JSM 2011 Online Program
The views expressed here are those of the individual authors and not necessarily those of the JSM sponsors, their officers, or their staff.
Activity Details
|
|||
137 | Mon, 8/1/2011, 8:30 AM - 10:20 AM | CC-C219 | |
Modeling of Networks and Information Systems for Defense Applications — Contributed Papers | |||
Section on Statistics in Defense and National Security , Section on Statistical Computing , Section on Physical and Engineering Sciences , Section on Risk Analysis , Scientific and Public Affairs Advisory Committee | |||
Chair(s): Yasmin H. Said, George Mason University | |||
8:35 AM | Pattern Discovery and Anomaly Detection in Sensor Networks — James Shine, U.S. Army ERDC ; James E. Gentle, George Mason University | ||
8:50 AM | A Robust Alternative for Spoof Detection Using GMM — Umashanger Thayasivam, Rowan University ; Ravi P. Ramachandran, Rowan University ; Sachin Shetty, Tennessee State University | ||
9:05 AM | Optimal Weighting for Joint Optimization of Fidelity and Commensurability in Tests of Matchedness — Sancar Adali, The Johns Hopkins University ; Carey Priebe, The Johns Hopkins University | ||
9:20 AM | Evaluation of a Resilience Training Program: The Influence of Program Mediators on Service Members' Resilience — Weimin Zhang, Samueli Institute ; Salvatore V. Libretto, Samueli Institute ; Dawn Wallerstedt, Samueli Institute ; Joan Walter, Samueli Institute | ||
9:35 AM | Information Systems Success — Ayodele Mobolurin, Howard University ; Mohammad Abul Quasem, Howard University | ||
9:50 AM | Service-Request Distributions in Business Processes and Their Control-Oriented Applications — Genady Grabarnik, St. John's University ; Yefim Haim Michlin, Israel Institute of Technology ; Laura Shwartz, IBM Thomas J. Watson Research Center | ||
10:05 AM | Floor Discussion |
2011 JSM Online Program Home
For information, contact jsm@amstat.org or phone (888) 231-3473.
If you have questions about the Continuing Education program, please contact the Education Department.