Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining Branching Rules from Past Survey Data with an Illustration Using a Geriatric Assessment Survey for Older Adults with Cancer., , , and . Algorithms, 9 (2): 33 (2016)Analysis of signal-to-interference ratio estimation methods for wireless communication systems., and . ICC, page 2499-2503. IEEE, (2001)Determining the Reference Sample Size Needed to Control the Accuracy of the Conditional in-control ARL of a Normal-theory CUSUM.. Quality and Reliability Eng. Int., 32 (7): 2499-2504 (2016)Performance analysis of switch access systems., , , , and . Bell Labs Tech. J., 4 (2): 197-208 (1999)Restoration Strategies In Mesh Optical Networks: Cost Vs. Service Availability., and . PRDC, page 147-153. IEEE Computer Society, (2006)Using proxy failure times with the Jelinski-Moranda software reliability model., and . ISSRE, page 358-365. IEEE Computer Society, (1997)Predicting the value of an integer-valued random variable. Statistics & Probability Letters, 16 (4): 297--300 (Mar 16, 1993)Cusum techniques for timeslot sequences with applications to network surveillance., , , and . Comput. Stat. Data Anal., 53 (12): 4332-4344 (2009)A sequential logistic regression classifier based on mixed effects with applications to longitudinal data., , , and . Comput. Stat. Data Anal., (2016)Assessing the validity of one-part software reliability models using likelihood ratio and early detection tests., and . J. Syst. Softw., 80 (6): 805-816 (2007)