Publications
Export 12 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is O [Clear All Filters]
The ability of wet deposition networks to detect temporal trends." Environmetrics 6 (1995): 327-339.
"Applying classification techniques to remotely-collected program execution data In Proc. ACM SIGSOFT Symposium Foundations of Software Engineering 2005. New York: ACM, 2005.
Combinations of SDC methods for microdata protection." In Privacy in Statistical Databases: CENEX–SDC Project International Conference, PSD 2006 Rome, Italy, December 13–15, 2006 Proceedings, edited by J. Domingo–Ferrer and L. Franconi., 2006.
" "A framework for evaluating the utility of data altered to protect confidentiality." The American Statistician 60 (2006): 224-232.
"Global measures of data utility for microdata masked for disclosure limitation." Journal of Privacy and Confidentiality 1 (2009): 111-124.
"Masking methods that preserve positivity constraints in microdata." J. Statist. Planning Inf. 141 (2010): 31-41.
"Pooled ANOVA." Computational Statistics & Data Analysis 52 (2008): 5215.
"Secure statistical analysis of distributed databases using partially trusted third parties. Manuscript in preparation." In In Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication, edited by D. Olwell, A. G.Wilson and G. Wilson. New York: Springer–Verlag, 2005.
"Shrinking a wet deposition network." Atmospheric Environment 30 (1995): 1347-1357.
"Techniques for classifying executions of deployed software to support software engineering tasks." IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 33 (2007): 287-304.
"Verification servers: enabling analysts to assess the quality of inferences from public use data." Computational Statistics and Data Analysis 53 (2009): 1475-1482.
"