<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Troia, G. A.</style></author><author><style face="normal" font="default" size="100%">Olinghouse, N. G.</style></author><author><style face="normal" font="default" size="100%">Wilson, J.</style></author><author><style face="normal" font="default" size="100%">Stewart, K. O.</style></author><author><style face="normal" font="default" size="100%">Mo, Y.</style></author><author><style face="normal" font="default" size="100%">Hawkins, L.</style></author><author><style face="normal" font="default" size="100%">Kopke, R.A.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Common Core Writing Standards: A descriptive study of content and alignment with a sample of former state standards</style></title><secondary-title><style face="normal" font="default" size="100%">Reading Horizons</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">A. F. Karr</style></author><author><style face="normal" font="default" size="100%">A. Oganian</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Masking methods that preserve positivity constraints in microdata</style></title><secondary-title><style face="normal" font="default" size="100%">J. Statist. Planning Inf.</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">constraints</style></keyword><keyword><style  face="normal" font="default" size="100%">Positivity</style></keyword><keyword><style  face="normal" font="default" size="100%">SDL method</style></keyword><keyword><style  face="normal" font="default" size="100%">Statistical disclosure limitation (SDL)</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">141</style></volume><pages><style face="normal" font="default" size="100%">31-41</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Statistical agencies have conflicting obligations to protect confidential information provided by respondents to surveys or censuses and to make data available for research and planning activities. When the microdata themselves are to be released, in order to achieve these conflicting objectives, statistical agencies apply statistical disclosure limitation (SDL) methods to the data, such as noise addition, swapping or microaggregation. Some of these methods do not preserve important structure and constraints in the data, such as positivity of some attributes or inequality constraints between attributes. Failure to preserve constraints is not only problematic in terms of data utility, but also may increase disclosure risk. In this paper, we describe a method for SDL that preserves both positivity of attributes and the mean vector and covariance matrix of the original data. The basis of the method is to apply multiplicative noise with the proper, data-dependent covariance structure.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">A. F. Karr</style></author><author><style face="normal" font="default" size="100%">A. Oganyan</style></author><author><style face="normal" font="default" size="100%">J. P. Reiter</style></author><author><style face="normal" font="default" size="100%">M.-J. Woo</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Global measures of data utility for microdata masked for disclosure limitation</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Privacy and Confidentiality</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><volume><style face="normal" font="default" size="100%">1</style></volume><pages><style face="normal" font="default" size="100%">111-124</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">J. P. Reiter</style></author><author><style face="normal" font="default" size="100%">A. Oganyan</style></author><author><style face="normal" font="default" size="100%">A. F. Karr</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Verification servers: enabling analysts to assess the quality of inferences from public use data</style></title><secondary-title><style face="normal" font="default" size="100%">Computational Statistics and Data Analysis</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><number><style face="normal" font="default" size="100%">4</style></number><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">1475-1482</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;To protect confidentiality, statistical agencies typically alter data before releasing them to the public. Ideally, although generally not done, the agency also provides a way for secondary data analysts to assess the quality of inferences obtained with the released data. Quality measures can help secondary data analysts to identify inaccurate conclusions resulting from the disclosure limitation procedures, as well as have confidence in accurate conclusions. We propose a framework for an interactive, web-based system that analysts can query for measures of inferential quality. As we illustrate, agencies seeking to build such systems must consider the additional disclosure risks from releasing quality measures. We suggest some avenues of research on limiting these risks.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michael Last</style></author><author><style face="normal" font="default" size="100%">Gheorghe Luta</style></author><author><style face="normal" font="default" size="100%">Alex Orso</style></author><author><style face="normal" font="default" size="100%">Adam Porter</style></author><author><style face="normal" font="default" size="100%">Stan Young</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Pooled ANOVA</style></title><secondary-title><style face="normal" font="default" size="100%">Computational Statistics &amp; Data Analysis</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><volume><style face="normal" font="default" size="100%">52</style></volume><pages><style face="normal" font="default" size="100%">5215</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Murali Haran</style></author><author><style face="normal" font="default" size="100%">Alan Karr</style></author><author><style face="normal" font="default" size="100%">Michael Last</style></author><author><style face="normal" font="default" size="100%">Alessandro Orso</style></author><author><style face="normal" font="default" size="100%">Adam A. Porter</style></author><author><style face="normal" font="default" size="100%">Ashish Sanil</style></author><author><style face="normal" font="default" size="100%">Sandro Fouché</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Techniques for classifying executions of deployed software to support software engineering tasks</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE TRANSACTIONS ON SOFTWARE ENGINEERING</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><number><style face="normal" font="default" size="100%">5</style></number><volume><style face="normal" font="default" size="100%">33</style></volume><pages><style face="normal" font="default" size="100%">287-304</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">A. F. Karr</style></author><author><style face="normal" font="default" size="100%">A. Oganyan</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">J. Domingo–Ferrer</style></author><author><style face="normal" font="default" size="100%">L. Franconi</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Combinations of SDC methods for microdata protection</style></title><secondary-title><style face="normal" font="default" size="100%">Privacy in Statistical Databases: CENEX–SDC Project International Conference, PSD 2006 Rome, Italy, December 13–15, 2006 Proceedings</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">A. F. Karr</style></author><author><style face="normal" font="default" size="100%">C. N. Kohnen</style></author><author><style face="normal" font="default" size="100%">A. Oganyan</style></author><author><style face="normal" font="default" size="100%">J. P. Reiter</style></author><author><style face="normal" font="default" size="100%">A. P. Sanil</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A framework for evaluating the utility of data altered to protect confidentiality</style></title><secondary-title><style face="normal" font="default" size="100%">The American Statistician</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><number><style face="normal" font="default" size="100%">3</style></number><volume><style face="normal" font="default" size="100%">60</style></volume><pages><style face="normal" font="default" size="100%">224-232</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">A. F. Karr</style></author><author><style face="normal" font="default" size="100%">M. Haran</style></author><author><style face="normal" font="default" size="100%">A. A. Porter</style></author><author><style face="normal" font="default" size="100%">A. Orso</style></author><author><style face="normal" font="default" size="100%">A. P. Sanil</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Applying classification techniques to remotely-collected program execution data</style></title><secondary-title><style face="normal" font="default" size="100%">Proc. ACM SIGSOFT Symposium Foundations of Software Engineering 2005</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pub-location><style face="normal" font="default" size="100%">New York</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alan F. Karr</style></author><author><style face="normal" font="default" size="100%">Xiaodong Lin</style></author><author><style face="normal" font="default" size="100%">Ashish P. Sanil</style></author><author><style face="normal" font="default" size="100%">Jerome P. Reiter</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">D. Olwell</style></author><author><style face="normal" font="default" size="100%">A. G.Wilson</style></author><author><style face="normal" font="default" size="100%">G. Wilson</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Secure statistical analysis of distributed databases using partially trusted third parties. Manuscript in preparation</style></title><secondary-title><style face="normal" font="default" size="100%">In Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer–Verlag</style></publisher><pub-location><style face="normal" font="default" size="100%">New York</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oehlert, Gary W.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The ability of wet deposition networks to detect temporal trends</style></title><secondary-title><style face="normal" font="default" size="100%">Environmetrics</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">discrete smoothing</style></keyword><keyword><style  face="normal" font="default" size="100%">wet deposition networks</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">1995</style></year></dates><volume><style face="normal" font="default" size="100%">6</style></volume><pages><style face="normal" font="default" size="100%">327–339</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;We use the spatial/temporal model developed in Oehlert (1993) to estimate the detectability of trends in wet-deposition sulphate. Precipitation volume adjustments of sulphate concentration dramatically improve the detectability and quantifiability of trends. Anticipated decreases in sulphate of about 30 per cent in the Eastern U.S. by 2005 predicted by models should be detectable much earlier, say, 1997, but accurate quantification of the true decrease will require several additional years of monitoring. It is possible to delete a few stations from the East without materially affecting the detectability or quantifiability of trends. Careful siting of new stations can provide substantial improvement to regional trend estimation.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oehlert, Gary W.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Shrinking a wet deposition network</style></title><secondary-title><style face="normal" font="default" size="100%">Atmospheric Environment</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Monitoring network</style></keyword><keyword><style  face="normal" font="default" size="100%">network design</style></keyword><keyword><style  face="normal" font="default" size="100%">spatial smoothing</style></keyword><keyword><style  face="normal" font="default" size="100%">trend analysis</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">1995</style></year></dates><volume><style face="normal" font="default" size="100%">30</style></volume><pages><style face="normal" font="default" size="100%">1347–1357</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Suppose that we must delete stations from a monitoring network. Which stations should be deleted if we wish the remaining network to have the smallest possible trend estimate variances? We use the spatial-temporal model described in Oehlert (1993, J. Am. Statist. Assoc., 88, 390–399), to model concentration of sulfate in wet deposition. Based on this model and three criteria, we choose good sets of candidate stations for deletion from the NADP/NTN network. We use the criteria: that the sum of 11 regional trend estimate variances be as small as possible, that the sum of local trend estimation variance be as small as possible, and that the sum of local mean estimation variance be as small as possible. Good choices of stations for deletion result in a modest increase in criteria (about 7 to 34%) for 100 stations deleted from the network, while random sets of 100 stations can increase criteria by a factor of two or more.&lt;/p&gt;
</style></abstract></record></records></xml>