructured":"Pan W, Aharony N, Pentland A (2011) Composite social network for predicting mobile apps installation. Arxiv preprint arXiv:11060359","DOI":"10.1609\/aaai.v25i1.7950"},{"issue":"3","key":"100_CR34","doi-asserted-by":"crossref","first-page":"6714","DOI":"10.1016\/j.eswa.2008.08.050","volume":"36","author":"P. Pendharkar","year":"2009","unstructured":"Pendharkar P (2009) Genetic algorithm based neural network approaches for predicting churn in cellular wireless network services. Expert Syst Appl 36(3):6714\u20136720","journal-title":"Expert Syst Appl"},{"key":"100_CR35","unstructured":"Radosavljevik D, van der Putten P, Kyllesbech Larsen K (2010) The impact of experimental setup in prepaid churn prediction for mobile telecommunications: what to predict, for whom and does the customer experience matter? Trans Mach Learn Data Min 3(2):80\u201399"},{"key":"100_CR36","doi-asserted-by":"crossref","unstructured":"Richter Y, Yom-Tov E, Slonim N (2010) Predicting customer churn in mobile networks through analysis of social groups. In: ICDM\u201910","DOI":"10.1137\/1.9781611972801.64"},{"key":"100_CR37","doi-asserted-by":"crossref","unstructured":"Sadikov E, Medina M, Leskovec J, Garcia-Molina H (2011) Correcting for missing data in information cascades. In: WSDM\u201911","DOI":"10.1145\/1935826.1935844"},{"key":"100_CR38","doi-asserted-by":"crossref","unstructured":"Saravanan M, Prasad G, Karishma S, Suganthi D (2011) Analyzing and labeling telecom communities using structural properties. Social Netw Anal Min 1(4):271\u2013286. ISSN:1869-5450. doi: 10.1007\/s13278-011-0020-1","DOI":"10.1007\/s13278-011-0020-1"},{"key":"100_CR39","doi-asserted-by":"crossref","unstructured":"Shao J (2003) Mathematical statistics, 2nd edn. Springer, New York","DOI":"10.1007\/b97553"},{"key":"100_CR40","doi-asserted-by":"crossref","unstructured":"Song G, Yang D, Wu L, Wang T, Tang S (2006) A mixed process neural network and its application to churn prediction in mobile communications. In: Data Mining Workshop, ICDM\u201906","DOI":"10.1109\/ICDMW.2006.12"},{"key":"100_CR41","doi-asserted-by":"crossref","unstructured":"Vega-Redondo F (2007) Complex social networks. Cambridge University Press, Cambridge","DOI":"10.1017\/CBO9780511804052"},{"issue":"45","key":"100_CR42","first-page":"17","volume":"104","author":"F. Wu","year":"2007","unstructured":"Wu F, Huberman B (2007) Novelty and collective attention. Proc Nat Acad Sci 104(45):17\u2013599","journal-title":"Proc Nat Acad Sci"},{"issue":"3","key":"100_CR43","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1504\/IJMC.2007.012397","volume":"5","author":"J. Yang","year":"2007","unstructured":"Yang J, He X, Lee H (2007) Social reference group influence on mobile phone purchasing behaviour: a cross-nation comparative study. Int J Mobile Commun 5(3):319\u2013338","journal-title":"Int J Mobile Commun"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-013-0100-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-013-0100-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-013-0100-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T10:51:40Z","timestamp":1688035900000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-013-0100-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,12]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["100"],"URL":"https:\/\/doi.org\/10.1007\/s13278-013-0100-5","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2,12]]}}}