{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T06:19:11Z","timestamp":1771481951131,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/EU.html"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/cig.2019.8848106","type":"proceedings-article","created":{"date-parts":[[2019,9,27]],"date-time":"2019-09-27T01:49:14Z","timestamp":1569548954000},"page":"1-8","source":"Crossref","is-referenced-by-count":14,"title":["Combining Sequential and Aggregated Data for Churn Prediction in Casual Freemium Games"],"prefix":"10.1109","author":[{"given":"Jeppe Theiss","family":"Kristensen","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Burelli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2017.51"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S1874-8651(09)60003-X"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(02)00030-1"},{"key":"ref30","article-title":"Predicting player churn in destiny: A Hidden Markov models approach to predicting player departure in a major online game","author":"tamassia","year":"2017","journal-title":"IEEE Conference on Computatonal Intelligence and Games CIG"},{"key":"ref10","author":"heiberg-i\u00fcrgensen","year":"2019","journal-title":"Churn Prediction in Online Mobile Games Using Topic Modeling and LSTM"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1214\/08-AOAS169"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1509\/jmkr.43.2.204","article-title":"Defection Detection: Measuring and Understanding the Predictive Accuracy of Customer Churn Models","volume":"43","author":"kamakura","year":"2006","journal-title":"Journal of Marketing Research"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2017.7960659"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0180735"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TG.2018.2888863"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.10"},{"key":"ref18","article-title":"WTTE-RNN : Weibull Time To Event Recurrent Neural Network A model for sequential prediction of time-to-event in the case","author":"martinsson","year":"2017","journal-title":"PhD thesis"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009873905876"},{"key":"ref28","article-title":"Survey on Customer Churn Prediction Techniques","volume":"5","author":"santharam","year":"2018","journal-title":"International Research Journal of Engineering and Technology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2015.2401979"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2014.6932875"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.05.027"},{"key":"ref6","first-page":"2277","article-title":"Customer Churn Prediction in Telecommunication Industries using Data Mining Techniques-A Review","volume":"5","author":"dahiya kanikatalwar","year":"2015","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ROEDUNET.2018.8514153"},{"key":"ref5","article-title":"Regression Models and Life-Tables","author":"cox","year":"1975","journal-title":"Journal of the Royal Statistical Society Series B (Methodological)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2014.6932876"},{"key":"ref7","volume":"7","author":"grob","year":"2018","journal-title":"A Recurrent Neural Network Survival Model Predicting Web User Return Time"},{"key":"ref2","first-page":"27","article-title":"Evaluation measures for models assessment over imbalanced data sets","volume":"3","author":"bekkar","year":"2013","journal-title":"Journal of Information Engineering and Applications"},{"key":"ref9","first-page":"271","article-title":"Customer Churn Prediction in Telecommunication: A Decade Review and Classification","volume":"10","author":"hashmi","year":"2013","journal-title":"IJCSI International Journal of Computer Science Issues"},{"key":"ref1","article-title":"A Nonproportional Hazards Weibull Accelerated Failure Time Regression Model","author":"anderson","year":"2006","journal-title":"Biometrics"},{"key":"ref20","article-title":"Early Churn Prediction and Personalised Interventions in Top Eleven","author":"milosevic","year":"2015","journal-title":"Gamasurtra"},{"key":"ref22","first-page":"22","article-title":"Long Short Term Memory Networks for Anomaly Detection in Time Series","author":"shroff","year":"2015","journal-title":"Proceedings 2015 Network and Distributed System Security Symposium (April)"},{"key":"ref21","first-page":"935","article-title":"Churn Reduction in the Wireless Industry","volume":"12","author":"mozer","year":"2000","journal-title":"Advances in neural information processing systems"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62416-7_28"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.84"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IntelliSys.2015.7361220"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.64.4.17.18077"}],"event":{"name":"2019 IEEE Conference on Games (CoG)","location":"London, United Kingdom","start":{"date-parts":[[2019,8,20]]},"end":{"date-parts":[[2019,8,23]]}},"container-title":["2019 IEEE Conference on Games (CoG)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8844551\/8847948\/08848106.pdf?arnumber=8848106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:47:06Z","timestamp":1658155626000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8848106\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/cig.2019.8848106","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}