Protected: Statistical Influence
Thursday Plenary – Statistical Influence
Enter Password to Download:
Protected: A Non-linear Mixed Model Approach for Detecting Outlying Profiles
Session 1A – A Non-linear Mixed Model Approach for Detecting Outlying Profiles
Enter Password to Download:
Protected: A Staggered-Level Design Case Study: Staple Fiber Cutting Experiment
Session 1B – A Staggered-Level Design Case Study: Staple Fiber Cutting Experiment
Enter Password to Download:
Protected: Additive Manufacturing: A Case Study for Characterizing Variability
Session 2A – Additive Manufacturing: A Case Study for Characterizing Variability
Enter Password to Download:
Protected: Optimal Designs with Axial Values
Session 2B – Optimal Designs with Axial Values
Enter Password to Download:
Protected: The State of Supersaturated Design and Analysis
Session 2B – The State of Supersaturated Design and Analysis
Enter Password to Download:
Protected: Using BART to Perform Pareto Optimization and Quantify its Uncertainties
Session 2C – Using BART to Perform Pareto Optimization and Quantify its Uncertainties
Enter Password to Download:
Protected: Sensitivity Prewarping for Local Surrogate Modeling
Session 2C – Sensitivity Prewarping for Local Surrogate Modeling
Enter Password to Download:
Protected: Predictive, causal and deductive modeling
Session 3A – Predictive, causal and deductive modeling
Enter Password to Download:
Protected: New Developments in Space Filling Designs
Session 3B – New Developments in Space Filling Designs
Enter Password to Download:
Protected: Constructing Large-scale Mixture Design with Application to AI Algorithm Evaluation
Session 3B – Constructing Large-scale Mixture Design with Application to AI Algorithm Evaluation
Enter Password to Download:
Protected: Debunking Stress Rupture Theories Using Weibull Regression Plots
Session 3C – Debunking Stress Rupture Theories Using Weibull Regression Plots
Enter Password to Download:
Protected: Latin Squares, Youden Squares, and Balanced Incomplete Block Designs and Extensions for Industrial Application
Youden Address – Latin Squares, Youden Squares, and Balanced Incomplete Block Designs and Extensions for Industrial Application
Enter Password to Download:
Protected: Rethinking Software Fault Tolerance
Session 4A – Rethinking Software Fault Tolerance
Enter Password to Download:
Protected: Optimal Mixture Designs for Ordinal Responses
Session 4B – Optimal Mixture Designs for Ordinal Responses
Enter Password to Download:
Protected: A Practitioner’s Guide to Specifying Prior in Reliability Applications
Session 4B – A Practitioner’s Guide to Specifying Prior in Reliability Applications
Enter Password to Download:
Protected: Estimating Pure-Error from Near-Replicates in Design of Experiments
Session 4C – Estimating Pure-Error from Near-Replicates in Design of Experiments
Enter Password to Download:
Protected: Monitoring Proportions with Two Components of Common Cause Variation
Session 4C – Monitoring Proportions with Two Components of Common Cause Variation
Enter Password to Download:
Protected: D- and A-Optimal Screening Designs
Session 5A – D- and A-Optimal Screening Designs
Enter Password to Download:
Protected: Active Learning for Deep Gaussian Process Surrogates
Session 5A – Active Learning for Deep Gaussian Process Surrogates
Enter Password to Download:
Protected: Incorporating Uncertainty for Enhanced Leaderboard Scoring and Ranking in Data Competitions
Session 5C – Incorporating Uncertainty for Enhanced Leaderboard Scoring and Ranking in Data Competitions
Enter Password to Download:
Protected: Understanding and Addressing Complexity in Problem Solving
Session 5C – Understanding and Addressing Complexity in Problem Solving
Enter Password to Download:
Protected: News from ASA and Highlights of WW Epi-Program
Friday Luncheon Plenary – News from ASA and Highlights of WW Epi-Program
Enter Password to Download:
Protected: Modeling Semiconductor Yield Using Statistical Engineering – A Case Study
Session 6A – Modeling Semiconductor Yield Using Statistical Engineering – A Case Study
Enter Password to Download:
Protected: Tuning Parameter Selection for Penalized Estimation via R^2
Session 6B – Tuning Parameter Selection for Penalized Estimation via R^2
Enter Password to Download:
Protected: Bayesian Optimization via Barrier Functions
Session 6B – Bayesian Optimization via Barrier Functions
Enter Password to Download:
Protected: Applied vs. Academic Approaches to Statistical Process Monitoring
Session 6C – Applied vs. Academic Approaches to Statistical Process Monitoring
Enter Password to Download:
Protected: A Consistent Data Model for Different Data Granularity in Control Charts
Session 6C – A Consistent Data Model for Different Data Granularity in Control Charts
Enter Password to Download: