{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:27:16Z","timestamp":1775280436956,"version":"3.50.1"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/cig.2012.6374152","type":"proceedings-article","created":{"date-parts":[[2012,12,12]],"date-time":"2012-12-12T17:02:44Z","timestamp":1355331764000},"page":"163-170","source":"Crossref","is-referenced-by-count":121,"title":["Guns, swords and data: Clustering of player behavior in computer games in the wild"],"prefix":"10.1109","author":[{"given":"Anders","family":"Drachen","sequence":"first","affiliation":[{"name":"Aalborg University, Ballerup, Denmark and Game Analytics, Copenhagen, Denmark"}]},{"given":"Rafet","family":"Sifa","sequence":"additional","affiliation":[{"name":"University of Bonn, Bonn, Germany"}]},{"given":"Christian","family":"Bauckhage","sequence":"additional","affiliation":[{"name":"Fraunhofer IAIS and the University of Bonn, Bonn, Germany"}]},{"given":"Christian","family":"Thurau","sequence":"additional","affiliation":[{"name":"Game Analytics, Copenhagen, Denmark"}]}],"member":"263","reference":[{"key":"19","first-page":"883","article-title":"User-centered design in games","author":"pagulayan","year":"2003","journal-title":"The Human-Computer Interaction Handbook Fundamentals Evolving Technologies and Emerging Applications"},{"key":"35","author":"han j","year":"2006","journal-title":"Data Mining Concepts and Techniques"},{"key":"17","article-title":"Player modeling for intelligent difficulty adjustment","author":"missura","year":"0","journal-title":"Proc of the ECML-09 Workshop from Local Patterns to Global Models 2009"},{"key":"36","first-page":"9","article-title":"Halo 3: How microsoft labs invented a new science of play","volume":"15","author":"thompson","year":"0","journal-title":"Wired Magazine"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1002\/env.3170050203"},{"key":"33","article-title":"Modeling Player Retention in Madden NFL 11","author":"weber","year":"0","journal-title":"Proceedings of IAAI 2011"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2010.5593355"},{"key":"34","article-title":"Game Development Telemetry","author":"zoeller","year":"0","journal-title":"Proceedings of the Game Developers Conference 2011"},{"key":"16","author":"mellon","year":"2009","journal-title":"Applying Metrics Driven Development to MMO Costs and Risks"},{"key":"13","article-title":"Metrics for Social Games","author":"king","year":"0","journal-title":"Social Games Summit 2009"},{"key":"14","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1038\/44565","article-title":"Learning the Parts of Objects by Nonnegative Matrix Factorization","volume":"401","author":"lee","year":"1999","journal-title":"Nature"},{"key":"37","doi-asserted-by":"crossref","DOI":"10.1201\/9780240817675","author":"fields","year":"2011","journal-title":"Social Game Design Monetization Methods and Mechanics"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1904-8","author":"jollie","year":"1986","journal-title":"Principal Component Analysis"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/2212908.2212954"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357126"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/906931"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcom.2011.01.003"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.55"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-011-0216-z"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2009.5286483"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2009.2024533"},{"key":"26","article-title":"Hierarchical Convex NMF for Clustering Massive Data","author":"kersting","year":"0","journal-title":"Proceedings of 2010 ACM"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.164"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/41.8.578"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1629-6"},{"key":"3","article-title":"Analyzing the evolution of social groups in world of warcraft","author":"thurau","year":"0","journal-title":"Proc of IEEE Comp Intelligence in Games 2010"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1126\/science.330.6000.30-a"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-02264-7","author":"jansen","year":"2009","journal-title":"Understanding User-Web Interactions Via Web Analytics"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2009.5286500"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/NETGAMES.2009.5446226"},{"key":"7","article-title":"Approximate Nonnegative Matrix Factorization via Alternating Minimization","author":"finesso","year":"0","journal-title":"Proc 16th Int Symposium on Mathematical Theory of Networks and Systems 2004"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031667"},{"key":"32","first-page":"76","article-title":"Continous and Unobtrusive Capture of User-Player Behavior and Experience to Assess and Inform Game Design and Development","author":"marsh","year":"2006","journal-title":"Proceedings of Fun and Games"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1504\/IJART.2011.041483"},{"key":"31","article-title":"Semi-Automated Gameplay Analysis by Machine Learning","author":"southey","year":"0","journal-title":"The Proceedings of AI-2005"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.2307\/1269949"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1201\/b14580","author":"isbister","year":"2008","journal-title":"Game Usability"},{"key":"8","author":"golub","year":"1996","journal-title":"Matrix Computations"}],"event":{"name":"2012 IEEE Conference on Computational Intelligence and Games (CIG)","location":"Granada, Spain","start":{"date-parts":[[2012,9,11]]},"end":{"date-parts":[[2012,9,14]]}},"container-title":["2012 IEEE Conference on Computational Intelligence and Games (CIG)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6361518\/6374097\/06374152.pdf?arnumber=6374152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T14:55:24Z","timestamp":1687877724000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6374152\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/cig.2012.6374152","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}