{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:25:40Z","timestamp":1774448740389,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,25]],"date-time":"2008-03-25T00:00:00Z","timestamp":1206403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3,25]]},"DOI":"10.1145\/1353343.1353424","type":"proceedings-article","created":{"date-parts":[[2008,4,1]],"date-time":"2008-04-01T16:11:28Z","timestamp":1207066288000},"page":"668-677","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":145,"title":["Social ties and their relevance to churn in mobile telecom networks"],"prefix":"10.1145","author":[{"given":"Koustuv","family":"Dasgupta","sequence":"first","affiliation":[{"name":"IBM India Research Lab"}]},{"given":"Rahul","family":"Singh","sequence":"additional","affiliation":[{"name":"IBM India Research Lab"}]},{"given":"Balaji","family":"Viswanathan","sequence":"additional","affiliation":[{"name":"IBM India Research Lab"}]},{"given":"Dipanjan","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"IBM India Research Lab"}]},{"given":"Sougata","family":"Mukherjea","sequence":"additional","affiliation":[{"name":"IBM India Research Lab"}]},{"given":"Amit A.","family":"Nanavati","sequence":"additional","affiliation":[{"name":"IBM India Research Lab"}]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[{"name":"University of Maryland Baltimore County"}]}],"member":"320","published-online":{"date-parts":[[2008,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2003.819264"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150412"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/297805.297827"},{"key":"e_1_3_2_1_5_1","volume-title":"Harvard","author":"Burt R.","year":"1992","unstructured":"R. Burt . Structural Holes : The Social Structure of Competition . Harvard , 1992 . R. Burt. Structural Holes: The Social Structure of Competition. Harvard, 1992."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066111"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Workshop on Data Mining and Business (DMBiz","author":"T.","year":"2005","unstructured":"Euler, T. Churn prediction in telecommunications using Miningmart . In Proceedings of the Workshop on Data Mining and Business (DMBiz , 2005 ). Euler, T. Churn prediction in telecommunications using Miningmart. In Proceedings of the Workshop on Data Mining and Business (DMBiz, 2005)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.122653799"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011122126881"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1086\/225469"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"e_1_3_2_1_13_1","first-page":"97","article-title":"Latent space Approaches to social network analysis","author":"Hoff P.","year":"2002","unstructured":"P. Hoff , A. Raftery , M. Handcock . Latent space Approaches to social network analysis . Journal of the American Statistical Association , 97 ( 2002 ). P. Hoff, A. Raftery, M. Handcock. Latent space Approaches to social network analysis. Journal of the American Statistical Association, 97 (2002).","journal-title":"Journal of the American Statistical Association"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/245108.245123"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of ACM SODA","author":"Kleinberg J. M.","year":"1998","unstructured":"J. M. Kleinberg . Authoritative sources in a hyperlinked environment . In Proceedings of ACM SODA ( Baltimore, MD, US , 1998 ). J. M. Kleinberg. Authoritative sources in a hyperlinked environment. In Proceedings of ACM SODA (Baltimore, MD, US, 1998)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150476"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of USENIX Security Symposium","author":"Levien R.","year":"1998","unstructured":"R. Levien , A. Aiken . Attack-resistant trust metrics for public key certification . In Proceedings of USENIX Security Symposium ( San Antonio, Texas, USA , 1998 ). R. Levien, A. Aiken. Attack-resistant trust metrics for public key certification. In Proceedings of USENIX Security Symposium (San Antonio, Texas, USA, 1998)."},{"key":"e_1_3_2_1_20_1","volume-title":"Link-based Classification. In Proceedings of 20th International Conference on Machine Learning (pp. 496--503","author":"Lu Q.","year":"2003","unstructured":"Q. Lu , L. Getoor . Link-based Classification. In Proceedings of 20th International Conference on Machine Learning (pp. 496--503 , 2003 ). Q. Lu, L. Getoor. Link-based Classification. In Proceedings of 20th International Conference on Machine Learning (pp. 496--503, 2003)."},{"key":"e_1_3_2_1_21_1","volume-title":"Classification in Networked Data: A toolkit and a univariate case study. Journal of Machine Learning Research. 8(May):935--983","author":"Macskassy S.","year":"2007","unstructured":"S. Macskassy and F. Provost . Classification in Networked Data: A toolkit and a univariate case study. Journal of Machine Learning Research. 8(May):935--983 , 2007 . S. Macskassy and F. Provost. Classification in Networked Data: A toolkit and a univariate case study. Journal of Machine Learning Research. 8(May):935--983, 2007."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224299005400101"},{"key":"e_1_3_2_1_23_1","first-page":"60","article-title":"The small world problem","volume":"2","author":"Milgram S.","year":"1967","unstructured":"S. Milgram . The small world problem . Psychology Today , Vol. 2 ( 1967 ), pp. 60 -- 67 . S. Milgram. The small world problem. Psychology Today, Vol. 2 (1967), pp. 60--67.","journal-title":"Psychology Today"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.846740"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183614.1183678"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"e_1_3_2_1_27_1","first-page":"018","article-title":"The Diffusion of Innovations","volume":"02","author":"Young H. Peyton","year":"2002","unstructured":"H. Peyton Young . The Diffusion of Innovations in Social Networks. Santa Fe Institute Working Paper. 02-04 - 018 ( 2002 ). H. Peyton Young. The Diffusion of Innovations in Social Networks. Santa Fe Institute Working Paper.02-04-018 (2002).","journal-title":"Social Networks. Santa Fe Institute Working Paper."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39718-2_23"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775057"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1117454.1117459"},{"key":"e_1_3_2_1_31_1","volume-title":"Stanley and Katherine Faust","author":"Wasserman","year":"1997","unstructured":"Wasserman , Stanley and Katherine Faust . 1997 . Social Network Analysis: Methods and Applications: Cambridge University Press . Wasserman, Stanley and Katherine Faust. 1997. Social Network Analysis: Methods and Applications: Cambridge University Press."},{"key":"e_1_3_2_1_32_1","volume-title":"Lausen. Spreading Activation Models for Trust Propagation. In Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Service","author":"Ziegler C.","year":"2004","unstructured":"C. Ziegler , G. Lausen. Spreading Activation Models for Trust Propagation. In Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Service ( Taipei, Taiwan , 2004 ). C. Ziegler, G. Lausen. Spreading Activation Models for Trust Propagation. In Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Service (Taipei, Taiwan, 2004)."}],"event":{"name":"EDBT '08: 11th International Conference on Extending Database Technology","location":"Nantes France","acronym":"EDBT '08"},"container-title":["Proceedings of the 11th international conference on Extending database technology: Advances in database technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1353343.1353424","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1353343.1353424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:16Z","timestamp":1750253956000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1353343.1353424"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,25]]},"references-count":32,"alternative-id":["10.1145\/1353343.1353424","10.1145\/1353343"],"URL":"https:\/\/doi.org\/10.1145\/1353343.1353424","relation":{},"subject":[],"published":{"date-parts":[[2008,3,25]]},"assertion":[{"value":"2008-03-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}