View:

Annals of the Institute of Statistical Mathematics

Annals of the Institute of Statistical Mathematics  

A quarterly English language publication of this Japanese institute.http://www.ism.ac.jp/editsec/aism-e.html Journal home page.
Deutsche Statistische Gesellschaft

Deutsche Statistische Gesellschaft  

The German Statistical Society, founded in 1911. The society has about 800 members.http://www.dstatg.de/ Society home page.
GENSTAT

GENSTAT  

A statistical computer package particularly used in analysing natural science data.http://www.vsni.co.uk/products/genstat/ Computer package home page.
linear dependence

linear dependence  

The variables y and x display linear dependence if, for some constants a and b (≠ 0),y=a+bx.
survival time

survival time  

The time until the occurrence of a particular event such as death or the failure of a component.
Statistics Education Research Journal

Statistics Education Research Journal  

The electronic journal published bi-annually by the International Association for Statistical Education.http://www.stat.auckland.ac.nz/?iase/publications.php?show=serj Journal home page.
birthday problem

birthday problem  

A well-known, but intriguing probability problem. There are n people in a room. Assume that none is born on 29 February and that the remaining 365 days are all equally likely as birthdays. What is ...
bluesnarfing

bluesnarfing  

An attack on a mobile phone using Bluetooth technology that makes illegal access to the data on the phone
spurious precision

spurious precision  

A value stated with more precision than is actually possible, given the accuracy of the values from which it has been calculated. For example, if a three-metre length is cut off the top of a ...
L-moments

L-moments  

Measures of location, spread, and other properties of distributions that are computed from linear combinations of the ordered data values x(1)≤x(2)≤…≤x(n) (with mean x̄, which is the first L-moment). ...
margin of error

margin of error  

A ‘margin of error’ is often reported with opinion polls using a phrase such as ‘the proportion intending to vote for the Red party is 35%, with a margin of error of 3%.’ This actually means that on ...
Old Faithful

Old Faithful  

Geyser in the Yellowstone National Park which erupts in a fashion that has challenged analysts of time series. The data in the table refer to the period 1–8 August in 1978. For each day, the table ...
Anderson–Darling test

Anderson–Darling test  

A general test, published in 1952, that compares the fit of the observed cumulative distribution function with that expected. It was derived by Anderson and David A. Darling as a modification of the ...
exponential smoothing

exponential smoothing  

An econometric technique in which greater weight is accorded to more recent data in order to identify emerging trends.
Ponzi scheme

Ponzi scheme  

A type of banking fraud named after Charles Ponzi, who operated such a scheme in the USA in 1920. Depositors are offered unsustainably high rates of interest (e.g. 50% p.a.) and are initially paid ...
runs test

runs test  

A versatile non-parametric test. One application is as a test of the null hypothesis that two samples, of sizes m and n, have been taken from random variables with the same distribution. Arrange the ...
wavelet

wavelet  

Functions that provide succinct and accurate representations of time series and arrays of spatial data. Wavelets have great potential as tools for data compression, when the data consist of, for ...
bookmark

bookmark  

1 A marker placed in a document to allow easy access to that point.2 A link to a URL stored on a computer (e.g. in a ‘favorites list’) so that the user may easily access it.
rank correlation coefficient

rank correlation coefficient  

A non-parametric measure of the extent to which two variables are related. The original data may be ranks, or measurements that are converted to ranks. For example, in a flower show, six sunflower ...
group accounts

group accounts  

An account associated with a group of users. Group accounts can be used to associate a series of access controls with a group of users: for example, ensuring that the group can only read or write to ...

View: