586 citations to https://www.mathnet.ru/rus/tvp4645
  1. Yang Du, Susu Zhang, Hua‐Hua Chang, “Compromised item detection: A Bayesian change‐point perspective”, Brit J Math & Statis, 76:1 (2023), 131  crossref
  2. Xiaochuan Ma, Lifeng Lai, Shuguang Cui, “Bayesian Two-Stage Sequential Change Diagnosis via Sensor Arrays”, IEEE Trans. Inform. Theory, 69:11 (2023), 7276  crossref
  3. Shamp W., Varbanov R., Chicken E., Linero A., Yang Yu., “Computationally Efficient Bayesian Sequential Function Monitoring”, J. Qual. Technol., 54:1 (2022), 1–19  crossref  isi
  4. Qining Zhang, Honghao Wei, Weina Wang, Lei Ying, Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, 2022, 141  crossref
  5. Neil Hwang, Jiarui Xu, Shirshendu Chatterjee, Sharmodeep Bhattacharyya, “The Bethe Hessian and Information Theoretic Approaches for Online Change-Point Detection in Network Data”, Sankhya A, 84:1 (2022), 283  crossref
  6. Topi Halme, Eyal Nitzan, Visa Koivunen, “Bayesian Quickest Detection of Propagating Spatial Events”, IEEE Trans. Signal Process., 70 (2022), 5982  crossref
  7. Yunxiao Chen, Yi-Hsuan Lee, Xiaoou Li, “Item Pool Quality Control in Educational Testing: Change Point Model, Compound Risk, and Sequential Detection”, Journal of Educational and Behavioral Statistics, 47:3 (2022), 322  crossref
  8. Zeina Al Masry, Landy Rabehasaina, Ghislain Verdier, “Change-level detection for Lévy subordinators”, Stochastic Processes and their Applications, 147 (2022), 423  crossref
  9. Eric Järpe, Quentin Gouchet, Lightweight Cryptographic Techniques and Cybersecurity Approaches, 2022  crossref
  10. Kim Hammar, Rolf Stadler, “Intrusion Prevention Through Optimal Stopping”, IEEE Trans. Netw. Serv. Manage., 19:3 (2022), 2333  crossref
Предыдущая
1
3
4
5
6
7
8
9
59
Следующая