{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T19:12:31Z","timestamp":1710357151262},"reference-count":44,"publisher":"Informa UK Limited","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cybernetics and Systems"],"published-print":{"date-parts":[[2009,9,10]]},"DOI":"10.1080\/01969720903152593","type":"journal-article","created":{"date-parts":[[2009,9,4]],"date-time":"2009-09-04T22:38:21Z","timestamp":1252103901000},"page":"608-632","source":"Crossref","is-referenced-by-count":9,"title":["CUSTOMER SEGMENTATION AND CLASSIFICATION FROM BLOGS BY USING DATA MINING: AN EXAMPLE OF VOIP PHONE"],"prefix":"10.1080","volume":"40","author":[{"given":"Long-Sheng","family":"Chen","sequence":"first","affiliation":[]},{"given":"Chun-Chin","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Mu-Chen","family":"Chen","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1080\/01969720600734586"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846187"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.08.009"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1002\/aris.1440380107"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(02)00052-0"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.05.027"},{"key":"CIT0009","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511801389","volume-title":"An introduction to support vector machines and other kernel-based learning methods","author":"Cristianini N.","year":"2000"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.04.002"},{"key":"CIT0011","first-page":"28","author":"Epstein M.","year":"2009","journal-title":"CMA Management"},{"key":"CIT0013","volume-title":"Neural networks: Algorithms, applications, and programming techniques","author":"Freeman A. J.","year":"1992"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1080\/01969720600998546"},{"key":"CIT0016","author":"Hof R.","year":"2005","journal-title":"Business Week Online \u2013 The Tech Beat"},{"key":"CIT0017","unstructured":"Hsu , C.W. , Chang , C.C. , and Lin , C.J. 2009 . A practical guide to support vector classification. Available athttp:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/index.html (accessed May 19, 2009) ."},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1109\/5.58325"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1145\/360402.360406"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1080\/01969720600887152"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00040-7"},{"key":"CIT0023","unstructured":"Lappas , G. 2007 . An overview of web mining in social benefit areas.The 9th IEEE International Conference on E-Commerce Technology and 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Service, July 23\u201326, 683\u2013690 ."},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/S1473-3099(05)70292-9"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2005.11.005"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1080\/01969720601139058"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1016\/j.jada.2007.02.027"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1145\/1035134.1035163"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.09.023"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/S1470-2045(05)70419-8"},{"key":"CIT0031","volume-title":"Neural computing: Theory and practice","author":"Philip D. W.","year":"1992"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.pubrev.2006.11.018"},{"key":"CIT0033","doi-asserted-by":"crossref","unstructured":"Qin , J. , Zhou , Y. , Reid , E. , Lai , G. , and Chen , H. 2006 . Unraveling internet terrorist groups' exploitation of the web: technical sophistication, media richness, and web interactivity.Proceedings of the Workshop on Intelligence and Security Informatics (WISI 06), Singapore .","DOI":"10.1007\/11734628_2"},{"key":"CIT0034","first-page":"81","volume":"1","author":"Quinlan J. R.","year":"1986","journal-title":"Machine Learning"},{"key":"CIT0035","volume-title":"C4.5: Programs for machine learning","author":"Quinlan J. R.","year":"1993"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.10.010"},{"key":"CIT0037","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1035134.1035161","volume":"47","author":"Rosenbloom A.","year":"2004","journal-title":"Communications of the ACM"},{"key":"CIT0038","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5236.001.0001","volume-title":"Parallel distributed processing","volume":"1","author":"Rumelhart D. E.","year":"1986"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2006.04.011"},{"key":"CIT0040","doi-asserted-by":"crossref","unstructured":"Seiffert , U. and Jain , L. 2002 .Self-Organizing Neural Networks: Recent Advances and Applications. Studies in Fuzziness and Soft Computing, 78 . Berlin : Springer .","DOI":"10.1007\/978-3-7908-1810-9"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1080\/0020754031000090612"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1016\/j.apsusc.2005.03.235"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1016\/j.pubrev.2006.09.008"},{"key":"CIT0045","volume-title":"Advances in Neural Information Processing Systems","author":"Vapnik V.","year":"1996"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIMA.2003.1238105"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.05.017"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.95"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0114-2"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2005.96"}],"container-title":["Cybernetics and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01969720903152593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,22]],"date-time":"2020-05-22T01:12:47Z","timestamp":1590109967000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/01969720903152593"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9,10]]},"references-count":44,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2009,9,10]]}},"alternative-id":["10.1080\/01969720903152593"],"URL":"https:\/\/doi.org\/10.1080\/01969720903152593","relation":{},"ISSN":["0196-9722","1087-6553"],"issn-type":[{"value":"0196-9722","type":"print"},{"value":"1087-6553","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,9,10]]}}}