Publications
Export 12 results:
Author Title Type [ Year
Filters: First Letter Of Last Name is O [Clear All Filters]
The ability of wet deposition networks to detect temporal trends." Environmetrics 6 (1995): 327-339.
"Shrinking a wet deposition network." Atmospheric Environment 30 (1995): 1347-1357.
"Applying classification techniques to remotely-collected program execution data In Proc. ACM SIGSOFT Symposium Foundations of Software Engineering 2005. New York: ACM, 2005.
Secure statistical analysis of distributed databases using partially trusted third parties. Manuscript in preparation." In In Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication, edited by D. Olwell, A. G.Wilson and G. Wilson. New York: Springer–Verlag, 2005.
"Combinations of SDC methods for microdata protection." In Privacy in Statistical Databases: CENEX–SDC Project International Conference, PSD 2006 Rome, Italy, December 13–15, 2006 Proceedings, edited by J. Domingo–Ferrer and L. Franconi., 2006.
"A framework for evaluating the utility of data altered to protect confidentiality." The American Statistician 60 (2006): 224-232.
"Techniques for classifying executions of deployed software to support software engineering tasks." IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 33 (2007): 287-304.
"Pooled ANOVA." Computational Statistics & Data Analysis 52 (2008): 5215.
"Global measures of data utility for microdata masked for disclosure limitation." Journal of Privacy and Confidentiality 1 (2009): 111-124.
"Verification servers: enabling analysts to assess the quality of inferences from public use data." Computational Statistics and Data Analysis 53 (2009): 1475-1482.
"Masking methods that preserve positivity constraints in microdata." J. Statist. Planning Inf. 141 (2010): 31-41.
"