{\rtf1\ansi\deff0\deftab360

{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}

{\colortbl;
\red0\green0\blue0;
}

{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}

\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
Troia, G. A., N. G. Olinghouse, J. Wilson, K. O. Stewart, Y. Mo, L. Hawkins, and R.A. Kopke. "The Common Core Writing Standards: A descriptive study of content and alignment with a sample of former state standards." \i Reading Horizons\i0  (2016).\par \par Karr, A. F., and A. Oganian. "Masking methods that preserve positivity constraints in microdata." \i J. Statist. Planning Inf.\i0  141 (2010): 31-41.\par \par Karr, A. F., A. Oganyan, J. P. Reiter, and M.-J. Woo. "Global measures of data utility for microdata masked for disclosure limitation." \i Journal of Privacy and Confidentiality\i0  1 (2009): 111-124.\par \par Reiter, J. P., A. Oganyan, and A. F. Karr. "Verification servers: enabling analysts to assess the quality of inferences from public use data." \i Computational Statistics and Data Analysis\i0  53 (2009): 1475-1482.\par \par Last, Michael, Gheorghe Luta, Alex Orso, Adam Porter, and Stan Young. "Pooled ANOVA." \i Computational Statistics & Data Analysis\i0  52 (2008): 5215.\par \par Haran, Murali, Alan Karr, Michael Last, Alessandro Orso, Adam A. Porter, Ashish Sanil, and Sandro Fouch\'e9. "Techniques for classifying executions of deployed software to support software engineering tasks." \i IEEE TRANSACTIONS ON SOFTWARE ENGINEERING\i0  33 (2007): 287-304.\par \par Karr, A. F., and A. Oganyan. "\i Combinations of SDC methods for microdata protection\i0 ." In \i Privacy in Statistical Databases: CENEX?SDC Project International Conference, PSD 2006 Rome, Italy, December 13?15, 2006 Proceedings\i0 , edited by J. Domingo?Ferrer and L. Franconi., 2006.\par \par Karr, A. F., C. N. Kohnen, A. Oganyan, J. P. Reiter, and A. P. Sanil. "A framework for evaluating the utility of data altered to protect confidentiality." \i The American Statistician\i0  60 (2006): 224-232.\par \par Karr, A. F., M. Haran, A. A. Porter, A. Orso, and A. P. Sanil. \i Applying classification techniques to remotely-collected program execution data\i0  In \i Proc. ACM SIGSOFT Symposium Foundations of Software Engineering 2005\i0 . New York: ACM, 2005.\par \par Karr, Alan F., Xiaodong Lin, Ashish P. Sanil, and Jerome P. Reiter. "\i Secure statistical analysis of distributed databases using partially trusted third parties. Manuscript in preparation\i0 ." In \i In Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication\i0 , edited by D. Olwell, A. G.Wilson and G. Wilson. New York: Springer?Verlag, 2005.\par \par Oehlert, Gary W. "The ability of wet deposition networks to detect temporal trends." \i Environmetrics\i0  6 (1995): 327-339.\par \par Oehlert, Gary W. "Shrinking a wet deposition network." \i Atmospheric Environment\i0  30 (1995): 1347-1357.\par \par }