Author of the publication

A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance.

, , , , and . Journal of Systems and Software, 83 (7): 1288-1297 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biclustering scatter plots using data depth measures., , , and . Statistical Analysis and Data Mining, 6 (2): 102-115 (2013)Restoration Strategies In Mesh Optical Networks: Cost Vs. Service Availability., and . PRDC, page 147-153. IEEE Computer Society, (2006)Mining Branching Rules from Past Survey Data with an Illustration Using a Geriatric Assessment Survey for Older Adults with Cancer., , , and . Algorithms, 9 (2): 33 (2016)Using proxy failure times with the Jelinski-Moranda software reliability model., and . ISSRE, page 358-365. IEEE Computer Society, (1997)A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance., , , , and . Journal of Systems and Software, 83 (7): 1288-1297 (2010)Analysis of signal-to-interference ratio estimation methods for wireless communication systems., and . ICC, page 2499-2503. IEEE, (2001)Least Squares-Based Estimation of Relative Clock Offset and Frequency in Sensor Networks with High Latency., , and . IEEE Trans. Communications, 58 (12): 3613-3620 (2010)Adjusting software failure rates that are estimated from test data., , and . IEEE Trans. Reliability, 54 (1): 107-114 (2005)Determining the Reference Sample Size Needed to Control the Accuracy of the Conditional in-control ARL of a Normal-theory CUSUM.. Quality and Reliability Eng. Int., 32 (7): 2499-2504 (2016)Cusum techniques for timeslot sequences with applications to network surveillance., , , and . Computational Statistics & Data Analysis, 53 (12): 4332-4344 (2009)