<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Susan Abbatiello</style></author><author><style face="normal" font="default" size="100%">Birgit Schilling</style></author><author><style face="normal" font="default" size="100%">D.R. Mani</style></author><author><style face="normal" font="default" size="100%">L.I. Shilling</style></author><author><style face="normal" font="default" size="100%">S.C. Hall</style></author><author><style face="normal" font="default" size="100%">B. McLean</style></author><author><style face="normal" font="default" size="100%">M. Albetolle</style></author><author><style face="normal" font="default" size="100%">S. Allen</style></author><author><style face="normal" font="default" size="100%">M. Burgess</style></author><author><style face="normal" font="default" size="100%">M.P. Cusack</style></author><author><style face="normal" font="default" size="100%">M Gosh</style></author><author><style face="normal" font="default" size="100%">V Hedrick</style></author><author><style face="normal" font="default" size="100%">J.M. Held</style></author><author><style face="normal" font="default" size="100%">H.D. Inerowicz</style></author><author><style face="normal" font="default" size="100%">A. Jackson</style></author><author><style face="normal" font="default" size="100%">H. Keshishian</style></author><author><style face="normal" font="default" size="100%">C.R. Kinsinger</style></author><author><style face="normal" font="default" size="100%">Lyssand, JS</style></author><author><style face="normal" font="default" size="100%">Makowski L</style></author><author><style face="normal" font="default" size="100%">Mesri M</style></author><author><style face="normal" font="default" size="100%">Rodriguez H</style></author><author><style face="normal" font="default" size="100%">Rudnick P</style></author><author><style face="normal" font="default" size="100%">Sadowski P</style></author><author><style face="normal" font="default" size="100%">Nell Sedransk</style></author><author><style face="normal" font="default" size="100%">Shaddox K</style></author><author><style face="normal" font="default" size="100%">Skates SJ</style></author><author><style face="normal" font="default" size="100%">Kuhn E</style></author><author><style face="normal" font="default" size="100%">Smith D</style></author><author><style face="normal" font="default" size="100%">Whiteaker, JR</style></author><author><style face="normal" font="default" size="100%">Whitwell C</style></author><author><style face="normal" font="default" size="100%">Zhang S</style></author><author><style face="normal" font="default" size="100%">Borchers CH</style></author><author><style face="normal" font="default" size="100%">Fisher SJ</style></author><author><style face="normal" font="default" size="100%">Gibson BW</style></author><author><style face="normal" font="default" size="100%">Liebler DC</style></author><author><style face="normal" font="default" size="100%">M.J. McCoss</style></author><author><style face="normal" font="default" size="100%">Neubert TA</style></author><author><style face="normal" font="default" size="100%">Paulovich AG</style></author><author><style face="normal" font="default" size="100%">Regnier FE</style></author><author><style face="normal" font="default" size="100%">Tempst, P</style></author><author><style face="normal" font="default" size="100%">Carr, SA</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Large-Scale Interlaboratory Study to Develop, Analytically Validate and Apply Highly Multiplexed, Quantitative Peptide Assays to Measure Cancer-Relevant Proteins in Plasma.</style></title><secondary-title><style face="normal" font="default" size="100%">Molecular Cell Proteomics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">09/2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">14</style></volume><pages><style face="normal" font="default" size="100%">2357-74</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;There is an increasing need in biology and clinical medicine to robustly and reliably measure tens to hundreds of peptides and proteins in clinical and biological samples with high sensitivity, specificity, reproducibility, and repeatability. Previously, we demonstrated that LC-MRM-MS with isotope dilution has suitable performance for quantitative measurements of small numbers of relatively abundant proteins in human plasma and that the resulting assays can be transferred across laboratories while maintaining high reproducibility and quantitative precision. Here, we significantly extend that earlier work, demonstrating that 11 laboratories using 14 LC-MS systems can develop, determine analytical figures of merit, and apply highly multiplexed MRM-MS assays targeting 125 peptides derived from 27 cancer-relevant proteins and seven control proteins to precisely and reproducibly measure the analytes in human plasma. To ensure consistent generation of high quality data, we incorporated a system suitability protocol (SSP) into our experimental design. The SSP enabled real-time monitoring of LC-MRM-MS performance during assay development and implementation, facilitating early detection and correction of chromatographic and instrumental problems. Low to subnanogram/ml sensitivity for proteins in plasma was achieved by one-step immunoaffinity depletion of 14 abundant plasma proteins prior to analysis. Median intra- and interlaboratory reproducibility was &amp;lt;20%, sufficient for most biological studies and candidate protein biomarker verification. Digestion recovery of peptides was assessed and quantitative accuracy improved using heavy-isotope-labeled versions of the proteins as internal standards. Using the highly multiplexed assay, participating laboratories were able to precisely and reproducibly determine the levels of a series of analytes in blinded samples used to simulate an interlaboratory clinical study of patient samples. Our study further establishes that LC-MRM-MS using stable isotope dilution, with appropriate attention to analytical validation and appropriate quality control measures, enables sensitive, specific, reproducible, and quantitative measurements of proteins and peptides in complex biological matrices such as plasma.&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">9</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">A. F. Karr</style></author><author><style face="normal" font="default" size="100%">J. Zou</style></author><author><style face="normal" font="default" size="100%">G. S. Datta</style></author><author><style face="normal" font="default" size="100%">S. Grannis</style></author><author><style face="normal" font="default" size="100%">J. Lynch</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Bayesian spatio-temporal approach for real-time detection of disease outbreaks: A case study</style></title><secondary-title><style face="normal" font="default" size="100%">BMC Medical Informatics and Decision Making</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">12/2014</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">14</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><section><style face="normal" font="default" size="100%">108</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Abbatiello, S.</style></author><author><style face="normal" font="default" size="100%">Feng, X.</style></author><author><style face="normal" font="default" size="100%">Sedransk, N.</style></author><author><style face="normal" font="default" size="100%">Mani, DR</style></author><author><style face="normal" font="default" size="100%">Schilling, B</style></author><author><style face="normal" font="default" size="100%">Maclean, B</style></author><author><style face="normal" font="default" size="100%">Zimmerman, LJ</style></author><author><style face="normal" font="default" size="100%">Cusack, MP</style></author><author><style face="normal" font="default" size="100%">Hall, SC</style></author><author><style face="normal" font="default" size="100%">Addona, T</style></author><author><style face="normal" font="default" size="100%">Allen, S</style></author><author><style face="normal" font="default" size="100%">Dodder, NG</style></author><author><style face="normal" font="default" size="100%">Ghosh, M</style></author><author><style face="normal" font="default" size="100%">Held, JM</style></author><author><style face="normal" font="default" size="100%">Hedrick, V</style></author><author><style face="normal" font="default" size="100%">Inerowicz, HD</style></author><author><style face="normal" font="default" size="100%">Jackson, A</style></author><author><style face="normal" font="default" size="100%">Keshishian, H</style></author><author><style face="normal" font="default" size="100%">Kim, JW</style></author><author><style face="normal" font="default" size="100%">Lyssand, JS</style></author><author><style face="normal" font="default" size="100%">Riley, CP</style></author><author><style face="normal" font="default" size="100%">Rudnick, P</style></author><author><style face="normal" font="default" size="100%">Sadowski, P</style></author><author><style face="normal" font="default" size="100%">Shaddox, K</style></author><author><style face="normal" font="default" size="100%">Smith, D</style></author><author><style face="normal" font="default" size="100%">Tomazela, D</style></author><author><style face="normal" font="default" size="100%">Wahlander, A</style></author><author><style face="normal" font="default" size="100%">Waldemarson, S</style></author><author><style face="normal" font="default" size="100%">Whitwell, CA</style></author><author><style face="normal" font="default" size="100%">You, J</style></author><author><style face="normal" font="default" size="100%">Zhang, S</style></author><author><style face="normal" font="default" size="100%">Kinsinger, CR</style></author><author><style face="normal" font="default" size="100%">Mesri, M</style></author><author><style face="normal" font="default" size="100%">Rodriguez, H</style></author><author><style face="normal" font="default" size="100%">Borchers, CH</style></author><author><style face="normal" font="default" size="100%">Buck, C</style></author><author><style face="normal" font="default" size="100%">Fisher, SJ</style></author><author><style face="normal" font="default" size="100%">Gibson, BW</style></author><author><style face="normal" font="default" size="100%">Liebler, D</style></author><author><style face="normal" font="default" size="100%">Maccoss, M</style></author><author><style face="normal" font="default" size="100%">Neubert, TA</style></author><author><style face="normal" font="default" size="100%">Paulovich, A</style></author><author><style face="normal" font="default" size="100%">Regnier, F</style></author><author><style face="normal" font="default" size="100%">Skates, SJ</style></author><author><style face="normal" font="default" size="100%">Tempst, P</style></author><author><style face="normal" font="default" size="100%">Wang, M</style></author><author><style face="normal" font="default" size="100%">Carr, SA</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Design, Implementation and Multisite Evaluation of a System Suitability Protocol for the Quantitative Assessment of Instrument Performance in Liquid Chromatography-Multiple Reaction Monitoring-MS (LC-MRM-MS)</style></title><secondary-title><style face="normal" font="default" size="100%">Molecular and Cellular Proteomics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><volume><style face="normal" font="default" size="100%">12</style></volume><pages><style face="normal" font="default" size="100%">2623-2639</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Multiple reaction monitoring (MRM) mass spectrometry coupled with stable isotope dilution (SID) and liquid chromatography (LC) is increasingly used in biological and clinical studies for precise and reproducible quantification of peptides and proteins in complex sample matrices. Robust LC-SID-MRM-MS-based assays that can be replicated across laboratories and ultimately in clinical laboratory settings require standardized protocols to demonstrate that the analysis platforms are performing adequately. We developed a system suitability protocol (SSP), which employs a predigested mixture of six proteins, to facilitate performance evaluation of LC-SID-MRM-MS instrument platforms, configured with nanoflow-LC systems interfaced to triple quadrupole mass spectrometers. The SSP was designed for use with low multiplex analyses as well as high multiplex approaches when software-driven scheduling of data acquisition is required. Performance was assessed by monitoring of a range of chromatographic and mass spectrometric metrics including peak width, chromatographic resolution, peak capacity, and the variability in peak area and analyte retention time (RT) stability. The SSP, which was evaluated in 11 laboratories on a total of 15 different instruments, enabled early diagnoses of LC and MS anomalies that indicated suboptimal LC-MRM-MS performance. The observed range in variation of each of the metrics scrutinized serves to define the criteria for optimized LC-SID-MRM-MS platforms for routine use, with pass/fail criteria for system suitability performance measures defined as peak area coefficient of variation &amp;lt;0.15, peak width coefficient of variation &amp;lt;0.15, standard deviation of RT &amp;lt;0.15 min (9 s), and the RT drift &amp;lt;0.5min (30 s). The deleterious effect of a marginally performing LC-SID-MRM-MS system on the limit of quantification (LOQ) in targeted quantitative assays illustrates the use and need for a SSP to establish robust and reliable system performance. Use of a SSP helps to ensure that analyte quantification measurements can be replicated with good precision within and across multiple laboratories and should facilitate more widespread use of MRM-MS technology by the basic biomedical and clinical laboratory research communities.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">A. F. Karr</style></author><author><style face="normal" font="default" size="100%">D. L. Banks</style></author><author><style face="normal" font="default" size="100%">G. Datta</style></author><author><style face="normal" font="default" size="100%">J. Lynch</style></author><author><style face="normal" font="default" size="100%">J. Niemi</style></author><author><style face="normal" font="default" size="100%">F. Vera</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Bayesian CAR models for syndromic surveillance on multiple data streams: Theory and practice</style></title><secondary-title><style face="normal" font="default" size="100%">Information Fusion</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Bayes</style></keyword><keyword><style  face="normal" font="default" size="100%">CAR models</style></keyword><keyword><style  face="normal" font="default" size="100%">Gibbs distribution</style></keyword><keyword><style  face="normal" font="default" size="100%">Markov random field</style></keyword><keyword><style  face="normal" font="default" size="100%">Syndromic surveillance</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1016/j.inffus.2009.10.005</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">13</style></volume><pages><style face="normal" font="default" size="100%">105–116</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Syndromic surveillance has, so far, considered only simple models for Bayesian inference. This paper details the methodology for a serious, scalable solution to the problem of combining symptom data from a network of US hospitals for early detection of disease outbreaks. The approach requires high-end Bayesian modeling and significant computation, but the strategy described in this paper appears to be feasible and offers attractive advantages over the methods that are currently used in this area. The method is illustrated by application to ten quarters worth of data on opioid drug abuse surveillance from 636 reporting centers, and then compared to two other syndromic surveillance methods using simulation to create known signal in the drug abuse database.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zou, Jian</style></author><author><style face="normal" font="default" size="100%">Alan F. Karr</style></author><author><style face="normal" font="default" size="100%">Banks, David</style></author><author><style face="normal" font="default" size="100%">Heaton, Matthew J.</style></author><author><style face="normal" font="default" size="100%">Datta, Gauri</style></author><author><style face="normal" font="default" size="100%">Lynch, James</style></author><author><style face="normal" font="default" size="100%">Vera, Francisco</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Bayesian methodology for the analysis of spatial temporal surveillance data</style></title><secondary-title><style face="normal" font="default" size="100%">Statistical Analysis and Data Mining</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">conditional autoregressive process</style></keyword><keyword><style  face="normal" font="default" size="100%">Markov random field</style></keyword><keyword><style  face="normal" font="default" size="100%">spatial statistics</style></keyword><keyword><style  face="normal" font="default" size="100%">spatio-temporal</style></keyword><keyword><style  face="normal" font="default" size="100%">Syndromic surveillance</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1002/sam.10142</style></url></web-urls></urls><number><style face="normal" font="default" size="100%">3</style></number><publisher><style face="normal" font="default" size="100%">Wiley Subscription Services, Inc., A Wiley Company</style></publisher><volume><style face="normal" font="default" size="100%">5</style></volume><pages><style face="normal" font="default" size="100%">194–204</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Early and accurate detection of outbreaks is one of the most important objectives of syndromic surveillance systems. We propose a general Bayesian framework for syndromic surveillance systems. The methodology incorporates Gaussian Markov random field (GMRF) and spatio-temporal conditional autoregressive (CAR) modeling. By contrast, most previous approaches have been based on only spatial or time series models. The model has appealing probabilistic representations as well as attractive statistical properties. Based on extensive simulation studies, the model is capable of capturing outbreaks rapidly, while still limiting false positives. Â© 2012 Wiley Periodicals, Inc. Statistical Analysis and Data Mining 5: 194â€“204, 2012&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hughes-Oliver JM</style></author><author><style face="normal" font="default" size="100%">Brooks A</style></author><author><style face="normal" font="default" size="100%">Welch W</style></author><author><style face="normal" font="default" size="100%">Khaldei MG</style></author><author><style face="normal" font="default" size="100%">Hawkins DM</style></author><author><style face="normal" font="default" size="100%">Young SS</style></author><author><style face="normal" font="default" size="100%">Patil K</style></author><author><style face="normal" font="default" size="100%">Howell GW</style></author><author><style face="normal" font="default" size="100%">Ng RT</style></author><author><style face="normal" font="default" size="100%">Chu MT</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">ChemModLab: A web-based cheminromates modeling laboratory</style></title><secondary-title><style face="normal" font="default" size="100%">Cheminformatics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><volume><style face="normal" font="default" size="100%">11</style></volume><pages><style face="normal" font="default" size="100%">61-81</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;ChemModLab, written by the ECCR @ NCSU consortium under NIH support, is a toolbox for fitting and assessing quantitative structure-activity relationships (QSARs). Its elements are: a cheminformatic front end used to supply molecular descriptors for use in modeling; a set of methods for fitting models; and methods for validating the resulting model. Compounds may be input as structures from which standard descriptors will be calculated using the freely available cheminformatic front end PowerMV; PowerMV also supports compound visualization. In addition, the user can directly input their own choices of descriptors, so the capability for comparing descriptors is effectively unlimited. The statistical methodologies comprise a comprehensive collection of approaches whose validity and utility have been accepted by experts in the fields. As far as possible, these tools are implemented in open-source software linked into the flexible R platform, giving the user the capability of applying many different QSAR modeling methods in a seamless way. As promising new QSAR methodologies emerge from the statistical and data-mining communities, they will be incorporated in the laboratory. The web site also incorporates links to public-domain data sets that can be used as test cases for proposed new modeling methods. The capabilities of ChemModLab are illustrated using a variety of biological responses, with different modeling methodologies being applied to each. These show clear differences in quality of the fitted QSAR model, and in computational requirements. The laboratory is web-based, and use is free. Researchers with new assay data, a new descriptor set, or a new modeling method may readily build QSAR models and benchmark their results against other findings. Users may also examine the diversity of the molecules identified by a QSAR model. Moreover, users have the choice of placing their data sets in a public area to facilitate communication with other researchers; or can keep them hidden to preserve confidentiality.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">M. J. Heaton</style></author><author><style face="normal" font="default" size="100%">A. F. Karr</style></author><author><style face="normal" font="default" size="100%">J. Zou</style></author><author><style face="normal" font="default" size="100%">D. L. Banks</style></author><author><style face="normal" font="default" size="100%">G. Datta</style></author><author><style face="normal" font="default" size="100%">J. Lynch</style></author><author><style face="normal" font="default" size="100%">F. Vera</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A spatio-temporal absorbing state model for disease and syndromic surveillance</style></title><secondary-title><style face="normal" font="default" size="100%">Statistics in Medicine</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><number><style face="normal" font="default" size="100%">19</style></number><volume><style face="normal" font="default" size="100%">31</style></volume><pages><style face="normal" font="default" size="100%">2123-2136</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Reliable surveillance models are an important tool in public health because they aid in mitigating disease outbreaks, identify where and when disease outbreaks occur, and predict future occurrences. Although many statistical models have been devised for surveillance purposes, none are able to simultaneously achieve the important practical goals of good sensitivity and specificity, proper use of covariate information, inclusion of spatio-temporal dynamics, and transparent support to decision-makers. In an effort to achieve these goals, this paper proposes a spatio-temporal conditional autoregressive hidden Markov model with an absorbing state. The model performs well in both a large simulation study and in an application to influenza/pneumonia fatality data.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alan F. Karr</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">H. Chen</style></author><author><style face="normal" font="default" size="100%">L. Brandt</style></author><author><style face="normal" font="default" size="100%">V. Gregg</style></author><author><style face="normal" font="default" size="100%">R. Traunmüller</style></author><author><style face="normal" font="default" size="100%">S. Dawes</style></author><author><style face="normal" font="default" size="100%">E. Hovy</style></author><author><style face="normal" font="default" size="100%">A. Macintosh</style></author><author><style face="normal" font="default" size="100%">C. A. Larson</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Citizen access to government statistical information</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer US</style></publisher><pages><style face="normal" font="default" size="100%">503-529</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Modern electronic technologies have dramatically increased the volume of information collected and assembled by government agencies at all levels. This chapter describes digital government research aimed at keeping government data warehouses from turning into data cemeteries. The products of the research exploit modern electronic technologies in order to allow “ordinary citizens” and researchers access to government-assembled information. The goal is to help ensure that more data also means better and more useful data. Underlying the chapter are three tensions. The first is between comprehensiveness and understandability of information available to non-technically oriented “private citizens.” The second is between ensuring usefulness of detailed statistical information and protecting confidentiality of data subjects. The third tension is between the need to analyze “global” data sets and the reality that government data are distributed among both levels of government and agencies (typically, by the “domain” of data, such as education, health, or transportation).&lt;/p&gt;
</style></abstract><section><style face="normal" font="default" size="100%">25</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">A. F. Karr</style></author><author><style face="normal" font="default" size="100%">A. Oganyan</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">J. Domingo–Ferrer</style></author><author><style face="normal" font="default" size="100%">L. Franconi</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Combinations of SDC methods for microdata protection</style></title><secondary-title><style face="normal" font="default" size="100%">Privacy in Statistical Databases: CENEX–SDC Project International Conference, PSD 2006 Rome, Italy, December 13–15, 2006 Proceedings</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Duncan, George T.</style></author><author><style face="normal" font="default" size="100%">Stokes, S. Lynne</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Disclosure Risk vs Data Utility: The R-U Confidentiality Map</style></title><secondary-title><style face="normal" font="default" size="100%">Chance</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><edition><style face="normal" font="default" size="100%">3</style></edition><volume><style face="normal" font="default" size="100%">17</style></volume><pages><style face="normal" font="default" size="100%">16-20</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Adrian Dobra</style></author><author><style face="normal" font="default" size="100%">Stephen E. Fienberg</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">How Large Is the World Wide Web?</style></title><secondary-title><style face="normal" font="default" size="100%">Web Dynamics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-3-662-10874-1_2</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Springer Berlin Heidelberg</style></publisher><pages><style face="normal" font="default" size="100%">23-43</style></pages><isbn><style face="normal" font="default" size="100%">978-3-642-07377-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;There are many metrics one could consider for estimating the size of the World Wide Web, and in the present chapter we focus on size in terms of the number N of Web pages. Since a database with all the valid URLs on the Web cannot be constructed and maintained, determining N by counting is impossible. For the same reasons, estimating N by directly sampling from the Web is also infeasible. Instead of studying the Web as a whole, one can try to assess the size of the publicly indexable Web, which is the part of the Web that is considered for indexing by the major search engines. Several groups of researchers have invested considerable efforts to develop sound sampling schemes that involve submitting a number of queries to several major search engines. Lawrence and Giles [8] developed a procedure for sampling Web documents by submitting various queries to a number of search engines. We contrast their study with the one performed by Bharat and Broder [2] in November 1997. Although both experiments took place almost in the same period of time, their estimates are significantly different. In this chapter we review how the size of the indexable Web was estimated by three groups of researchers using three different statistical models: Lawrence and Giles 18, 9], Bharat and Broder [2] and Bradlow and Schmittlein 13]. Then we present a statistical framework for the analysis of data sets collected by query-based sampling, utilizing a hierarchical Bayes formulation of the Rasch model for multiple list population estimation developed in 16]. We explain why this approach seems to be in reasonable accord with the real-world constraints and thus allows us to make credible inferences about the size of the Web. We give two different methods that lead to credible estimates of the size of the Web in a reasonable amount of time and are also consistent with the real-world constraints.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">A. Dobra</style></author><author><style face="normal" font="default" size="100%">S. E. Fienberg</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Bounding entries in multi-way contingency tables given a set of marginal totals</style></title><secondary-title><style face="normal" font="default" size="100%">Foundations of Statistical Inference, Proceedings of the Shoresh Conference 2000</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><publisher><style face="normal" font="default" size="100%">Spr</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Adrian Dobra</style></author><author><style face="normal" font="default" size="100%">Stephen E. Fienberg</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Haitovsky, Yoel</style></author><author><style face="normal" font="default" size="100%">Ritov, Yaacov</style></author><author><style face="normal" font="default" size="100%">Lerche, HansRudolf</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Bounding Entries in Multi-way Contingency Tables Given a Set of Marginal Totals</style></title><secondary-title><style face="normal" font="default" size="100%">Foundations of Statistical Inference</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Contributions to Statistics</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-3-642-57410-8_1</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Physica-Verlag HD</style></publisher><pages><style face="normal" font="default" size="100%">3-16</style></pages><isbn><style face="normal" font="default" size="100%">978-3-7908-0047-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;We describe new results for sharp upper and lower bounds on the entries in multi-way tables of counts based on a set of released and possibly overlapping marginal tables. In particular, we present a generalized version of the shuttle algorithm proposed by Buzzigoli and Giusti that computes sharp integer bounds for an arbitrary set of fixed marginals. We also present two examples which illustrate the practical import of the bounds for assessing disclosure risk.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">A. Dobra</style></author><author><style face="normal" font="default" size="100%">E. A. Erosheva</style></author><author><style face="normal" font="default" size="100%">S. E. Fienberg</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Disclosure limitation methods based on bounds for large contingency tables with application to disability data</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of Conference on New Frontiers of Statistical Data Mining</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><publisher><style face="normal" font="default" size="100%">CRC Press</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Adrian Dobra</style></author><author><style face="normal" font="default" size="100%">Alan F. Karr</style></author><author><style face="normal" font="default" size="100%">Ashish P. Sanil</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Preserving confidentiality of high-dimensional tabular data: Statistical and computational issues</style></title><secondary-title><style face="normal" font="default" size="100%">STATISTICS AND COMPUTING</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><number><style face="normal" font="default" size="100%">7</style></number><volume><style face="normal" font="default" size="100%">8</style></volume><pages><style face="normal" font="default" size="100%">363–370</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Liu L</style></author><author><style face="normal" font="default" size="100%">Hawkins DM</style></author><author><style face="normal" font="default" size="100%">Ghosh S</style></author><author><style face="normal" font="default" size="100%">Young SS</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Robust singular value decomposition analysis of microarray data</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the National Academy of Sciences</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><volume><style face="normal" font="default" size="100%">100</style></volume><pages><style face="normal" font="default" size="100%">13167-13172</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alan F. Karr</style></author><author><style face="normal" font="default" size="100%">Adrian Dobra</style></author><author><style face="normal" font="default" size="100%">Ashish P. Sanil</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Table servers protect confidentiality in tabular data releases</style></title><secondary-title><style face="normal" font="default" size="100%">Comm. ACM</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">57–58</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dobra, A.,</style></author><author><style face="normal" font="default" size="100%">Fienberg, S.E.,</style></author><author><style face="normal" font="default" size="100%">Trottini , M</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Assessing the Risk of Disclosure of Confidential Categorical Data</style></title><secondary-title><style face="normal" font="default" size="100%">Bayesian Statistics 7, Proceedings of the Seventh Valencia International Meeting on Bayesian Statistics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><publisher><style face="normal" font="default" size="100%">Oxford Press</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">A. Dobra</style></author><author><style face="normal" font="default" size="100%">S. E. Fienberg</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Bounding entries in multi-way contingency tables given a set of marginal totals</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of Conference on Foundation of Statistical Inference and Its Applications, Jerusalem</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer-Verlag</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">A. F. Karr</style></author><author><style face="normal" font="default" size="100%">A. Dobra</style></author><author><style face="normal" font="default" size="100%">A. P. Sanil</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Optimal tabular releases from confidential data</style></title><secondary-title><style face="normal" font="default" size="100%">Proc. dgo.2002, National Conference on Digital Government Research</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Adrian Dobra</style></author><author><style face="normal" font="default" size="100%">Alan F. Karr</style></author><author><style face="normal" font="default" size="100%">Ashish P. Sanil</style></author><author><style face="normal" font="default" size="100%">Stephen E. Fienberg</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Software Systems for Tabular Data Releases</style></title><secondary-title><style face="normal" font="default" size="100%">Int. Journal of Uncertainty, Fuzziness and Knowledge Based Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><number><style face="normal" font="default" size="100%">5</style></number><volume><style face="normal" font="default" size="100%">10</style></volume><pages><style face="normal" font="default" size="100%">529-544</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alan Karr</style></author><author><style face="normal" font="default" size="100%">William DuMouchel</style></author><author><style face="normal" font="default" size="100%">Wen-Hua Ju</style></author><author><style face="normal" font="default" size="100%">Martin Theus</style></author><author><style face="normal" font="default" size="100%">Yehuda Vardi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Computer intrusion: detecting masqueraders</style></title><secondary-title><style face="normal" font="default" size="100%">Statistical Science</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Anomaly</style></keyword><keyword><style  face="normal" font="default" size="100%">Bayes</style></keyword><keyword><style  face="normal" font="default" size="100%">compression</style></keyword><keyword><style  face="normal" font="default" size="100%">computer security</style></keyword><keyword><style  face="normal" font="default" size="100%">high-orderMarkov</style></keyword><keyword><style  face="normal" font="default" size="100%">profiling</style></keyword><keyword><style  face="normal" font="default" size="100%">Unix</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">16</style></volume><pages><style face="normal" font="default" size="100%">1-17</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Masqueraders in computer intrusion detection are people who use somebody else?s computer account. We investigate a number of statistical approaches for detecting masqueraders. To evaluate them, we collected UNIX command data from 50 users and then contaminated the data with masqueraders. The experiment was blinded. We show results from six methods, including two approaches from the computer science community.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Adrian Dobra</style></author><author><style face="normal" font="default" size="100%">Stephen E. Fienberg</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Bounds for Cell Entries in Contingency Tables Given Marginal Totals and Decomposable Graphs</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the National Academy of Sciences of the United States of America</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><volume><style face="normal" font="default" size="100%">97</style></volume><pages><style face="normal" font="default" size="100%">11885-11892</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Upper and lower bounds on cell counts in cross-classifications of nonnegative counts play important roles in a number of practical problems, inclusing statistical disclosure limitation, computer tomography, mass transportation, cell suppression, and data swapping. Some features of the Frechet bounds are well known, intuitive, and regularly used by those working on disclosure limitation methods, especially those for two-dimensional tables. We previously have described a series of results relating these bounds to theory on loglinear models for cross-classified counts. This paper provides the actual theory and proofs for the special case of decomposable loglinear models and their related independence graphs. It also includes an extension linked to the structure of reducible graphs and a discussion of the relevance of other results linked to nongraphical loglinear models.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">RICHARD L. SMITH</style></author><author><style face="normal" font="default" size="100%">J.M. Davis</style></author><author><style face="normal" font="default" size="100%">Jerome Sacks</style></author><author><style face="normal" font="default" size="100%">Speckman, Paul</style></author><author><style face="normal" font="default" size="100%">P. Styer</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Regression models for air pollution and daily mortality: analysis of data from Birmingham, Alabama</style></title><secondary-title><style face="normal" font="default" size="100%">Environmetrics</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Air Pollutants/adverse effects</style></keyword><keyword><style  face="normal" font="default" size="100%">Air Pollutants/analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">Air Pollution/adverse effects</style></keyword><keyword><style  face="normal" font="default" size="100%">Air Pollution/analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">Air Pollution/statistics &amp; numerical data</style></keyword><keyword><style  face="normal" font="default" size="100%">Alabama/epidemiology</style></keyword><keyword><style  face="normal" font="default" size="100%">Humans</style></keyword><keyword><style  face="normal" font="default" size="100%">Mortality</style></keyword><keyword><style  face="normal" font="default" size="100%">Poisson Distribution</style></keyword><keyword><style  face="normal" font="default" size="100%">Regression Analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">Sensitivity and Specificity</style></keyword><keyword><style  face="normal" font="default" size="100%">Statistical Models</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><volume><style face="normal" font="default" size="100%">11</style></volume><pages><style face="normal" font="default" size="100%">719-743</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Several recent studies have reported associations between common levels of particulate air pollution and small increases in daily mortality. This study examined whether a similar association could be found in the southern United States, with different weather patterns than the previous studies, and examined the sensitivity of the results to different methods of analysis and covariate control. Data were available in Birmingham, Alabama, from August 1985 through 1988. Regression analyses controlled for weather, time trends, day of the week, and year of study and removed any long-term patterns (such as seasonal and monthly fluctuations) from the data by trigonometric filtering. A significant association was found between inhalable particles and daily mortality in Poisson regression analysis (relative risk = 1.11, 95% confidence interval 1.02-1.20). The relative risk was estimated for a 100-micrograms/m3 increase in inhalable particles. Results were unchanged when least squares regression was used, when robust regression was used, and under an alternative filtering scheme. Diagnostic plots showed that the filtering successfully removed long wavelength patterns from the data. The generalized additive model, which models the expected number of deaths as nonparametric smoothed functions of the covariates, was then used to ensure adequate control for any nonlinearities in the weather dependence. Essentially identical results for inhalable particles were seen, with no evidence of a threshold down to the lowest observed exposure levels. The association also was unchanged when all days with particulate air pollution levels in excess of the National Ambient Air Quality Standards were deleted. The magnitude of the effect is consistent with recent estimates from Philadelphia, Steubenville, Detroit, Minneapolis, St. Louis, and Utah Valley.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">A. F. Karr</style></author><author><style face="normal" font="default" size="100%">C.-M. Aldea</style></author><author><style face="normal" font="default" size="100%">S. P. Shah</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">P. C. Aïtcin</style></author><author><style face="normal" font="default" size="100%">Y. Delagrave</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Permeability of cracked high strength concrete</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the International Symposium on High Performance and Reactive Powder Concretes</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><pages><style face="normal" font="default" size="100%">211-219</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The goal of the research presented here was to study the relationship between cracking and water permeability. A feedback-controlled test was used to generate width-controlled cracks. Water permeability was evaluated by a low-pressure water permeability test. The factors chosen for the experimental design were material type (paste, mortar, normal and high strength concrete), thickness of the sample and average width of the induced cracks (ranging from 50 to 350 micrometers). The water permeability test results indicated that the relationships between permeability and material type differ for uncracked and cracked material, and that there was little thickness effect. Permeability of uncracked material decreased from paste, mortar, normal strength concrete (NSC) to high strength concrete (HSC). Water permeability of cracked material significantly increased with increasing crack width. For cracks above 100 microns, NSC showed the highest permeability coefficient, where as mortar showed the lowest one.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aslett, Robert</style></author><author><style face="normal" font="default" size="100%">Buck, Robert J.</style></author><author><style face="normal" font="default" size="100%">Duvall, Steven G.</style></author><author><style face="normal" font="default" size="100%">Jerome Sacks</style></author><author><style face="normal" font="default" size="100%">Welch, William J.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Circuit optimization via sequential computer experiments: design of an output buffer</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of the Royal Statistical Society: Series C</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Circuit simulator</style></keyword><keyword><style  face="normal" font="default" size="100%">Computer code</style></keyword><keyword><style  face="normal" font="default" size="100%">Computer model</style></keyword><keyword><style  face="normal" font="default" size="100%">Engineering design</style></keyword><keyword><style  face="normal" font="default" size="100%">Parameter design</style></keyword><keyword><style  face="normal" font="default" size="100%">Stochastic process</style></keyword><keyword><style  face="normal" font="default" size="100%">Visualization</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">1998</style></year></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">31-48</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In electrical engineering, circuit designs are now often optimized via circuit simulation computer models. Typically, many response variables characterize the circuit’s performance. Each response is a function of many input variables, including factors that can be set in the engineering design and noise factors representing manufacturing conditions. We describe a modelling approach which is appropriate for the simulator’s deterministic input–output relationships. Non-linearities and interactions are identified without explicit assumptions about the functional form. These models lead to predictors to guide the reduction of the ranges of the designable factors in a sequence of experiments. Ultimately, the predictors are used to optimize the engineering design. We also show how a visualization of the fitted relationships facilitates an understanding of the engineering trade-offs between responses. The example used to demonstrate these methods, the design of a buffer circuit, has multiple targets for the responses, representing different trade-offs between the key performance measures.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Williams, Valerie</style></author><author><style face="normal" font="default" size="100%">Billeaud, Kathleen</style></author><author><style face="normal" font="default" size="100%">Davis, Lori A.</style></author><author><style face="normal" font="default" size="100%">Thissen, David</style></author><author><style face="normal" font="default" size="100%">Sanford, Eleanor E.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Projecting to the NAEP Scale: Results from the North Carolina End-of-Grade Testing Program</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Educational Measurement</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">277-296</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Data from the North Carolina End-of-Grade test of eighth-grade mathematics are used to estimate the achievement results on the scale of the National Assessment of Educational Progress (NAEP) Trial State Assessment. Linear regression models are used to develop projection equations to predict state NAEP results in the future, and the results of such predictions are compared with those obtained in the 1996 administration of NAEP. Standard errors of the parameter estimates are obtained using a bootstrap resampling technique.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Xie, Minge</style></author><author><style face="normal" font="default" size="100%">Simpson, Douglas G</style></author><author><style face="normal" font="default" size="100%">Carroll, Raymond J.</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Gregoire, Timothy G.</style></author><author><style face="normal" font="default" size="100%">Brillinger, David R.</style></author><author><style face="normal" font="default" size="100%">Diggle, PeterJ.</style></author><author><style face="normal" font="default" size="100%">Russek-Cohen, Estelle</style></author><author><style face="normal" font="default" size="100%">Warren, William G.</style></author><author><style face="normal" font="default" size="100%">Wolfinger, Russell D.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Scaled Link Functions for Heterogeneous Ordinal Response Data*</style></title><secondary-title><style face="normal" font="default" size="100%">Modelling Longitudinal and Spatially Correlated Data</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Statistics</style></tertiary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Aggregated observations</style></keyword><keyword><style  face="normal" font="default" size="100%">Generalized likelihood inference</style></keyword><keyword><style  face="normal" font="default" size="100%">Marginal modeling approach</style></keyword><keyword><style  face="normal" font="default" size="100%">Ordinal regression</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">1997</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-1-4612-0699-6_3</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Springer New York</style></publisher><volume><style face="normal" font="default" size="100%">122</style></volume><pages><style face="normal" font="default" size="100%">23-36</style></pages><isbn><style face="normal" font="default" size="100%">978-0-387-98216-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This paper describes a class ordinal regression models in which the link function has scale parameters that may be estimated along with the regression parameters. One motivation is to provide a plausible model for group level categorical responses. In this case a natural class of scaled link functions is obtained by treating the group level responses as threshold averages of possible correlated latent individual level variables. We find scaled link functions also arise naturally in other circumstances. Our methodology is illustrated through environmental risk assessment data where (correlated) individual level responses and group level responses are mixed.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">P. Styer</style></author><author><style face="normal" font="default" size="100%">McMillan, N</style></author><author><style face="normal" font="default" size="100%">Gao, F</style></author><author><style face="normal" font="default" size="100%">Davis, J</style></author><author><style face="normal" font="default" size="100%">Jerome Sacks</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Effect of outdoor airborne particulate matter on daily death count</style></title><secondary-title><style face="normal" font="default" size="100%">Environmental Health Perspectives</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1995</style></year></dates><volume><style face="normal" font="default" size="100%">103</style></volume><pages><style face="normal" font="default" size="100%">490–497</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;To investigate the possible relationship between airborne particulate matter and mortality, we developed regression models of daily mortality counts using meteorological covariates and measures of outdoor PM10. Our analyses included data from Cook County, Illinois, and Salt Lake County, Utah. We found no evidence that particulate matter &amp;lt; or = 10 microns (PM10) contributes to excess mortality in Salt Lake County, Utah. In Cook County, Illinois, we found evidence of a positive PM10 effect in spring and autumn, but not in winter and summer. We conclude that the reported effects of particulates on mortality are unconfirmed.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">de Leeuw, Jan</style></author><author><style face="normal" font="default" size="100%">Kreft, Ita G.G.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Questioning Multilevel Models</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Educational and Behavioral Statistics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1995</style></year></dates><volume><style face="normal" font="default" size="100%">20</style></volume><pages><style face="normal" font="default" size="100%">171-189</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In this article, practical problems with multilevel techniques are discussed. These problems, brought to our attention by the National Center for Education Statistics (NCES), have to do with terminology, computer programs employing different algorithms, and interpretations of the coefficients in one or two steps. We discuss the usefulness of the hierarchical linear model (HM) in the most common situation in education-that of a large number of relatively small groups. We also point to situations where the more complicated HMs can be replaced with simpler models, with statistical properties that are easier to study. We conclude that more studies need to be done to establish the claimed superiority of restricted versus unrestricted maximum likelihood, to study the effects of shrinkage on the estimators, and to explore the merits of simpler methods such as weighted least squares. Finally, distinctions must be made between choice of model, choice of technique, choice of algorithm, and choice of computer program. While HMs are an elegant conceptualization, they are not always necessary. Traditional techniques perform as well, or better, if there are large groups and small intraclass correlations, and if the researcher is interested only in the fixed-level regression coefficients.&lt;/p&gt;
</style></abstract></record></records></xml>