{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:11Z","timestamp":1725488651203},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540442745"},{"type":"electronic","value":"9783540458135"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45813-1_66","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T11:05:07Z","timestamp":1186830307000},"page":"497-505","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mining the Client\u2019s Life Cycle Behaviour in the Web"],"prefix":"10.1007","author":[{"given":"Oscar","family":"Marban","sequence":"first","affiliation":[]},{"given":"Javier","family":"Segovia","sequence":"additional","affiliation":[]},{"given":"Juan J.","family":"Cuadrado","sequence":"additional","affiliation":[]},{"given":"Cesar","family":"Montes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,20]]},"reference":[{"key":"66_CR1","unstructured":"J. S. Breese, D. Heckerman, C. Kadie. (1998) Empirical analysis of predictive algorithms for collaborative filtering. Proceedings of the UAI-98, p.p. 43\u201352"},{"issue":"3","key":"66_CR2","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1145\/245108.245126","volume":"40","author":"J.A. Konstan","year":"1997","unstructured":"J.A. Konstan et al. (1997) GroupLens: Applying collaborative filtering to Usenet news. Communications of the ACM, 40(3):77\u201387, March.","journal-title":"Communications of the ACM"},{"key":"66_CR3","first-page":"210","volume":"1","author":"U. Shardanand","year":"1995","unstructured":"U. Shardanand, P. Maes. (1995) Social information filtering: Algorithms for automating word of mouth. In Proceedings of ACM CHI\u201995, vol. 1, p.p. 210\u2013217.","journal-title":"Proceedings of ACM CHI\u201995"},{"key":"66_CR4","unstructured":"D. Billsus, M.J. Pazzani. (1998) Learning collaborative information filters. In Proc. 15th Int. Conf. on Machine Learning, pages 46\u201354."},{"key":"66_CR5","unstructured":"S. Vucetic et al. (2000) A regression based approach for scaling-up personalized recommeder systems in e-commerce. In the 6th ACM SIGKDD Int. Conf. on KDD"},{"key":"66_CR6","unstructured":"L. Getoor, M. Sahami. Using probabilistic models for collaborative filtering."},{"key":"66_CR7","unstructured":"T. Hofmann, J, Puzicha. (1999) Latent class models for collaborative filtering. Proceedings of the IJCAI-99, p.p. 688\u2013693, S.F., July 31\u2013August 6."},{"key":"66_CR8","unstructured":"http:\/\/www.netmining.com\/page.jsp?PadeID=152"},{"key":"66_CR9","unstructured":"Microsoft, Great Plains e-Enterprise (2001). \u201cFully Integrated Customer Relationship Management Solutions.\u201d Microsoft Corporation"},{"key":"66_CR10","unstructured":"http:\/\/www.acius.net\/pdf\/pdfcID-24.pdf"},{"key":"66_CR11","unstructured":"Han J, & Kamber M, (2001). \u201cData Mining Concepts and Techniques.\u201d Morgan Kaufmann Publishers. ISBN 1-55860-489-8"},{"key":"66_CR12","doi-asserted-by":"crossref","unstructured":"J. Andersen et al. (2000). \u201cAnalysing Clickstreams Using Subsessions.\u201d ACM","DOI":"10.1145\/355068.355312"},{"key":"66_CR13","unstructured":"Theusinger C, Huber KP, (2000). \u201cAnalysing the footsteps of your customers-A case study by ASK\u2014net and SAS Institute GmbH.\u201d SAS Institute GmbH"},{"key":"66_CR14","unstructured":"http:\/\/www.appiancorp.com\/consulting\/expertise\/clickstreamanalysis.asp"},{"key":"66_CR15","unstructured":"Rudd O.P, (2001). \u201cData Mining Cookbook: Modelling Data for Marketing, Risk, and Customer Relationship Management.\u201d Wiley Computer Publishing."},{"key":"66_CR16","doi-asserted-by":"crossref","unstructured":"J. Hertz et al.(1991). \u201cIntroduction to the theory of Neural Computation\u201d","DOI":"10.1063\/1.2810360"},{"key":"66_CR17","unstructured":"Avatars Virtual Technologies (2001). \u201cStrategies in Internet\u201d. White Paper."},{"issue":"2","key":"66_CR18","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/380995.381033","volume":"2","author":"R. Kohavi","year":"2000","unstructured":"R. Kohavi, C. Brodley, B. Frasca, L. Mason, Z. Zheng. KDD-Cup 2000 organizers\u2019 report: Peeling the onion. SIGKDD Explorations, 2(2):86\u201398, 2000.","journal-title":"SIGKDD Explorations"}],"container-title":["Lecture Notes in Computer Science","Rough Sets and Current Trends in Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45813-1_66","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T10:15:37Z","timestamp":1558260937000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45813-1_66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540442745","9783540458135"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-45813-1_66","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"20 September 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}