DNA Microarrays in Medicine: Expressing Yourself One Pixel at a Time Slides in “Microarrays” |
J. Patrick Vandersluis |
Transformations and Background Estimation in the Statistical Analysis of Microarrays (Title Only) in “Microarrays” |
Karen Kafadar |
Statistical Methods of Detecting Differential Gene Expression (Title Only) in “Microarrays” |
David R. Bickel |
System Test Time Based on Lindstrom/Madden Approach for Continuous Data with Weighted Subsystems Slides |
Thomas R. Walker |
Information Integration for Stockpile Surveillance Slides |
Alyson G. Wilson |
Application of Fisher’s Combined Probability Test to the Validation of the AIM-9X Missile Model Slides |
Art Fries |
Research Within the Department of Homeland Security: Key Issues and Priorities Slides in “Homeland Security” |
Parney Albright |
Data Confidentiality, Data Integration, Data Mining, Data Quality: Statistical Challenges for Counterterrorism (Title Only) in “Homeland Security” |
Alan Karr |
Probabilistic Risk Assessment Methods in Evaluating the Efficacy of Security Procedures (Title Only) in “Homeland Security” |
Bernard Harris |
A Taxonomy of Terrorisms Slides |
Cheryl A. Loeb and James R. Thompson |
DoD’s Role in Homeland Security: Experimental Opportunity and Experimental Results Abstract and Slides |
Paul Deason |
Water Supply Infrastructure Vulnerability Assessment Methodologies Slides |
John B. Willis and Thomas M. Cioppa |
Signature-Related Results on System Reliability (Title Only) |
Francisco J. Samaniego |
Stochastic Measures of Fatigue Crack Damage (Title Only) |
Bruce J. West |
Are Super Efficient Estimators Super Powerful? (Title Only) |
Jayaram Sethuraman |
Quantitative Sensory Evaluation of Food and Wine (Banquet) (Title Only) |
Hildegarde Heymann |
Current and Future Challenges for Software Reliability Assessment Abstract and Slides in “Beyond Software Reliability” |
William Farr |
Useful Software Reliability Modeling Practices in Industry Environments Slides in “Beyond Software Reliability” |
Daniel R. Jeske |
Test and Evaluation Challenges Posed by the New DoD 5000.1 Defense Acquisition Directive (Title Only) |
Ernest Seglie, Donald Gaver, and Patricia Jacobs |
Significance of Clusters Based on Correlation Distance (Title Only) |
Harry L. Hurd |
Building a Robust Explanatory Model from a Large Data Set (Title Only) |
David Kim |
Clustering by Local Skewering |
David W. Scott |
Hereditary Portfolio Optimization With Taxes and Fixed Plus Proportional Transaction Costs: A Quasi-Variational HJB Inequality |
Mou-Hsiung Chang |
Cost Estimating Relationship Regression Variance Study (Title Only) |
Donald MacKenzie |
Estimation of Direct-Fire Munition Accuracy Parameters Using the EM Algorithm (Title Only) |
David W. Webb |
Objective Force Urban Operations Agent Based Simulation Experiment Slides |
Lloyd P. Brown and Tom Cioppa |
Evaluation of the Technology Readiness Level for the Autonomous Mobility of the EXperimental Unmanned Vehicle (XUV) (Title Only) |
Barry A. Bodt |
Risk Factors for Dental Caries in the Army Population (Title Only) |
Robyn B. Lee and Georgia dela Cruz |
Parsimonious Survival Analysis Models: Studying Early Attrition in the Armed Services by Frailty and Time-Dependent Survival Analysis |
Yuanzhang Li, Timothy Powers, and Margot Krauss |
The Effect of Dosage Errors and Step Selection Method on the Performance of the Up-and-Down Method Slides |
Douglas R. Sommerville |
Estimating Proportions with Small Samples (Title Only) |
Douglas H. Frank |
Overview, Problem Description, Challenges Slides in “Robust and Resilient Critical Infrastructure” |
Jagdish Chandra |
Risk Assessment: A Game Theoretic Approach Slides in “Robust and Resilient Critical Infrastructure” |
Vicki Bier, Aniruddha Nagaraj, and Vinod Abhichandani |
Distributed Detection with Adversarial and Cooperative Sensors (Title Only) in “Robust and Resilient Critical Infrastructure” |
Nozer Singpurwalla |
Optimal Filtering Techniques for Intrusion Detection (Title Only) in “Robust and Resilient Critical Infrastructure” |
Thomas Kurtz |
Optimizing Performance in Networked Systems Slides in “Robust and Resilient Critical Infrastructure” |
Julien Granger, Ananth Krishnamurthy, and Steve Robinson |
Detecting Meaningful Changes in Short-Term Military Attrition: Application of the Random Effect Model and Agreement Testing |
Yuanzhang Li, Timothy Powers, and Margot Krauss |
Camouflaging Data: An Information Theoretic Perspective (Title Only) |
Sallie Keller-McNulty and Nozer D. Singpurwalla |
Multivariate Equivalent Tests with Lognormal Distributions (Title Only) |
Karen Kafadar |
Adaptive Estimation for Inverse Problems with Noisy Operators (Title Only) |
Nick Hengartner and Laurent Cavalier |