bibliography excel books, pp. 5 10. - shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603...

21
178 BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And Deepen Relationship Mapping Customer Relationship After Service Recovery, Customer Relationship Management., New Delhi, Excel Books, Pp. 5 – 10. Agrawal, R. and Srikant, R.(1994) Fast Algorithms for Mining Association Rules, Proc. 20th International Conference on Very Large Data Bases (VLDB ’94), Pp. 487-499. Agrawal, R., Imielinski, T. and Swami, A. (1993) Database mining: A performance perspective, IEEE Transactions on Knowledge and Data Engineering, Vol. 5, Issue 6, Pp. 914-925 Ahmad, S. (2004) Applications of data mining in retail business, Information Technology, Vol. 2, Pp. 455-459. Ahn, J.H., Han, S.P. and Lee, Y.S. (2006) Customer churn analysis: Churn determinants and mediation effects of partial defection in the Korean mobile telecommunications service industry. Telecommunications Policy, Vol. 30, Pp.552–568 Allison, P. D. (2001) Missing data, Thousan Oaks, California, USA: Sage University Papers Series on Quantitative Applications in the Social Sciences. Amarnathan, L.C. (2003) Technological Advancement: Implications for Crime, The Indian Police Journal, April-June. Anderson, E.W., Fornell, C. and Lehmann, D.R. (1994) Customer satisfaction, market share, and profitability: findings from Sweden, Journal of Marketing, Vol. 58, Pp. 53-66. Ankerst, M., Breunig, M., Kriegel, H.-P., and Sander, J. (1999) OPTICS: Ordering points to identify clustering structure, Proceedings of the ACM SIGMOD Conference, Philadelphia, PA, Pp. 49-60. Asiedu, M. and Safo, J.O. (2013) A multi-dimensional service delivery among mobile network providers in Ghana : A case of customer satisfaction, European Scientific Journal, Vol. 9, No. 23, Pp. 86-101. Astudillo, C., Bardeen, M. and Cerpa, N. (2014)Editorial: Data Mining in Electronic Commerce – Support vs. Confidence, Journal of Theoretical and Applied Electronic Commerce Research, Vol. 9, Issue 1, Pp. 1-7. Au, W.H., Chan, K.C.C. and Yao, X. (2003) A Novel Evolutionary Data Mining Algorithm With Applications to Churn Prediction, IEEE Transactions on Evolutionary Computation, Vol. 7, No. 6, Pp. 1-8. Babu, G.P. and Murty, M.N. (1993) A near-optimal initial seed value selection in Kmeans algorithm using a genetic algorithm. Pattern Recogn. Lett., Vol. 14, No. 10, Pp. 763-169.

Upload: others

Post on 26-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

178

BIBLIOGRAPHY

Agrawal, M.L. (2003) Make A Mistake And Deepen Relationship Mapping CustomerRelationship After Service Recovery, Customer Relationship Management., New Delhi,Excel Books, Pp. 5 – 10.

Agrawal, R. and Srikant, R.(1994) Fast Algorithms for Mining Association Rules,Proc. 20th International Conference on Very Large Data Bases (VLDB ’94), Pp.487-499.

Agrawal, R., Imielinski, T. and Swami, A. (1993) Database mining: A performanceperspective, IEEE Transactions on Knowledge and Data Engineering, Vol. 5, Issue 6, Pp.914-925

Ahmad, S. (2004) Applications of data mining in retail business, InformationTechnology, Vol. 2, Pp. 455-459.

Ahn, J.H., Han, S.P. and Lee, Y.S. (2006) Customer churn analysis: Churn determinantsand mediation effects of partial defection in the Korean mobile telecommunications serviceindustry. Telecommunications Policy, Vol. 30, Pp.552–568

Allison, P. D. (2001) Missing data, Thousan Oaks, California, USA: Sage UniversityPapers Series on Quantitative Applications in the Social Sciences.

Amarnathan, L.C. (2003) Technological Advancement: Implications for Crime, The IndianPolice Journal, April-June.

Anderson, E.W., Fornell, C. and Lehmann, D.R. (1994) Customer satisfaction, marketshare, and profitability: findings from Sweden, Journal of Marketing, Vol. 58, Pp. 53-66.

Ankerst, M., Breunig, M., Kriegel, H.-P., and Sander, J. (1999) OPTICS: Ordering points toidentify clustering structure, Proceedings of the ACM SIGMOD Conference, Philadelphia,PA, Pp. 49-60.

Asiedu, M. and Safo, J.O. (2013) A multi-dimensional service delivery among mobilenetwork providers in Ghana : A case of customer satisfaction, European Scientific Journal,Vol. 9, No. 23, Pp. 86-101.

Astudillo, C., Bardeen, M. and Cerpa, N. (2014)Editorial: Data Mining in ElectronicCommerce – Support vs. Confidence, Journal of Theoretical and Applied ElectronicCommerce Research, Vol. 9, Issue 1, Pp. 1-7.

Au, W.H., Chan, K.C.C. and Yao, X. (2003) A Novel Evolutionary Data Mining AlgorithmWith Applications to Churn Prediction, IEEE Transactions on Evolutionary Computation,Vol. 7, No. 6, Pp. 1-8.

Babu, G.P. and Murty, M.N. (1993) A near-optimal initial seed value selection in Kmeansalgorithm using a genetic algorithm. Pattern Recogn. Lett., Vol. 14, No. 10, Pp. 763-169.

Page 2: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

179

Baker, D., Hofmann, T., McCallum, A. and Yang, Y. (1999) A hierarchical probabilisticmodel for novelty detection in text, Proceedings of International Conference on MachineLearning.

Ball, G. and Hall, D. (1965) ISODATA, a novel method of data analysis and classification.Technical Report AD-699616, SRI, Stanford, CA.

Banerjee, A. and Ghosh, J. (2002) On scaling up balanced clustering algorithms,Proceedings of the 2nd SIAM ICDM, 333-349, Arlington, VA.

Bansal, S. and Gupta, G., (2001) Building Customer Loyalty Business-to-BusinessCommerce, J. N. Sheth, A. Parvatiyar and G. Shainesh, eds., Customer RelationshipManagement. New Delhi, Tata McGraw-Hill, Pp. 3-25.

Barbara, D., Couto, J., Jajodia, S., and Wu, N. (2001b) Detecting novel network intrusionsusing bayes estimators, Proceedings of the First SIAM International Conference on DataMining.

Barnes, J.G. (1997) Closeness, Strength, and Satisfaction: Examining the Nature ofRelationships between Providers of Financial Services and Their Retail Customers,Psychology and Marketing, Vol. 14, No. 8, Pp. 765-790.

Basiri, J., Taghiyareh, F. and Moshiri, B. (2010) A Hybrid Approach to Predict Churn,Proceedings of Asia-Pacific Services Computing Conference IEEE, Pp. 485-491.

Basu, A., Watters, C., and Shepherd, M. (2002) Support Vector Machines for TextCategorization, Dalhousie University, Halifax, Nova Scotia, Canada, Proceedings of the36th Hawaii International Conference on System Sciences, Pp.43-49.

Batista, G. and Monard, M. C. (2002) A study of k-nearest neighbour as an imputationmethod. in HIS, ser. Frontiers in Artificial Intelligence and Applications, A. Abraham, J. R.del Solar, and M. K¨oppen, Eds., vol. 87. IOS Press, pp. 251–260.

Beckmann, N., Kriegel, H-P., Schneider, R., and Seeger, B. (1990) The R*-tree: Anefficient access method for points and rectangles, Proceedings of International Conferenceon Geographic Information Systems, Ottawa, Canada.

Bello, O.W. (2012) Mobile Telecommunication Customer Loyalty in Nigeria: Determiningfactors, Google EBook, GRIN Publishing,http://books.google.co.in/books?id=S1VvO\_oyB3oC, Last Accessed during March, 2014.

Bengio, Y. and Gingras, F. (1995) Recurrent neural networks for missing or asynchronousdata. in NIPS, D. S. Touretzky, M. Mozer, and M. E. Hasselmo, Eds. MIT Press, pp. 395–401.

Berry, L.L. (1983) Relationship Marketing, in Berry, L.L. Shostack, GL and Upha, GD(Eds), Emerging Perspectives in Service Marketing, American Marketing Association,Chicago, Vol. II, Pp.25-28.

Page 3: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

180

Berry, M.J.A. and Linoff, G. (2004) Data mining techniques: For marketing, sales, andcustomer relationship management. Wiley.

Berson, A., Smith, S. and Thearling, K. (2000, 1999) Building data mining applications forCRM, New York, McGraw-Hill.

Bitner, M.J. and Hubert, A.R. (1994) Encounter satisfaction versus overall satisfactionversus quality , in Rust, R.T. and Oliver, R.L. (Eds) Service Quality: New Directions inTheory and Practice, Sage Publications, London, Pp. 72-94.

Bolton, R. N., and Drew, J. H. (1991) A multistage model of customers assessments ofservice quality and value, Journal of Consumer Research, Vol. 17, Pp. 375-384.

Bose, K. and Bansal, H.S , (2010) Regain Management :Issues and Strategies, Sheth, J. N.,Parvatiyar, A. and Shainesh. G (Eds.) Customer Relationship Management, EmergingConcepts, Tools and Applications, Tata McGraw Hill Education Private Limited, Pp.63-70

Bose, R. (2002) Customer relationship management : Key compoents for IT succss,Industrial Management and Data Systems, Vol. 102, No. 2, Pp. 89-97.

Bradley, P., Fayyad, U., and Reina, C. (1998) Scaling clustering algorithms to largedatabases, Proceedings of the 4th ACM SIGKDD, New York, Pp. 9-15.

Brailovsky, V.L. (1991) A probabilistic approach to clustering, Pattern Recogn. Lett. Vol.12, No. 4, Pp. 193–198.

Breiman, L.. Friedman, J.H., Olshen, R.A. and Stone, C.J. (2007) Classification andRegression Trees, Wadsworth, Belmont.

Breunig, M. M., Kriegel, H.P., Ng, R. T. and Sander, J. (1999) Optics-of: Identifying localoutliers, Proceedings of the Third European Conference on Principles of Data Mining andKnowledge Discovery. Springer-Verlag, Pp.262-270.

Breunig, M. M., Kriegel, H.P., Ng, R. T. and Sander, J. (2000) LOF: identifying density-based local outliers, Proceedings of 2000 ACM SIGMOD International Conference onManagement of Data, ACM Press, Pp.93-104.

Brown, D. and Huntley, C. (1991) A practical application of simulated annealing toclustering, Technical report IPC-TR-91-003, University of Virginia.

Brown, J.G. (2002) Using a multiple imputation technique to merge data sets, AppliedEconomics Letters, Vol. 9, No. 5, Pp.311–314.

Bryson, A.E. and Ho, Y.C. (1969) Applied optimal control: optimization, estimation, andcontrol, Blaisdell Publishing Company or Xerox College Publishing, Pp. 481.

Buckinx, W., and Van den Poel, D. (2005) Customer base analysis: partialdefection of behaviourally loyal clients in a non-contractual FMCG retail setting,

Page 4: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

181

European Journal of Operational Research, Vol. 164, No. 1 Pp. 252–268.

Burez, J., and Van den Poel, D. (2006) CRM at a Pay-TV Company: Usinganalytical models to reduce customer attrition by targeted marketing forsubscription services, Expert Systems with Applications, Vol. 32, No. 2 Pp. 277–288.

Cao, L., Zhang, C., Yu, P.S. and Zhao, Y. (2010a) Challenges and Trends, DomainDriven Data Mining, Springer-Verlag Berlin Heidelberg, Book Section, Pp. 1-25.

Cao, L., Zhao, Y., Zhang, H., Luo, D. and Park, E.K. (2010b) Flexible Frameworks forActionable Knowledge Discovery, IEEE Transactions on Knowledge and DataEngineering, Vol. 22, No. 9, Pp. 1299-1312.

Carrier, C. and Povel, O. (2003) Characterizing data mining software, IntelligentData Analysis, Vol. 7, Pp. 181-192.

Catlett, J. (1991) Megainduction: Machine Learning on Very large Databases. PhD Thesis,University of Sydney.

Chadha, S.K., and Kapoor, D. (2009) Effect of switching cost, service quality and customersatisfaction on customer loyalty of cellular service providers in Indian market, The ICFAIUniversity Journal of Marketing Management, Vol. 8, No. 1, Pp. 23-37.

Chan, P.K. and Stolfo, S.J. (1993a) Experiments on multistrategy learning by metalearning.In Proc. 2nd. Int. Conf. Information and Knowledge Management, Pp. 314-323.

Chan, P.K. and Stolfo, S.J. (1993b) Metalearning for multistrategy and parallel learning.In Proc. 2nd. Int. Workshop on Multistrategy Learning, Pp. 150-165.

Chandar, M., Laha, A. and Krishna, P. (2006) Modeling churn behavior of bankcustomers using predictive data mining techniques, National Conference on SoftComputing Techniques for Engineering Applications, Pp. 1-6.

Cheeseman, P. and Stutz, J. (1996) Bayesian Classification (AutoClass): Theory andResults, Fayyad, U.M., Piatetsky-Shapiro, G., Smyth, P., and Uthurusamy , R. (Eds.)Advances in Knowledge Discovery and Data Mining, AAAI Press/MIT Press.

Chen, M.S., Han, J. and Yu, P.S. (1996) Data Mining: An Overview from a DatabasePerspective, IEEE Trans. Knowledge And Data Eng., Vol. 8, Pp. 866-883.

Chen, N., Vieira, A., Ribeiro, B., Duarte, J. and Neves, J (2011) A stable credit rating

model based on learning vector quantization, Vol. 15, No. 2/2011, Intelligent Data

Analysis, Pp. 237-250.

Chiang, D. A., Wang, Y. F., Lee, S. L., and Lin, C. J. (2003) Goal-orientedsequential pattern for network banking churn analysis, Expert Systems with

Page 5: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

182

Applications, Vol. 25, Pp. 293–302.

Chiu, A. and Fu, C.W. (2003) Enhancements on local outlier detection, Proceedings of 7thInternational Database Engineering and Applications Symposium, Pp. 298-307.

Chiu, T., Fang, D., Chen, J., and Wang, Y. (2001) A Robust and scalable clusteringalgorithm for mixed type attributes in large database environments, Proceedings of the 7thACM SIGKDD, San Francisco, CA, 263-268.

Chu, B., Tsai, M. and Ho, C. (2007) Toward a hybrid data mining model for customerretention, Knowledge-Based Systems, Vol. 20, No. 8, Pp. 703-718.

Clarke, K. (2001) What Price on Loyalty When a Brand Switch is Just a Click Away?,Qualitative Market Research: An International Journal, Vol. 4, No. 3, Pp. 160-168.

Corcoran J.J., Wilson I.D. and Ware J.A. (2003) Predicting the geo-temporal variations ofcrime and disorder, International Journal of Forecasting, Vol. 19, Pp.623–634.

Coussement, K., and Van den Poel, D. (2008) Churn prediction in subscriptionservices: An application of support vector machines while comparing twoparameter selection techniques, Expert Systems with Applications, Vol. 34, Pp.313–327.

Crammer, K., Gilad-Bachrach, R., Navot, A. and Tishby, A. (2002) Margin analysis of theLVQ algorithm, Proc. NIPS 2002, http://www-2.cs.cmu.edu/Groups/NIPS/NIPS2002/NIPS2002preproceedings/index.html.

Cronin, J.J. and Taylor, S.A. (1992) Measuring service quality : A reexamination andextension, Journal of Marketing, Vol. 56, Pp. 55 68.

Cui, G. (2010) A Methodologic Application of Customer Retention Based on BackPropagation Neural Network Prediction, Proceedings of Computer Engineering andTechnology (ICCET) IEEE, Vol. 3, Pp. V3-418 - V3-422.

Daadlani, M., Shanker, R., Chopra, P. (2010) Benefits of implementing a CRM system incellular telecom services, Sheth, J. N., Parvatiyar, A. and Shainesh. G (Eds.) CustomerRelationship Management, Emerging Concepts, Tools and Applications, Tata McGraw HillEducation Private Limited, Pp. 424-433.

Dempster, A.P., Laird, N.M. and Rubin, D.B. (1977) Maximum likelihood for incompletedata via the EM algorithm, J. R. Stat. Soc., Ser. B, Vol. 39, Pp.1–38.

Diehl, C. and Hampshire, J. (2002) Real-time object classification and novelty detection forcollaborative video surveillance, Proceedings of IEEE International Joint Conference onNeural Networks, IEEE, Honolulu, HI.

Dixon J.K. (1979) Pattern recognition with partly missing data, IEEE Transactions onSystems, Man, and Cybernetics, Vol. SMC-9, Issue 10, Pp. 617-621.

Page 6: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

183

Doherty, N.F. and Fiona, E.C. (2006) New perspectives in internet retailing: a review andstrategic critique of the field, International Journal of Retail and Distribution Management,Vol. 34, No. 4/5, Pp. 411–428.

Duda, R.O., Hart, P.E. and Stork, D.G. (2000) Pattern Classification, Wiley-Interscience,New York.

Dudani, S.A. (1976) The distance-weighted k-nearest-neighbor rule, IEEE Transactions onSystems, Man and Cybernetics, Vol. 6, No.4, 325–327.

Eirinaki, M. (2009) Web Mining: A Roadmap, Athens University of Economics andBusiness, http://:www.dbnet.aueb.gr/index.php/corporate/ content/download/341/1381/file/NEMIS.pdf.

El-Sonbaty, Y., Ismail, M.A. and Farouk, M. (2004) An Efficient Density Based ClusteringAlgorithm for Large Databases, 16th IEEE International -Conference on Tools withArtificial Intelligence, Pp. 673-677.

Ester, M., Kriegel, H-P., and Xu, X. (1995) A database interface for clustering in largespatial databases, Proceedings of the 1st ACM SIGKDD, Canada, Pp. 94-99.

Ester, M., Kriegel, H-P., Sander, J. and Xu, X. (1996) A density-based algorithm fordiscovering clusters in large spatial databases with noise, Proceedings of the 2nd ACMSIGKDD, Portland, Oregon, Pp. 226-231.

Ethem, A. (2010) Introduction to machine learning (2nd ed. ed.) Cambridge, Mass.: MITPress.

Fessant F. and Midenet, S. (2002) Self-organising map for data imputation and correctionin surveys, Neural Computing and Applications, 10, 300–310.

Fleming, J. and Asplund, J. (2007) Human Sigma, Gallup Press, New York.

Forgy, E. (1965) Cluster analysis of multivariate data: Efficiency versus interpretability ofclassification. Biometrics, Vol. 21, Pp. 768-780.

Fraley, C. and Raftery, A. (1999) MCLUST: Software for model-based cluster anddiscriminant analysis, Tech Report 342, Dept. Statistics, Univ. of Washington.

Francois, D., Rossi, F., Wertz, V. and Verleysen, M. (2007) Resampling methods forparameter-free and robust feature selection with mutual information, Neurocomputing, Vol.70, Issues 7–9, Pp. 1276–1288.

Frederick, R. (1996) The Loyalty Effect: The hidden force behind growth, ***

Garcıa-Laencina, P.J., Sancho-G´omez, J.-L. and Figueiras-Vidal, A.R. (2006) Patternclassification with missing values using multitask learning, in International JointConference on Neural Networks (IJCNN 2006), Vancouver, BC, Canada: IEEE Computer

Page 7: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

184

Society, Pp. 3594–3601.

Gawad, G.M.A. and Muramalla, V.S.S.R. (2013) Telecommunications Revolution and itseffects on Economic Development: An Applied Study of Developing Economies such asEgypt, Saudi Arabia and India, British Journal of Economics, Finance and ManagementSciences, Vol. 7, No.2, Pp. 203-224.

Geppert, C. (2002) Customer Churn Management: Retaining High-Margin Customers withCustomer Relationship Management Techniques, KPMG and Associates

Goldberg, D.E. (2006) Genetic Algorithms in Search, Optimization and Machine Learning.Morgan Kaufmann.

Gonzalez, T.F. (1985) Clustering to minimize the maximum interclusterdistance.Theoretical Computer Science, Vol. 38, Pp. 293-306.

Groth, R. (1999) Data mining : Building competitive advantage, Santa Clara, Prentice Hall,CA.

Hammer, B. and Villmann, T. (2002) Generalized relevance learning vector quantization,Neural Networks, Vol. 15, Issues 8–9, Pp. 1059–1068.

Hammer, B., Strickert, M. and Villmann, Th. (2005) Supervised neural gas with generalsimilarity measure, Neural Processing Letters, Pp. 17-27.

Han, J. and Kamber, M. (2000) Data Mining: Concepts and Techniques, The MorganKaufmann Series in Data Management Systems, Morgan Kaufmann.

Han, J. and Kamber, M. (2006) Data mining concepts and technologies, 2nd Edn.Ed., San Fransico, Elsevier Inc.

Han, J., Cai, Y., Cercone, N. (1993) Data driven discovery of quantitative rules in relationaldatabases, IEEE Trans. Knowledge and Data Engineering, Vol. 5, Pp. 29-40.

Haridasan, V. and Venkatesh, S. (2011) CRM Implementation in Indian Telecom Industry –Evaluating the Effectiveness of Mobile Service Providers Using Data EnvelopmentAnalysis, International Journal of Business Research and Management (IJBRM) Vol. 2,Issue 3 , Pp 110-127.

Hartigan, J. (1975) Clustering Algorithms, John Wiley and Sons, New York, NY.

Hartigan, J. and Wong, M. (1979) Algorithm AS136: A k-means clustering algorithm.Applied Statistics, Vol. 28, Pp. 100-108.

Hawkins, S., He, H., Williams, G.J., and Baxter, R.A. (2002) Outlier detection usingreplicator neural networks, Proceedings of the 4th International Conference on DataWarehousing and Knowledge Discovery. Springer-Verlag, 170-180.

Hennig, T., Klee, A. (1997) The impact of customer satisfaction and relationship quality on

Page 8: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

185

customer retention: A critical Reassessment and Model Development, Psychology andMarketing, Vol. 14, No. 8, Pp.737-764

Hoyer, W.D. and MacInnis, D.J. (2001) Consumer Behaviour, 2nd ed., Boston, HoughtonMifflin Company.

http://en.wikipedia.org/wiki/Backpropagation, Last Accessed During December, 2014.

http://en.wikipedia.org/wiki/C4.5_algorithm, Last Accessed During December, 2014.

http://en.wikipedia.org/wiki/Customer_attrition, Last Accessed during March, 2014.

http://en.wikipedia.org/wiki/Customer_relationship_management#Characteristics_of_CRM,Last Accessed during March, 2014.

http://en.wikipedia.org/wiki/Outlier, Last Access Date : 20-02-2011.

http://knowledge.wharton.upenn.edu/article/how-will-indias-telecom-industry-manage-the-fallout-from-falling-rates, Last Accessed during March, 2014.

http://www.zoho.com/crm/how-crm-works.html, Last Accessed during March, 2014.

Huang, B., Buckley, B. and Kechadi, T.M. (2010a) Multi-objective feature selectionby using NSGA-II for customer churn prediction in telecommunications, ExpertSystems with Applications, Vol. 37, Pp. 3638–3646.

Huang, B., Kechadi, M.T. and Buckley, B. (2012) Customer churn prediction intelecommunications, Expert Systems with Applications, Vol. 39, Pp. 1414–1425.

Huang, Y., Huang, B.Q. and Kechadi, M.T.A (2010b) New Filter Feature SelectionApproach for Customer Churn Prediction in Telecommunications, Proceedings of theIEEM, IEEE, Pp. 338-342.

Hung, S. Y., Yen, D. C., and Wang, H. Y. (2006) Applying data mining to telecommchurn management, Expert Systems with Applications, Vol. 31, No.3, Pp. 515–524.

Iqbal, A., Zia, M.H., Bashir, S., Shahzad, K. and Aslam, M.W. (2008) Antecedents andOutcomes of Customer satisfaction in using prepaid cellular service in Pakistan,Proceedings of the First International Conference on Business and Technology, IqraUniversity, Islamabad, Pakistan, Pp. 1-8.

Jahromi, A.T. (2009) Predicting customer churn in telecommunications service providers,Masters Thesis, MSc Program in Marketing and Electronic Commerce Joint, LuleaUniversity of Technology, Department of Business Administration and Social Sciences.

Jain, A.K. and Dubes, R.C. (1988) Algorithms for Clustering Data, Prentice-Hall.

James, M. (1985) Classication Algorithms. John Wiley.

Kandampully, J. (1998) Service quality to service loyalty: A relationship which goes

Page 9: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

186

beyond customer services, Total Quality Management, Vol.9, No.6, Pp.431-443

Kapur, J.N. (1994) Measures of Information and their Application, Wiley, New Delhi.

Karahoca, A. and Karahoca, D. (2011) GSM churn management by using fuzzy c-means clustering and adaptive neuro fuzzy inference system, Expert Systems withApplications, Vol. 38, Pp. 1814–1822.

Karmaker, A. and Rahman, S. (2009) Outlier Detection in Spatial Databases UsingClustering Data Mining, Sixth International Conference on Information Technology: NewGenerations, Pp.1657-1658.

Karypis, G., Han, E.H. and Kumar, V. (1999) Chameleon: A hierarchical clusteringalgorithm using dynamic modeling, IEEE Computer: Special Issue on Data Analysis andMining, Pp. 68–75.

Kaski, S., Kangas, J. and Kohonen, T. (1998) Bibliography of Self- Organizing Map (SOM)Papers 1981-1997, Neural Computing Surveys, Vol. 1, Pp. 102-350.

Kaufman, L. and Rousseeuw, P. (1990) Finding Groups in Data: An Introduction to ClusterAnalysis, John Wiley and Sons, New York, NY.

Keaveney, S.M. (1995) Customer switching behavior in service industries: An exploratorystudy, Journal of Marketing, Vol. 59, Pp. 71–82.

Keim, D.A. and Kriegel, H.P. (1996) Visualization Techniques for Mining LargeDatabases: A Comparison, IEEE Trans. Knowledge and Data Eng., special issue on datamining, Vol. 8, No. 6, Pp. 923- 938.

Kentrias, S. (2001) Customer relationship management: The SAS perspective,www.cm2day.com, Last Accessed during September 2013.

Keramati, A. and Ardabili, S.M.S. (2011) Churn analysis for an Iranian mobile operator,Telecommunications Policy, Vol. 35, Pp. 344–356.

Khan, A.A., Jamwal, S. and Sepehri, M.M. (2010) Applying Data Mining to CustomerChurn Prediction in an Internet Service Provider, International Journal of ComputerApplications (0975 – 8887), Vol. 9, No.7, Pp. 123-131.

Kim, H. S. and Yoon, C. H. (2004) Determinants of subscriber churn and customer loyaltyin the Korean mobile telephony market, Telecommunications Policy, Vol. 28, Issue 9/10,Pp. 751–765

Kincaid, J. (2003) Customer Relationship Management : Getting it Right, Prentice HallPTR, New Jersey.

Kisioglu, P. and Topcu, Y.I. (2011) Applying Bayesian Belief Network approach tocustomer churn analysis: A case study on the telecom industry of Turkey, Expert Systems

Page 10: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

187

with Applications, Vol. 38, Pp. 7151–7157.

Knorr, E., Ng, R. and Tucakov, V. (2000) Distance-based outliers: Algorithms andapplications. VLDB J., Vol. 8, Pp. 237-253.

Knorr, E.M. and Ng, R.T. (1997) A unified approach for mining outliers, Proceedings of the1997 conference of the Centre for Advanced Studies on Collaborative research. IBM Press,P.11.

Knorr, E.M. and Ng, R.T. (1998) Algorithms for mining distance-based outliers in largedatasets, Proceedings of the 24th International Conference on Very Large Data Bases,Morgan Kaufmann Publishers Inc., Pp.392-403.

Koh, H.C. and Tan, G. (2010) Data Mining Applications in Healthcare, Journal ofHealthcare Information Management, Vol. 19, No. 2, Pp.64-72.

Kohonen, T. (1997) Self-Organizing Maps, Vol. 30 of Springer Series in InformationSciences, Springer, Berlin, Heidelberg, 1995, (Second Extended Edition 1997)

Kohonen, T. (2006) Self-organizing maps, 3rd ed. Springer.

Kohonen, T., Hynninen, J., Kangas, J. and Laaksonen, V. (1996) SOM PAK: The Self-Organizing Map program package, Helsinki University of Technology, Finland, ReportA31, Pp. 1-27.

Kotler, P. and Kelvin, K. (2006) Marketing Management, 12th Edition, Pearson EducationInc., New Jersey.

Kotsiantis, S., Kanellopoulos, D. and Pintelas, P. (2006) Data Preprocessing for SupervisedLeaning, International Journal of Computer Science, Vol 1 No. 2, Pp 111-117.

Kotsiantis, S.B. (2007) Supervised Machine Learning: A Review of ClassificationTechniques, Informatica, Vol. 31, Pp. 249-268.

Kumar, P. and Thapliyal, M.P. (2010) Integration of e-business with ERP systems,International Journal of Engineering Science and Technology, Vol. 2, No. 5, Pp. 768-772.

Kwak, N. and Choi, C.H. (2002) Input feature selection by mutual information based onParzen window, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24,No.12, Pp. 1667–1671.

Lakshmi, N., Tripathi, D. and Goya, P. (2011) Customer Relationship Management,VSRDInternational Journal of Business and Management Research, Vol. 1, No. 7, Pp. 471-478.

Laurikkala, J., Juhola, M. and Kentala, E. (2000) Informal identification of outliers inmedical data, Proceedings of the Workshop on Intelligent Data Analysis in Medicine andPharmacology, Pp. 20-24.

Lee, S. and Siau, K. (2001) A review of data mining techniques, Industrial

Page 11: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

188

Management and Data Systems, Vol. 101, No. 1, Pp. 41-46.

Lee, Y.H., Wei, C.P., Cheng, T.H. and Yang, C.T. (2012) Nearest-neighbor-based approachto time-series classification, Decision Support Systems, Vol. 53, Pp. 207–217.

Lejeune, M.A. (2001) Measuring teh impact of data mining on churn management, InternetResearch : Electronic Networking Applications and Policy, Vol. 11, No. 5, Pp. 375-387.

Li, J. and Liu, H. (2003) Ensembles of Cascading Trees, Proc. IEEE Int’l Conf. DataMining (ICDM ’03), Pp. 585-588.

Ling, C. E., Run, E.C. (2009) Satisfaction and loyalty: Customer perception of Malaysiantelecommunication service providers, ICFAI, University Journal of service marketing,Vol.VII, No. 1, Pp. 1-8.

Ling, R. and Yen, D. (2001) Customer relationship management : An analysis frameworkand implementation strategies, Journal of Computer Information Systems, Vol. 41, No. 3,Pp. 82-97.

Lippmann, H.A. (1987) Neural Net and Traditional Classifiers, In international Work Shopon Machine Learning.

Little R. J. A. and Rubin, D. B. (2002) Statistical Analysis with Missing Data, 2nd ed. NewJersey, USA: John Wiley and Sons.

Liu, B., Hsu, W., Chen, S. and Ma, Y. (2000) Analyzing Subjective Interestingness ofAssociation Rules, IEEE Intelligent Systems, Vol. 15, No. 5, Pp. 47-55.

Liu, B., Hsu, W., Mun, L.F. and Lee, H.Y. (1999) Finding Interesting Patterns Using UserExpectations, IEEE Trans. Knowledge and Data Eng., Vol. 11, No. 6, Pp. 817-832.

Madden, G., Savage, S. and Cobel-Neal, G. (1999) Subscriber churn in theAustralian ISP Market, Information Economics and Policy, Vol. 11, Pp. 195-207.

Mallinson, H. and Gammerman, A. (2003) Support vector machine imputationmethodology, University of London, Euredit Project WP 5.6.

Mannila, H., Toivonen, H. and Verkamo, A.I. (1994) Efficient Algorithms forDiscovering Association Rules, Proc. Workshop Knowledge Discovery inDatabases (KDD ’94), Pp. 181-192.

Mao, J. and Jain, A.K. (1996) A Self-organizing network for hyperellipsoidal clustering(HEC) IEEE Transactions on Neural Networks, Vol. 7, No. 1, Pp. 16-29.

Markou, M. and Singh, S. (2003a) Novelty detection: a review-part 1: statisticalapproaches, Signal Processing, Vol. 83, No.12, Pp.2481-2497.

Markou, M. and Singh, S. (2003b) Novelty detection: a review-part 2: neural network based

Page 12: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

189

approaches, Signal Processing, Vol. 83, No.12, Pp.2499-2521.

Marseguerra M. and Zoia, A. (2005) The autoassociative neural network in signal analysis:II. Application to on-line monitoring of a simulated BWR component, Annals of NuclearEnergy, 32, 1207–1223.

Martinetz, T.M., Berkovich, S.G. and Schulten, K.J. (1993) ’Neural-gas’ network for vectorquantization and its application to time-series prediction, IEEE Trans. on Neural Networks,Vol. 4, No. 4, Pp. 558-569.

Mattfeldt, T., Trijic, D., Gottfried, H.W. and Kestler, H.A. (2004) Classification of

incidental carcinoma of the prostate using learning vector quantization and support vector

machines, Analytical Cellular Pathology, Vol. 26, No. 1-2/2004, Pp. 45-55.

Mclachlan, G. and Basford, K. (1988) Mixture Models: Inference and Applications toClustering, Marcel Dekker, New York, NY.

McLachlan, G.J. and Krishnan, T. (1997) The EM Algorithm and Extensions, Wiley, NewYork.

Mehta, M., Agrawal, R. and Rissanen, J. (1996) SLIQ: A fast scalable classifier for datamining, Proceedings of the fifth international conference on extending database technology,France, pp. 8-32.

Meyering, A. and Ritter, H. (1992) Learning 3D-shape-perception with local linear maps,Proceedings of IJCNN'92, Pp. 432.436.

Michael, A.A. (Ed.) (1995) The Handbook of Brain Theory and Neural Networks, Wiley-Interscience, New York.

Michalski, R.S. and Stepp, R. (1983) Learning from observations: conceptual clustering,Machine Learning: An Artificial Intelligence Approach. San Mateo, CA, MorganKaufmann.

Michie, D., Spiegelhalter, D.J. and. Taylor, C.C. (Editors) (2004) Machine Learning,Neural and Statistical Classification. Ellis Horwood.

Mitchell, T. (1997) Machine learning, McGraw Hill.

Mitchell, T. (1999) Machine Learning and Data Mining, Comm. ACM, Vol. 42, No.11, Pp. 30-36.

Moore, A. (1999) Very fast EM-based mixture model clustering using multiresolution kd-trees, Advances in Neural Information Processing Systems, P.11.

Mozer, M.C., Wolniewicz, R., Grimes, D.B., Johnson, E. and Kaushansky, H. (2000)Predicting Subscriber Dissatisfaction and Improving Retention in the Wireless

Page 13: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

190

Telecommunications Industry, IEEE Transactions on Neural Networks, Vol 11, No. 3, Pp.326-349..

Nelwamondo, F. V., Mohamed, S. and Marwala, T. (2007) Missing data: A comparison ofneural network and expectation maximization techniques, Current Science, 93, 1514–1521.

NeuroIntelligence-Alyuda Research (2010) http://www.alyuda.com/neural-network-software.htm, Last Accessed During December, 2014.

Ng, R. and Han, J. (1994) Efficient and effective clustering methods for spatial data mining,Proceedings of the 20th Conference on VLDB, Santiago, Chile, Pp.144-155.

Ngai, E. (2005) Customer relationship management research (1992-2002) : An academicliterature review and classification, Marketing Intelligence and Planning, Vol. 23, No. 6,Pp. 582-605.

Ngai, E., Xiu, L. and Chau, D. (2009) Application of data mining techniques incustomer relationship management : A literature review and classification, ExpertSystems with Applications, Vol. 36, Pp. 2592-2602.

Nie, G., Rowe, W., Zhang, L., Tian, Y., and Shi, Y. (2011) Credit card churn forecasting bylogistic regression and decision tree, Expert Systems with Applications, Vol. 38, Pp.15273–15285.

Nie, G., Wang, G., Zhang, P., Tian, Y. and Shi,Y. (2009) Finding the hidden pattern ofcredit card holder's churn : A case of China, ICCS, LNCS 5545, Springer-Verlag BerlinHeidelberg, Pp. 561-569.

Nordbotten, S. (1996) Neural network imputation applied to the norweigan 1990population census data, Journal of Official Statistics, Vol. 12, pp. 385–401.

Ohsawa, Y. and McBurney, P. (Eds.) (2003) Chance Discovery - Advanced InformationProcessing Series, Springer Verlag.

Oja, M., Kaski, S. and Kohonen, T. (2002) Bibliography of Self-Organizing Map (SOM)Papers: 1998-2001 Addendum, Neural Computing Surveys, Vol. 1, Pp. 1-176.

Olafsson, S., Li, X. and Wu, S. (2008) Operations reearch and data mining, EuropeanJournal of Operational Research, Vol. 187, Pp. 1429-1448.

Owczarczuk, M. (2010) Churn models for prepaid customers in the cellulartelecommunication industry using large data marts, Expert Systems with Applications, Vol.37, Pp. 4710–4712.

Ozdemir, B. and Caliskan, O. (2013) A review of literature on restaurant menus,International Journal of Gastronomy and Food Science, Pp. 1-5.

Ozkan, K. (2004) Managing data mining at digital crime investigation, Forensic Science

Page 14: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

191

International, Vol. 146, Pp.S37-S38

Paquet, E. (2004) Exploring anthropometric data through cluster analysis, Digital HumanModeling for Design and Engineering (DHM) Rochester, MI.

Parasuraman, A., Zeithaml, V.A. and Berry, L.L. (1988) SERVQUAL: A Multiple-ItemScale for Measuring Consumer Perceptions of Service Quality, Journal of Retailing, Vol.64, No. 1, Pp. 12- 40.

Parker, K.R., Nitse, P.S. and Tay, A.S.M. (2009) The impact of inaccurate color oncustomer retention and CRM, Informing Science: The International Journal of an EmergingTransdiscipline, Vol. 12, Editor: T. Grandon Gill, Pp. 105-122.

Parveen, S. (2003) Connectionist approaches to the deployment of prior knowledge forimproving robustness in automatic speech recognition, Ph.D. dissertation, University ofSheffield.

Pathak, K. and Rastogi, S. (2007) Determinants of Customers Churn in Emerging TelecomMarkets: A Study Of Indian Cellular Subscribers, Journal of Global Academy of MarketingScience, Vol. 17, No.4, Pp. 11-15.

Pavan, M. and Pelillo, M. (2003) New Graph-Theoretic Approach to Clustering andSegmentation, Proceedings of the 2003 IEEE Computer Society Conference on ComputerVision and Pattern Recognition (CVPR’03) Pp.1-8.

Pei, Y., Zaiane, O.R. and Gao, Y. (2006) Efficient Reference-Based Approach to OutlierDetection in Large Datasets, Sixth International Conference on Data Mining, ICDM '06, Pp.478 – 487.

Pelleg, D. and Moore, A. (1999) Accelerating exact k-means algorithms with geometricreasoning, Proceedings of the 5th ACM SIGKDD, San Diego, CA, Pp. 277-281.

Pelleg, D. and Moore, A. (2000) X-means: Extending K-means with Efficient Estimation ofthe Number of Clusters, Proceedings 17th ICML, Stanford University.

Pendharkar, P.C. (2009) Genetic algorithm based neural network approaches for predictingchurn in cellular wireless network services, Expert Systems with Applications, Vol. 36, Pp.6714–6720.

Peres, R.T. and Pedreira, C.E. (2009) Generalized Risk Zone: Selecting Observations forClassification, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 31,No. 7, Pp. 1331-1337.

Phung, D., Adams, B., Tran, K., Venkatesh, S. and Kumar, M. (2009) High AccuracyContext Recovery using Clustering Mechanisms, In proceedings of the seventhinternational conference on Pervasive Computing and Communications, PerComGalveston, USA, Pp. 122-130.

Piela, P. (2002) Introduction to self-organizing maps modelling for imputation - techniques

Page 15: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

192

and technology, Research in Official Statistics, Vol. 2, Pp.5–19.

Poel, V.D. and Larivie're, B. (2004) Customer attritionan analysis for financial serviceusing proportional hazard models, European Journal of Operational Research, Vol. 157, No.1, Pp. 196-217.

Pokrajac, D., Lazarevic, A. and Latecki, L.J. (2007) Incremental local outlier detection fordata streams, Proceedings of IEEE Symposium on Computational Intelligence and DataMining, Pp. 504-515.

Pregenzer, M., Pfurtscheller, G. and Flotzinger, D. (1996) Automated feature selection withdistinction sensitive learning vector quantization. Neurocomputing, Vol. 11, Pp.19-29.

Preparata, F. and Shamos, M. (1988) Computational Geometry: an Introduction, Springer.

Principe, J.C., Euliano, N.R. and Lefebvre, C.W. (2009) Neural and adaptive systems:fundamentals through simulations, Wiley-Interscience, New York.

Quinlan, J.R. (1993) C4.5 : Programs for machine learning, Vol. 1, Pp.81-106.

Rai, A.K. (2013) Customer Relationship Management : Concepts and Class, EasternEconomy Edition (Second Edition) PHI Learning Private Limited, New Delhi.

Raiser, S., Lughofer, E., Eitzinger, C. and Smith, J.E. (2010) Impact of object extractionmethods on classification performance in surface inspection systems, Special Issue Paper,Machine Vision and Applications, Springer-Verlag, PP. 627-641.

Ramanathan, R., Ramanathan, U. and Hsiao, H.L. (2012) The impact of e-commerce onTaiwanese SMEs: Marketing and operations effects, International Journal of ProductionEconomics, Vol. 140, Issue 2, Pp. 934-943.

Ranaweera, C. and Neeley, A. (2003) Some moderate effects on the service quality-customer retention link. International Journal of Operations and Production Management,Vol. 23, Pp. 230-248.

Ratsch, G., Mika, S., Scholkopf, B. and Muller, K.R. (2002) Constructing boostingalgorithms from svms: An application to one-class classification. IEEE Transactions onPattern Analysis and Machine Intelligence, Vol. 24, No.9, Pp.1184-1199.

Reinartz, W., Thomas, J. and Kumar, V. (2005) Balancing acquisition and retentionresources to maximize profitability, Journal of Marketing, Vol. 69, No. 1, Pp. 63-79.

Renyi, A. (1961) On measures of entropy and information., Proceedings of the FourthBerkeley Symposium on Mathematical Statistics and Probability, University of CaliforniaPress.

Richards, K.A. and Jones, E. (2008) Customer relationship management : Finding valuedrives, Industrial Marketing Management, Vol. 37, Pp. 120-130.

Page 16: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

193

Rousseeuw, P.J. and Leroy, A.M. (1987) Robust regression and outlier detection, JohnWiley and Sons, Inc., New York, USA.

Ruts, I. and Rousseeuw, P. (1996) Computing Depth Contours of Bivariate Point Clouds,Journal of Computational Statistics and Data Analysis, Vol. 23, pp. 153-168.

Ryals, L. (2005) Making customer relationship management work : The measurement andprofitable management of customer relationships, Journal of Marketing, Vol. 69, No. 4, Pp.252-261.

Ryals, L. and Knox, S. (2001) Cross-functional issues in the implementations ofrelationship marketing through CRM, European Management Journal, Vol. 19, Issue 5, Pp.534-542.

Samad T. and Harp, S. A. (1992) Self-organization with partial data, Network, 3, 205–212.

Sanjeevkumar, V. and Ramachandran, S. (2012) A descriptive study on catchment areaanalysis and customer satisfaction towards big Bazaar with special reference to VadapalaniBranch, Chennai, International Journal of Research in Commerce and Management Vol. 3,Issue No. 9, Pp. 1-7.

SAS Institute (2000) Best practice in churn prediction, A SAS Institute White Paper

Sato, A. and Yamada, K. (1998) A formulation of learning vector quantization using a newmisclassification measure, Proceedings of Fourteenth International Conference on PatternRecognition, A. K. Jain, S. Venkatesh, and B. C. Lovell, Eds., IEEE Computer Society, LosAlamitos, CA, USA, Vol. 1, Pp. 322-325.

Sato, A.S. and Yamada, K. (1995) Generalized learning vector quantization, G. Tesauro, D.Touretzky, and T. Leen, editors, Advances in Neural Information Processing Systems, MITPress, Vol. 7, Pp.423.429.

Sebyala, A.A., Olukemi, T. and Sacks, L. (2002) Active platform security through intrusiondetection using naive bayesian network for anomaly detection, Proceedings of the 2002London Communications Symposium.

Serira, L., Ramassoa, E. and Zerhounia, N. (2012) Evidential Evolving Gustafson-KesselAlgorithm For Online Data Streams Partitioning Using Belief Function Theory,International Journal of Approximate Reasoning, Vol. 53, No. 5, Pp. 747-768

Shamsinejad, P. and Saraee, S. (2011) A Bayesian Network Approach for Causal ActionRule Mining, International Journal of Machine Learning and Computing, Vol. 1, No. 5, Pp.528-533.

Sharma, A. and Panigrahi, P.K. (2011) A Neural Network based Approach for PredictingCustomer Churn in Cellular Network Services, International Journal of ComputerApplications (0975 – 8887) Vol. 27, No.11, Pp26.-31.

Shaw, M., Subramaniam, C., Tan, G. and Welge, M. (2001) Knowledge management and

Page 17: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

194

data mining for marketing, Decision Support System, Vol. 31, No. 1, Pp. 127-137.

Shepherd C.D. (1999) Service quality and the sales force: A tool for competitive advantage,Journal of Personal Selling and Sales Management, Vol.19, No. 3, Pp.73-82.

Shim, B., Choi, K. and Suh, Y. (2012) CRM strategies for a small-sized online shoppingmall based on association rules and sequential patterns, Expert Systems with Applications,Vol. 39, Pp. 7736–7742.

Somervuo, P. and Kohonen, T. (1999) Self-organizing maps and learning vectorquantization for feature sequences, Neural Processing Letters, Vol. 10, No.2, Pp.151.159.

Song G, Yang, D, Wu L, Wang T and Tang, S (2006) A mixed process neural network andits application to churn prediction in mobile communications, Proceedings of the SixthIEEE International Conference on Data Mining Workshops (ICDM Workshops) Pp. 798-802.

Stefano, C., Sansone, C., and Vento, M. (2000) To reject or not to reject: that is the question: An answer in case of neural classifiers, IEEE Transactions on Systems, Management andCybernetics, Vol. 30, No.1, Pp. 84-94.

Sun, P. and Chawla, S. (2004) On local spatial outliers, Proceedings of 4th IEEEInternational Conference on Data Mining, Pp. 209-216.

Sun, P. and Chawla, S. (2006) Slom: a new measure for local spatial outliers, Knowledgeand Information Systems, Vol. 9, No.4, Pp. 412-429.

Sun, P., Chawla, S. and Arunasalam, B. (2006) Mining for outliers in sequential databases,SIAM International Conference on Data Mining, Bethesda, MD, USA, Pp 94-106.

Surekha, K. and Satyanarayana, P. (2012) Actionable knowledge discovery using MSCAM,International Journal of Computer Science and Technology, Vol. 3, Issue 3, Pp. 346-350.

Swift, R. (2001) Accelerating customer relationships using CRM and RelationshipTechnologies, NJ, Prentice-Hall PTR.

Taiwo, K. and Adeyemo, A.B. (2012) Data Mining Technique for PredictingTelecommunications Industry Customer Churn Using both Descriptive and PredictiveAlgorithms, International Journal of Computing, Information Science and DevelopmentInformatics, Vol. 3, No. 2, Pp. 17-34.

Tang, J., Chen, Z., Chee Fu, A. W. and W.Cheung, D. (2002) Enhancing effectiveness ofoutlier detections for low density patterns, Proceedings of the Pacific-Asia Conference onKnowledge Discovery and Data Mining, Pp. 535-548.

Teng, H., Chen, K. and Lu, S. (1990) Adaptive real-time anomaly detection usinginductively generated sequential patterns, Proceedings of IEEE Computer SocietySymposium on Research in Security and Privacy. IEEE Computer Society Press, Pp. 278-

Page 18: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

195

284.

Thompson, B. (2004) Successful CRM : Turning customer loyalty into profitability, Pp. 1-16, http://aquafactory.optimaitconsulting.com/menu/CRM/Successful_CRM_Turning%20Customer%20Loyalty%20Into%20Profitability.pdf , LastAccess During March, 2014.

Thomson, B. (2004) Successful CRM: Turning Customer Loyalty into Profitability, N.MShanthi (Ed.) CRM In Telecom: Concepts and Cases (72-83) Hydrabad, The ICFAIUniversity press, Pp. 49-64.

Torkkola, K. (2003) Feature extraction by non-parametric mutual informationmaximization, Journal of Machine Learning Research, Vol. 3, Pp. 1415—1438.

Torkkola, K. and Campbell, W.M. (2000) Mutual information in learning featuretransformations, Proc. Of International Conference on Machine Learning ICML’2000,Stanford, CA.

Troyanskaya, O., Cantor, M., Alter, O., Sherlock, G., Brown, P. Botstein, D., Tibshirani, R.,Hastie, T. and Altman, R. (2001) Missing value estimation methods for DNA microarrays,Bioinformatics, 17, 520–525.

Tsai, C.F. and Chen, M.Y. (2010) Variable selection by association rules forcustomer churn prediction of multimedia on demand, Expert Systems withApplications, Vol. 37, Pp. 2006–2015.

Tsoukatos, E. and Rand, G.K. (2006) Path analysis of perceived service quality, satisfactionand loyalty in Greek insurance , Managing Service Quality, Vol. 16 No. 5, Pp. 501-19.

Van den Poel, D., and Lariv ie‘re, B. (2004) Customer attrition analysis for financialservices using proportional hazard models, European Journal of OperationalResearch, Vol. 157, Pp. 196–217.

Vapnik, V. (1995) The Nature of Statistical Learning Theory. Springer, New York.

Verbeke, W., Martens, D., Mues, C. and Baesens, B. (2011) Building comprehensiblecustomer churn prediction models with advanced rule induction techniques, Expert Systemswith Applications, Vol. 38, Pp. 2354–2364.

Vesanto, J. and Alhoniemi, E. (2000) Clustering of the self-organizing map, NeuralNetworks, IEEE Transactions on, Vol. 11, Pp. 586-600.

Villmann, T., Schleif, F.M. and Hammer, B. (2006) Comparison of relevance learningvector quantization with other metric adaptive classification methods, Neural Networks,Vol. 19, No. 5, , Pp. 610–622.

Villmann, T.H, and Hammer, B. (2002) Supervised neural gas for learning vectorquantization, Proc. of the 5th German Workshop on Artificial Life (GWAL-5) D. Polani, J.Kim, and T. Martinetz, Eds.,Akademische Verlagsgesellschaft - infix - IOS Press, Berlin,

Page 19: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

196

Pp. 9-16.

Wang, K., Zhou, S. and Han, J. (2002) Profit mining: from patterns to actions, Proceedingsof International Conference on Extending Database Technology (EBDT) : Advances inDatabase Technology, Pp. 70-87.

Weinberger, K., Blitzer, J. and Saul, L. (2006) Distance metric learning for large marginnearest neighbor classification, in: Y. Weiss, B. Scholkopf, J. Platt (Eds.) Advances inNIPS 18, MIT Press, Cambridge, MA, Pp. 1473–1480.

Weston, J. and Watkins. C. (1999) Multi-class support vector machines, Proceedings ofESANN99, M. Verleysen, Ed., Brussels, Belgium.

Wiskott, L. and Sejnowski, T. (1998) Constrained optimization for neural map formation: Aunifying framework for weight growth and normalization, Neural Computation, Vol. 10,Pp. 671-716.

Wong, W.K., Moore, A., Cooper, G. and Wagner, M. (2002) Rule-based anomaly patterndetection for detecting disease outbreaks, Proceedings of the 18th National Conference onArtificial Intelligence, MIT Press, http://www.cs.cmu.edu/simawm/ antiterror.

Wong, W.K., Moore, A., Cooper, G. and Wagner, M. (2003) Bayesian network anomalypattern detection for disease outbreaks, Proceedings of the 20th International Conference onMachine Learning. AAAI Press, Menlo Park, California, Pp.808-815.

Wu, R., Peters, W. and Morgan, M.W. (2002) The Next Generation Clinical DecisionSupport: Linking Evidence to Best Practice, Journal of Healthcare InformationManagement, Vol. 16, No.4, Pp. 50-55.

Xie, Y., Li, X., Ngai, E.W.T. and Ying, W. (2009) Customer churn prediction usingimproved balanced random forests, Expert Systems with Applications, Vol. 36, Pp. 5445–5449.

Xu, X., Ester, M., Kriegel, H.-P., and Sander, J. (1998) A distribution-based clusteringalgorithm for mining large spatial datasets, Proceedings of the 14th ICDE, Orlando, FL, Pp.324-331.

Xu, Y., Yen, D., Lin, B. and Chou, D. (2002) Adopting customer relationship managmenttechnology, Industrial Management and Data Systems, Vol. 102, No. 8/9, Pp. 442-452.

Yang, P. and Huang, B. (2008) A Modified Density Based Outlier Mining Algorithm forLarge Dataset, International Seminar on Future Information Technology and ManagementEngineering, IEEE Computer Society, Pp.37-40.

Yang, Q., Yin, J., Ling, C. and Pan, R. (2007) Extracting actionable knowledge fromdecision trees, IEEE Transactions on Knowledge and Data Engineering, Vol. 18, No. 12,Pp. 1-14.

Yang, Q., Yin, J., Ling, C.X. and Chen, T. (2003) Postprocessing Decision Trees to Extract

Page 20: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

197

Actionable Knowledge, Proceedings of IEEE Conference on Data Mining (ICDM ’03) Pp.685-688.

Yang, Q., Yin, J., Ling, C.X. and Chen, T. (2003) Post processing Decision Trees to ExtractActionable Knowledge, Proc. IEEE Conf. Data Mining (ICDM ’03), Pp. 685-688.

Yang, W.H., Dai, D.Q. and Yan, H. (2008) Feature extraction and uncorrelated discriminantanalysis for high-dimensional data, IEEE Transactions on Knowledge and DataEngineering, Vol. 20, Issue 5, Pp. 1041-4347

Yang, Y., Yang, Q., Lu, W., Pan, J., Pan, R., Lu, C., Li, L. and Qin, Z. (2005)Preprocessing Time Series Data for Classification with Application to CRM, Zhang, S. andJarvis, R. (Eds.) Springer-Verlag Berlin Heidelberg, LNAI 3809, Pp. 133-142.

Yao, Z., Eklund, T. and Back, B. (2010) Using SOM-Ward clustering and predictiveanalytics for conducting customer segmentation, IEEE International Conference on DataMining Workshops, Pp. 639-646.

Yoon, S.Y. and Lee, S.Y. (1999) Training algortihm with incomplete data for feed-forwardneural networks, Neural Processing Letters, Vol. 10, Pp. 171–179.

Yu, C. and Ying, X. (2009) Application of Data Mining Technology in E-Commerce,International Forum on Computer Science-Technology and Applications, Vol. 1, Pp. 291 –293.

Yu, D., Sheikholeslami, G., and Zhang, A. (2002) Findout: finding outliers in very largedatasets, Knowledge And Information Systems, Vol. 4, Issue 4, Pp.387-412.

Zabkowski, T.S. and Szczesny, W. (2012) Insolvency modeling in the cellulartelecommunication industry, Expert Systems with Applications, Vol. 39, Pp. 6879–6886.

Zeithaml, V.A., Berry, L.L. and Parasuraman, A. (1996) The behavioral consequences ofservice quality, Journal of Marketing, Vol. 60, Pp. 31-46.

Zeng, Y.E., Wen, J.H. and Yen, D.C. (2003) Customer relationship management (CRM) inbusiness-to-business (B2B) e-commerce, Information Management and Computer Security,Vol. 11, Issue 1, Pp. 39-44.

Zentes, J., Morschett , D. and Schramm-Klein, H. (2012) Customer RelationshipManagement, Strategic Retail Management, Customer Relationship Management, GablerVerlag, Springer Link, Hanna, Pp. 297-317

Zhang, B. (2001) Generalized k-harmonic means . dynamic weighting of data inunsupervised learning, Proceedings of the 1st SIAM ICDM, Chicago, IL.

Page 21: BIBLIOGRAPHY Excel Books, Pp. 5 10. - Shodhgangashodhganga.inflibnet.ac.in › bitstream › 10603 › 36873 › 9 › ... · BIBLIOGRAPHY Agrawal, M.L. (2003) Make A Mistake And

198

Zhang, Y., Liang, R., Li, Y., Zheng, Y. and Berry, M. (2011) Behavior-BaseTelecommunication Churn Prediction with Neural Network Approach, Proceedings ofInternational Symposium on Computer Science and Society IEEE, Pp. 307 – 310.

Zineldin, M. (2000) TRM Total Relationship Management, Studentlitteratur, Lund.