Author of the publication

Estimating equation approach for regression analysis of failure time data in the presence of interval-censoring

, , and . Journal of Statistical Planning and Inference, 129 (1-2): 145--157 (Feb 15, 2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research of Sentence-Level Intelligent Input Method Based on Symbian OS., , and . IMSCCS (2), page 666-670. IEEE Computer Society, (2006)0-7695-2581-4.Underwater Acoustic Target Recognition with Fusion Feature., , , , and . ICONIP (1), volume 13108 of Lecture Notes in Computer Science, page 609-620. Springer, (2021)Research on Cross-Layer Optimization of Smart Grid Demand Side Based on WSNs., , , and . QRS Companion, page 414-420. IEEE, (2018)Generalized log-rank test for mixed interval-censored failure time data., and . Statistics in medicine, 23 (10): 1621-9 (May 2004)4092<m:linebreak></m:linebreak>LR: 20061115; PUBM: Print; CI: Copyright 2004; JID: 8215016; ppublish;<m:linebreak></m:linebreak>Anàlisi de supervivència; Interval-censored.Regression analysis of current status data in the presence of dependent censoring with applications to tumorigenicity experiments., , , and . Comput. Stat. Data Anal., (2017)A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT., , , , , and . Secur. Commun. Networks, (2017)Regression analysis of multivariate recurrent event data with time-varying covariate effects., , and . J. Multivar. Anal., 100 (10): 2214-2223 (2009)Construction of Teaching Quality Assurance System in the Context of Engineering Education Certification., , , and . eLEOT, volume 243 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 273-281. Springer, (2018)Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graphs., , , , , , and . CoRR, (2024)JointNet: Multitask Learning Framework for Denoising and Detecting Anomalies in Hyperspectral Remote Sensing., , , , , and . Remote. Sens., 16 (14): 2619 (July 2024)