Biomedical and social science researchers who want to analyze survival data with SAS will find just what they need with this easy-to-read and comprehensive guide. Written for the reader with a modest statistical background and minimal knowledge of SAS software, this book teaches many aspects of data input and manipulation. Numerous examples of SAS code and output make this an eminently practical resource, ensuring that even the uninitiated becomes a sophisticated user of survival analysis. The main topics presented include censoring, survival curves, Kaplan-Meier estimation, accelerated failure time models, Cox regression models, and discrete-time analysis. Also included are topics not usually covered, such as time-dependent covariates, competing risks, and repeated events.
Cited By
- Oh C, Roumani Y, Nwankpa J and Hu H (2017). Beyond likes and tweets, Information and Management, 54:1, (25-37), Online publication date: 1-Jan-2017.
- Kapoor R and Adner R (2012). What Firms Make vs. What They Know, Organization Science, 23:5, (1227-1248), Online publication date: 1-Sep-2012.
- Chen L, Marsden J and Zhang Z (2012). Theory and Analysis of Company-Sponsored Value Co-Creation, Journal of Management Information Systems, 29:2, (141-172), Online publication date: 1-Oct-2012.
- Temizkan O, Kumar R, Park S and Subramaniam C (2012). Patch Release Behaviors of Software Vendors in Response to Vulnerabilities, Journal of Management Information Systems, 28:4, (305-338), Online publication date: 1-Apr-2012.
- Franco A, Sarkar M, Agarwal R and Echambadi R (2019). Swift and Smart, Management Science, 55:11, (1842-1860), Online publication date: 1-Nov-2009.
- Gopal R and Meher S Customer churn time prediction in mobile telecommunication industry using ordinal regression Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining, (884-889)
- Dugan L, LaFree G and Piquero A Testing a rational choice model of airline hijackings Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics, (340-361)