<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>how to eat food</title>
  <id>http://www.howtoeatfood.com/tag/statistics</id>
  <updated>2019-05-20T23:56:49-04:00</updated>
  <author>
    <name>how to eat food</name>
  </author>
  <entry>
    <title>When Holt-Winters Is Better Than Machine Learning - The New Stack</title>
    <link rel="alternate" href="https://thenewstack.io/when-holt-winters-is-better-than-machine-learning/"/>
    <id>2c793d7364b8d26c8939070a9c7f98d0</id>
    <published>2019-05-20T23:56:49-04:00</published>
    <updated>2019-05-20T23:56:49-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">When Holt-Winters Is Better Than Machine Learning - The New Stack</summary>
    <content type="html">Actually, all of the statistical methods have a lower prediction error than the ML methods do</content>
  </entry>
  <entry>
    <title>How Not To Run An A/B Test</title>
    <link rel="alternate" href="http://www.evanmiller.org/how-not-to-run-an-ab-test.html"/>
    <id>99c558a7fd0b4c90dc54d334447160f1</id>
    <published>2011-08-19T10:30:13-04:00</published>
    <updated>2011-08-19T10:30:13-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">How Not To Run An A/B Test</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Sketch based anomaly detection, identification and performance evaluation</title>
    <link rel="alternate" href="http://prunel.ccsd.cnrs.fr/docs/00/17/54/74/PDF/saint07_abry_SketchAnomalyDetect.pdf"/>
    <id>c60a9908614b44fe069068eb56246a4a</id>
    <published>2010-11-10T17:35:56-05:00</published>
    <updated>2010-11-10T17:35:56-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Sketch based anomaly detection, identification and performance evaluation</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Extracting Hidden Anomalies using Sketch and Non Gaussian Multiresolution Statistical Detection Procedures</title>
    <link rel="alternate" href="http://www.iijlab.net/~kjc/papers/lextracting.pdf"/>
    <id>515c9dd541ade6d0fffa9c0334004e74</id>
    <published>2010-11-10T16:55:36-05:00</published>
    <updated>2010-11-10T16:55:36-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Extracting Hidden Anomalies using Sketch and Non Gaussian Multiresolution Statistical Detection Procedures</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Use of Spectral Analysis in Defense Against DoS Attacks</title>
    <link rel="alternate" href="http://www.eecs.harvard.edu/~htk/publication/2002-globecom-cheng-kung-tan.pdf"/>
    <id>7150cc7a09dc2e85d2f0c0ad5211f451</id>
    <published>2010-11-10T16:04:14-05:00</published>
    <updated>2010-11-10T16:04:14-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Use of Spectral Analysis in Defense Against DoS Attacks</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Online Detection of Network Trafﬁc Anomalies Using Behavioral Distance</title>
    <link rel="alternate" href="http://cs.gmu.edu/~xwangc/Publications/IWQoS2009-NetAnomalyDetection.pdf"/>
    <id>3cc2261dc1440754189cda366b29e2d4</id>
    <published>2010-11-10T15:59:08-05:00</published>
    <updated>2010-11-10T15:59:08-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Online Detection of Network Trafﬁc Anomalies Using Behavioral Distance</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Real-Time Detection of Stealthy DDos Attacks Using Time-Series Decomposition</title>
    <link rel="alternate" href="http://nrl.eecs.wsu.edu/pubs/Liu2010.pdf"/>
    <id>b47016020d4f75851ca459362d21e00d</id>
    <published>2010-11-10T15:55:45-05:00</published>
    <updated>2010-11-10T15:55:45-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Real-Time Detection of Stealthy DDos Attacks Using Time-Series Decomposition</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>The Way We Live Now - Metric Mania - NYTimes.com</title>
    <link rel="alternate" href="http://www.nytimes.com/2010/05/16/magazine/16FOB-WWLN-t.html"/>
    <id>bf0809126415e45255d4035058f9eb40</id>
    <published>2010-05-21T19:17:14-04:00</published>
    <updated>2010-05-21T19:17:14-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">The Way We Live Now - Metric Mania - NYTimes.com</summary>
    <content type="html">Arrow’s Theorem, a famous result in mathematical economics, essentially states that no voting system satisfying certain minimal conditions can be guaranteed to always yield a fair or reasonable aggregation of the voters’ rankings of several candidates</content>
  </entry>
  <entry>
    <title>6. Process or Product Monitoring and Control</title>
    <link rel="alternate" href="http://www.itl.nist.gov/div898/handbook/pmc/pmc.htm"/>
    <id>46ef4b25b3affdda48f272fcdd71812f</id>
    <published>2010-01-10T11:16:06-05:00</published>
    <updated>2010-01-10T11:16:06-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">6. Process or Product Monitoring and Control</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Holt-Winters Forecasting Applied to Poisson Processes in Real-Time</title>
    <link rel="alternate" href="http://www.evanmiller.org/poisson.pdf"/>
    <id>d78308e57d7e77cb22fbcb0c765d52b6</id>
    <published>2009-02-13T10:15:48-05:00</published>
    <updated>2009-02-13T10:15:48-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Holt-Winters Forecasting Applied to Poisson Processes in Real-Time</summary>
    <content type="html"/>
  </entry>
  <entry>
    <title>Wired News: One Million Ways to Die</title>
    <link rel="alternate" href="http://www.wired.com/news/technology/0,71743-0.html?tw=wn_index_29"/>
    <id>4a12751ead66be8691068db2873d6490</id>
    <published>2006-09-18T09:31:13-04:00</published>
    <updated>2006-09-18T09:31:13-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Wired News: One Million Ways to Die</summary>
    <content type="html"/>
  </entry>
</feed>
