NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Cai, Chaoli – ProQuest LLC, 2009
Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…
Descriptors: Energy Conservation, Testing, Computer Security, Statistical Inference
Peer reviewed Peer reviewed
Direct linkDirect link
Jo, Booil; Asparouhov, Tihomir; Muthen, Bengt O.; Ialongo, Nicholas S.; Brown, C. Hendricks – Psychological Methods, 2008
Cluster randomized trials (CRTs) have been widely used in field experiments treating a cluster of individuals as the unit of randomization. This study focused particularly on situations where CRTs are accompanied by a common complication, namely, treatment noncompliance or, more generally, intervention nonadherence. In CRTs, compliance may be…
Descriptors: Individual Characteristics, Intervention, Statistical Inference, Inferences