Publications
Export 12 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is O [Clear All Filters]
Combinations of SDC methods for microdata protection." In Privacy in Statistical Databases: CENEX–SDC Project International Conference, PSD 2006 Rome, Italy, December 13–15, 2006 Proceedings, edited by J. Domingo–Ferrer and L. Franconi., 2006.
"Secure statistical analysis of distributed databases using partially trusted third parties. Manuscript in preparation." In In Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication, edited by D. Olwell, A. G.Wilson and G. Wilson. New York: Springer–Verlag, 2005.
"Applying classification techniques to remotely-collected program execution data In Proc. ACM SIGSOFT Symposium Foundations of Software Engineering 2005. New York: ACM, 2005.
The ability of wet deposition networks to detect temporal trends." Environmetrics 6 (1995): 327-339.
"The Common Core Writing Standards: A descriptive study of content and alignment with a sample of former state standards." Reading Horizons (2016).
"A framework for evaluating the utility of data altered to protect confidentiality." The American Statistician 60 (2006): 224-232.
"Global measures of data utility for microdata masked for disclosure limitation." Journal of Privacy and Confidentiality 1 (2009): 111-124.
"Masking methods that preserve positivity constraints in microdata." J. Statist. Planning Inf. 141 (2010): 31-41.
"Pooled ANOVA." Computational Statistics & Data Analysis 52 (2008): 5215.
"Shrinking a wet deposition network." Atmospheric Environment 30 (1995): 1347-1357.
"Techniques for classifying executions of deployed software to support software engineering tasks." IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 33 (2007): 287-304.
"Verification servers: enabling analysts to assess the quality of inferences from public use data." Computational Statistics and Data Analysis 53 (2009): 1475-1482.
"