arxiv: v1 [math.st] 5 Jul 2007

Size: px
Start display at page:

Download "arxiv: v1 [math.st] 5 Jul 2007"

Transcription

1 EXPLICIT FORMULA FOR COSTRUCTIG BIOMIAL COFIDECE ITERVAL WITH GUARATEED COVERAGE PROBABILITY arxiv:77.837v [math.st] 5 Jul 27 XIJIA CHE, KEMI ZHOU AD JORGE L. ARAVEA Abstract. In this paper, we derive an explicit formula for constructing the confidence interval of binomial parameter with guaranteed coverage probability. The formula overcomes the limitation of normal approximation which is asymptotic in nature and thus inevitably introduce unknown errors in applications. Moreover, the formula is very tight in comparison with classic Clopper-Pearson s approach from the perspective of interval width. Based on the rigorous formula, we also obtain approximate formulas with excellent performance of coverage probability.. Classic Confidence Intervals The construction of confidence interval of binomial parameter is frequently encountered in communications and many other areas of science and engineering. Clopper and Pearson [3] has provided a rigorous approach for constructing confidence interval. However, the computational complexity involved with this approach is very high. The standard technique is to use normal approximation which is not accurate for rare events, especially in the context of studying the bit error rate of communication systems, blocking probability of communication networks and probability of instability of uncertain dynamic systems. Moreover, it has been recently proven by Brown, Cai and DasGupta [, 2] that the standard normal approximation approach is persistently poor. The coverage probability of the confidence interval can be significantly below the specified confidence level even for very large sample sizes. Since in many situations, it is desirable to quickly construct a confidence interval with guaranteed coverage probability, our goal is to derive a simple and rigorous formula for confidence interval construction. Let the probability space be denoted as (Ω, F, P where Ω, F, P are the sample space, the algebra of events and the probability measure respectively. Let X be a Bernoulli random variable with distribution Pr{X = } = P X, Pr{X = } = P X where P X (,. Let the sample size and confidence parameter δ (, be fixed. We refer an observation with value as a successful trial. Let K denote the number of successful trials during the i.i.d. sampling experiments. Let k = K(ω where ω is a sample point in the sample space Ω. Date: June 26. Key words and phrases. Confidence Interval, Probability, Statistics, ormal Approximation. This research was supported in part by grants from ASA (CC5-573 and LEQSF (ASA /LEQSF(2-4-.

2 2 XIJIA CHE, KEMI ZHOU AD JORGE L. ARAVEA.. Clopper-Pearson. The classic Clopper-Pearson lower confidence limit L,k,δ and upper confidence limit U,k,δ are given respectively by { { def if k = def if k = L,k,δ = and U p if k >,k,δ = p if k < where p (, is the solution of the following equation k ( (. p j ( p j = δ j 2 j= and p (, is the solution of the following equation k ( (.2 p j ( p j = δ j 2. j= The probabilistic implication of the confidence limits can be illustrated as follows: Define random variable L : Ω [, ] by L(ω = L,K(ω,δ ω Ω and random variable U : Ω [, ] by U(ω = U,K(ω,δ ω Ω. Then Pr{L P X U} > δ. The exact value of Pr{L P X U} is referred as the coverage probability. Accordingly, we refer Pr{P X < L or P X > U} as the error probability..2. ormal Approximation. It is easy to see that the equations (. and (.2 are very hard to solve and thus the confidence limits are very difficult to determine using Clopper-Pearson s approach. For large sample size, it is computationally prohibitive. To get around the difficulty, normal approximation has been widely used to develop simple approximate formulas (see, for example, [, 2, 5, 6] and the references therein. The basis of the normal approximation is the Central Limit Theorem, i.e., lim Pr P X K P X( P X < z = 2Φ(z where z > and Φ(. is the normal distribution function. Let Z δ 2 value such that Φ(Z δ = δ 2. It follows that i.e., lim Pr lim δ. { K be the critical 2 Z PX ( P X δ < P X < K } 2 + Z PX ( P X = δ, δ 2 Pr s Z 2 δ2 K + 2 Z δ 2 + Z2 δ 2 Z 2 δ K ( K < P X < s Z 2 δ2 K + 2 +Z δ 2 + Z2 δ 2 Z 2 δ K ( K = Since Z2 δ 2 for sufficiently large sample size, the lower and upper confidence limits can be estimated respectively as L k k Z ( k δ 2

3 BIOMIAL COFIDECE ITERVAL 3 and Ũ k + Z ( k δ. 2 The critical problem with the normal approximation is that it is of asymptotic nature. It is not clear how large the sample size is sufficient for the approximation error to be negligible. Such an asymptotic approach is not good enough for many practical applications involving rare events. 2. Rigorous Formula It is desirable to have a simple formula which is rigorous and very tight for the confidence interval construction. We now propose the following simple formula for constructing the confidence limits. Theorem. Define (2. L(k def = k and (2.2 U(k def = k k 2k + 4θ k( k, k =,,, + θ 2k + + 4θ k( k, k =,,, + θ with θ = 9. Then Pr {L(K < P 8ln 2 X < U(K} > δ. Moreover, δ L(k < L,k,δ < U,k,δ < U(k. Remark. L(k and U(k are tight bounds for the classic Clopper-Pearson confidence limits L,k,δ and U,k,δ (See Figures -2. A bisection search can be performed based on such bounds for computing the classic Clopper-Pearson confidence limits. To show Theorem, we need some preliminary results. The following Lemma is due to Massart [7]. Lemma. Pr { K P X + ǫ } ( ǫ exp 2 2(P X+ ǫ 3 ( PX ǫ 3 for all ǫ (, P X. Of course, the above upper bound holds trivially for ǫ P X. Thus, Lemma is actually true for any ǫ >. Lemma 2. Pr { K P X ǫ } ( ǫ exp 2 2(P X ǫ 3 ( PX+ ǫ 3 for all ǫ >. Proof. Define Y = X. Then P Y = P X. At the same time when we are conducting i.i.d. experiments for X, we are also conducting i.i.d. experiments for Y. Let the number of successful trials of the experiments for Y be denoted as K Y. Obviously, K Y = K. Applying Lemma to Y, we have Pr It follows that { K Pr { KY P Y + ǫ } ( P X + ǫ exp } ( ǫ 2 exp 2(P Y + ǫ 3 ( P Y ǫ 3. ǫ 2 2( P X + ǫ 3 [ ( P X ǫ 3 ].

4 4 XIJIA CHE, KEMI ZHOU AD JORGE L. ARAVEA The proof is thus completed by observing that Pr { K P X + ǫ } = Pr { K P X ǫ }. The following lemma can be found in [4]. Lemma 3. k ( j= j x j ( x j decreases monotonically with respect to x (, for k =,,,. ( Lemma 4. k ( j= j x j ( x j exp for k =,,,. j= (x k 2 2 ( 2 3 x+ k 3 ( 2 3 x k 3 x ( k, Proof. Consider binomial random variable X with parameter P X > k. Let K be the number of successful trials during i.i.d. sampling experiments. Then k ( P j X j ( P X j = Pr{K k}. ote that Pr{K k} = Pr { K P X ( } P X k. Applying Lemma 2 with ǫ = P X k >, we have k ( ( P j X j ( P X j (P X k exp 2 j= 2(P X PX k 3 ( P X + PX k 3 ( (P X k = exp 2 2 ( 2 3 P X + k 3 ( 2 3 P X k 3. Since the argument holds for arbitrary binomial random variable X with P X > k, the proof of the lemma is thus completed. Lemma 5. k ( j= x j ( x j (x exp k 2 x ( j (, k for k =,,. j= 2 ( 2 3 x+ k 3 ( 2 3 x k 3 Proof. Consider binomial random variable X with parameter P X < k. Let K be the number of successful trials during i.i.d. sampling experiments. Then k ( { P j K X j ( P X j = Pr{K < k} = Pr < P X + ( k } P X. Applying Lemma with ǫ = k P X >, we have that k ( ( P j X j ( P X j ( k exp P X 2 j= 2(P X + k PX 3 ( P X k PX 3 ( (P X k = exp 2 2 ( 2 3 P X + k 3 ( 2 3 P X k 3. Since the argument holds for arbitrary binomial random variable X with P X < k, the proof of the lemma is thus completed. Lemma 6. Let k. Then L,k,δ < U,k,δ.

5 BIOMIAL COFIDECE ITERVAL 5 Proof. Obviously, the lemma is true for k=,. We consider the case that k. Let S(, k, x = k j= ( j x j ( x j for x (,. otice that S(, k, p = S(, k, p + ( k p k ( p k = δ 2. Thus S(, k, p S(, k, p = δ 2 [ δ 2 ( k p k ( p k ]. otice that δ (, and that p (,, we have that ( S(, k, p S(, k, p = δ + p k ( p k >. k By Lemma 3, S(, k, x decreases monotonically with respect to x, we have p < p and complete the proof of the lemma. We are now in the position to prove Theorem. It can be easily verified that U,k,δ U(k for k =,. We need to show that U,k,δ U(k for < k <. Straightforward computation shows that U(k is the only root of equation ( (x k 2 exp 2 ( 2 3 x + k 3 ( 2 3 x k 3 with respect to x ( k,. There are two cases: U(k and U(k <. If U(k then U,k,δ U(k is trivially true. We only need to consider the case that k < U(k <. In this case, it follows from Lemma 4 that k j= ( ( [U(k] j ( U(k j exp j Recall that we have k j= k j= = δ 2 (U(k k 2 2 ( 2 3 U(k + k 3 ( 2 3 U(k k 3 ( U j,k,δ j ( U,k,δ j = δ 2, ( U j,k,δ j ( U,k,δ j k j= ( [U(k] j ( U(k j. j = δ 2. Therefore, by Lemma 3, we have that U,k,δ U(k for < k <. Thus, we have shown that U,k,δ q for all k. Similarly, by Lemma 5 and Lemma 3, we can show that L,k,δ L(k. By Lemma 6, we have L(k < L,k,δ < U,k,δ < U(k. Finally, the proof of Theorem is completed by invoking the probabilistic implication of the Clopper-Pearson confidence interval.

6 6 XIJIA CHE, KEMI ZHOU AD JORGE L. ARAVEA 3. umerical Experiments and Empirical Formulas In comparison with the Clopper-Pearson s approach, our approach is very tight from the perspective of interval width (see, for example, Figures -2. Moreover, there is no comparison on the computational complexity. Our formula is simple enough for hand calculation. Our numerical results are in agreement with the discovery made by Brown, Cai and DasGupta [, 2]. It can be seen from Figures 2-27 that the coverage probability of confidence intervals obtained by the standard normal approximation can be substantially lower than the specified confidence level δ (This is true even when the condition for applying the rule of thumb, i.e., P X ( P X > 5, is satisfied. Moreover, the situation is worse for smaller confidence parameter δ. See, for example, Figures 25-27, if one wishes to make an inference with an error frequency less than one out of, using the normal approximation can lead to a frequency of error higher than out of. In light of the excessively high error rate of inference caused by the normal approximation, the rigorous formula may be a better choice. The rigorous formula guarantees the error probability below the specify level δ. It should be noted that the rigorous formula is conservative (with actual error probability around % to 2% of the requirement. It should be noted that by tuning the parameter θ in the rigorous formula, one can obtained simple formulas which meet the specified confidence levels. For example, to construct confidence interval with confidence parameter δ =.5,.,., we can simply compute L(k and U(k defined in Theorem with θ = 2, 3, 5 respectively (The values of θ presented here are not optimal. Better coverage performance can be achieved by a fine tuning of θ. More specifically, { K Pr < P X < K { K Pr { K Pr K +2 K( K + 2 2K + 4 K 3 ( K + 3 2K + 4 K 5 ( K + 5 < P X < K < P X < K K + +2 K( K + 2 }.95; 2K + } + 4 K 3 ( K.99; + 3 2K + } + 4 K 5 ( K Confidence limits computed by these formulas for different and δ are depicted by Figures 3-2. It is interesting to note that, in most situations, the confidence limits computed by our empirical formulas almost coincide with the corresponding limits derived by Clopper-Pearson method. The numerical investigation of the coverage probability of different confidence intervals is shown in Figures It can be seen that the empirical formulas have excellent coverage performance. References [] Brown, L. D. Cai, T. DasGupta, A. (2. Interval estimation for a binomial proportion. Statistical Science 6:-33. [2] Brown, L. D. Cai, T. DasGupta, A. (22. Interval estimation for a binomial proportion and asymptotic expansions. The Annals of Statistics 3:6-2. [3] Clopper C. J. Pearson E. S. (934. The use of confidence or fiducial limits illustrated in the case of the binomial. Biometrika 26: [4] Clunies-Ross, C. W. (958. Interval estimation for the parameter of a binomial distribution. Biometrika 45:

7 BIOMIAL COFIDECE ITERVAL Lower limit by formula (3 Upper limit by formula ( Figure. Confidence Interval ( =, δ = Lower limit by formula (3 Upper limit by formula ( Figure 2. Confidence Interval ( =, δ =..

8 8 XIJIA CHE, KEMI ZHOU AD JORGE L. ARAVEA.9.8 Lower limit by formula (3 Upper limit by formula ( Figure 3. Confidence Interval ( = 5, δ = Lower limit by formula (3 Upper limit by formula ( Figure 4. Confidence Interval ( = 5, δ =..

9 BIOMIAL COFIDECE ITERVAL Lower limit by formula (3 Upper limit by formula ( Figure 5. Confidence Interval ( =, δ = Lower limit by formula (3 Upper limit by formula ( Figure 6. Confidence Interval ( =, δ =..

10 XIJIA CHE, KEMI ZHOU AD JORGE L. ARAVEA.9.8 Lower limit by formula (3 Upper limit by formula ( Figure 7. Confidence Interval ( = 5, δ = Lower limit by formula (3 Upper limit by formula ( Figure 8. Confidence Interval ( = 5, δ =..

11 BIOMIAL COFIDECE ITERVAL.9.8 Lower limit by formula (3 Upper limit by formula ( Figure 9. Confidence Interval ( =, δ =.5..9 Lower limit by formula (3 Upper limit by formula ( Figure. Confidence Interval ( =, δ =..

12 2 XIJIA CHE, KEMI ZHOU AD JORGE L. ARAVEA.9.8 Lower limit by formula (3 Upper limit by formula ( Figure. Confidence Interval ( = 5, δ = Lower limit by formula (3 Upper limit by formula ( Figure 2. Confidence Interval ( = 5, δ =..

13 BIOMIAL COFIDECE ITERVAL Lower limit by empirical formula Upper limit by empirical formula Figure 3. Confidence Interval ( = 5, δ = Lower limit by empirical formula Upper limit by empirical formula Figure 4. Confidence Interval ( = 5, δ =..

14 4 XIJIA CHE, KEMI ZHOU AD JORGE L. ARAVEA.9.8 Lower limit by empirical formula Upper limit by empirical formula Figure 5. Confidence Interval ( =, δ = Lower limit by empirical formula Upper limit by empirical formula Figure 6. Confidence Interval ( =, δ =..

15 BIOMIAL COFIDECE ITERVAL Lower limit by empirical formula Upper limit by empirical formula Figure 7. Confidence Interval ( = 5, δ = Lower limit by empirical formula Upper limit by empirical formula Figure 8. Confidence Interval ( = 5, δ =..

16 6 XIJIA CHE, KEMI ZHOU AD JORGE L. ARAVEA.9.8 Lower limit by empirical formula Upper limit by empirical formula Figure 9. Confidence Interval ( =, δ = Lower limit by empirical formula Upper limit by empirical formula Figure 2. Confidence Interval ( =, δ =..

17 BIOMIAL COFIDECE ITERVAL 7 A Coverage Probability 2 C B Sample Size Figure 2. Error Probability (P X =.5, δ =.5. A ormal, B Empirical, C Rigorous Coverage Probability 2 C A B Sample Size Figure 22. Error Probability (P X =., δ =.5. A ormal, B Empirical, C Rigorous

18 8 XIJIA CHE, KEMI ZHOU AD JORGE L. ARAVEA A Coverage Probability 2 B C Sample Size Figure 23. Error Probability (P X =.5, δ = 2. A ormal, B Empirical, C Rigorous A Coverage Probability 2 3 B C Sample Size Figure 24. Error Probability (P X =., δ = 2. A ormal, B Empirical, C Rigorous

19 BIOMIAL COFIDECE ITERVAL 9 Coverage Probability 2 3 B A 4 C Sample Size Figure 25. Error Probability (P X =.5, δ = 3. A ormal, B Empirical, C Rigorous 2 A Coverage Probability 3 4 B C Sample Size Figure 26. Error Probability (P X = 2, δ = 3. A ormal, B Empirical, C Rigorous

20 2 XIJIA CHE, KEMI ZHOU AD JORGE L. ARAVEA 2 A Coverage Probability 3 B 4 C Sample Size x 6 Figure 27. Error Probability (P X = 5, δ = 3. A ormal, B Empirical, C Rigorous [5] Hald, A. (952. Statistical Theory with Engineering Applications, pp , John Wiley and Sons. [6] John,. Kotz, L. S. Kemp, A. W. (992 Univariate Discrete Distributions, 2rd ed., pp. 24-3, Wiley. [7] Massart, P. (99. The tight constant in the Dvoretzky-Kiefer-Wolfowitz inequality. The Annals of Probability 8: Department of Electrical and Computer Engineering, Louisiana State University, Baton Rouge, LA 783 address: chan@ece.lsu.edu, kemin@ece.lsu.edu, aravena@ece.lsu.edu

arxiv: v6 [math.st] 25 Nov 2010

arxiv: v6 [math.st] 25 Nov 2010 Confidence Interval for the Mean of a Bounded Random Variable and Its Applications in Point arxiv:080.458v6 [math.st] 5 Nov 010 Estimation Xinjia Chen November, 010 Abstract In this article, we derive

More information

On the coverage probability of the Clopper-Pearson confidence interval

On the coverage probability of the Clopper-Pearson confidence interval On the coverage probability of the Clopper-Pearson confidence interval Sur la probabilité de couverture de l intervalle de confiance de Clopper-Pearson Rapport Interne GET / ENST Bretagne Dominique Pastor

More information

William C.L. Stewart 1,2,3 and Susan E. Hodge 1,2

William C.L. Stewart 1,2,3 and Susan E. Hodge 1,2 A Targeted Investigation into Clopper-Pearson Confidence Intervals William C.L. Stewart 1,2,3 and Susan E. Hodge 1,2 1Battelle Center for Mathematical Medicine, The Research Institute, Nationwide Children

More information

On the Entropy of Sums of Bernoulli Random Variables via the Chen-Stein Method

On the Entropy of Sums of Bernoulli Random Variables via the Chen-Stein Method On the Entropy of Sums of Bernoulli Random Variables via the Chen-Stein Method Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel ETH, Zurich,

More information

Lawrence D. Brown, T. Tony Cai and Anirban DasGupta

Lawrence D. Brown, T. Tony Cai and Anirban DasGupta Statistical Science 2005, Vol. 20, No. 4, 375 379 DOI 10.1214/088342305000000395 Institute of Mathematical Statistics, 2005 Comment: Fuzzy and Randomized Confidence Intervals and P -Values Lawrence D.

More information

Charles Geyer University of Minnesota. joint work with. Glen Meeden University of Minnesota.

Charles Geyer University of Minnesota. joint work with. Glen Meeden University of Minnesota. Fuzzy Confidence Intervals and P -values Charles Geyer University of Minnesota joint work with Glen Meeden University of Minnesota http://www.stat.umn.edu/geyer/fuzz 1 Ordinary Confidence Intervals OK

More information

Weizhen Wang & Zhongzhan Zhang

Weizhen Wang & Zhongzhan Zhang Asymptotic infimum coverage probability for interval estimation of proportions Weizhen Wang & Zhongzhan Zhang Metrika International Journal for Theoretical and Applied Statistics ISSN 006-1335 Volume 77

More information

Notes 1 : Measure-theoretic foundations I

Notes 1 : Measure-theoretic foundations I Notes 1 : Measure-theoretic foundations I Math 733-734: Theory of Probability Lecturer: Sebastien Roch References: [Wil91, Section 1.0-1.8, 2.1-2.3, 3.1-3.11], [Fel68, Sections 7.2, 8.1, 9.6], [Dur10,

More information

arxiv: v2 [math.st] 11 Aug 2011

arxiv: v2 [math.st] 11 Aug 2011 DVORETZKY KIEFER WOLFOWITZ INEQUALITIES FOR THE TWO-SAMPLE CASE arxiv:07.5356v2 [math.st] Aug 20 FAN WEI AND R. M. DUDLEY Abstract. The Dvoretzky Kiefer Wolfowitz DKW inequality says that if F n is an

More information

Statistics for Applications Spring 2009

Statistics for Applications Spring 2009 MIT OpenCourseWare http://ocw.mit.edu 18.443 Statistics for Applications Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. CONFIDENCE INTERVALS

More information

Testing Simple Hypotheses R.L. Wolpert Institute of Statistics and Decision Sciences Duke University, Box Durham, NC 27708, USA

Testing Simple Hypotheses R.L. Wolpert Institute of Statistics and Decision Sciences Duke University, Box Durham, NC 27708, USA Testing Simple Hypotheses R.L. Wolpert Institute of Statistics and Decision Sciences Duke University, Box 90251 Durham, NC 27708, USA Summary: Pre-experimental Frequentist error probabilities do not summarize

More information

A Probabilistic Upper Bound on Differential Entropy

A Probabilistic Upper Bound on Differential Entropy A Probabilistic Upper Bound on Differential Entropy Joseph DeStefano, Qifeng Lu and Erik Learned-Miller Abstract The differential entrops a quantity employed ubiquitousln communications, statistical learning,

More information

Monotonicity and Aging Properties of Random Sums

Monotonicity and Aging Properties of Random Sums Monotonicity and Aging Properties of Random Sums Jun Cai and Gordon E. Willmot Department of Statistics and Actuarial Science University of Waterloo Waterloo, Ontario Canada N2L 3G1 E-mail: jcai@uwaterloo.ca,

More information

Analysis of Thompson Sampling for the multi-armed bandit problem

Analysis of Thompson Sampling for the multi-armed bandit problem Analysis of Thompson Sampling for the multi-armed bandit problem Shipra Agrawal Microsoft Research India shipra@microsoft.com avin Goyal Microsoft Research India navingo@microsoft.com Abstract We show

More information

Iterative Markov Chain Monte Carlo Computation of Reference Priors and Minimax Risk

Iterative Markov Chain Monte Carlo Computation of Reference Priors and Minimax Risk Iterative Markov Chain Monte Carlo Computation of Reference Priors and Minimax Risk John Lafferty School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 lafferty@cs.cmu.edu Abstract

More information

Bennett-type Generalization Bounds: Large-deviation Case and Faster Rate of Convergence

Bennett-type Generalization Bounds: Large-deviation Case and Faster Rate of Convergence Bennett-type Generalization Bounds: Large-deviation Case and Faster Rate of Convergence Chao Zhang The Biodesign Institute Arizona State University Tempe, AZ 8587, USA Abstract In this paper, we present

More information

arxiv: v1 [math.st] 26 Jun 2011

arxiv: v1 [math.st] 26 Jun 2011 The Shape of the Noncentral χ 2 Density arxiv:1106.5241v1 [math.st] 26 Jun 2011 Yaming Yu Department of Statistics University of California Irvine, CA 92697, USA yamingy@uci.edu Abstract A noncentral χ

More information

Parametric Techniques Lecture 3

Parametric Techniques Lecture 3 Parametric Techniques Lecture 3 Jason Corso SUNY at Buffalo 22 January 2009 J. Corso (SUNY at Buffalo) Parametric Techniques Lecture 3 22 January 2009 1 / 39 Introduction In Lecture 2, we learned how to

More information

Introduction to Maximum Likelihood Estimation

Introduction to Maximum Likelihood Estimation Introduction to Maximum Likelihood Estimation Eric Zivot July 26, 2012 The Likelihood Function Let 1 be an iid sample with pdf ( ; ) where is a ( 1) vector of parameters that characterize ( ; ) Example:

More information

In Defence of Score Intervals for Proportions and their Differences

In Defence of Score Intervals for Proportions and their Differences In Defence of Score Intervals for Proportions and their Differences Robert G. Newcombe a ; Markku M. Nurminen b a Department of Primary Care & Public Health, Cardiff University, Cardiff, United Kingdom

More information

Parametric Techniques

Parametric Techniques Parametric Techniques Jason J. Corso SUNY at Buffalo J. Corso (SUNY at Buffalo) Parametric Techniques 1 / 39 Introduction When covering Bayesian Decision Theory, we assumed the full probabilistic structure

More information

TOLERANCE INTERVALS FOR DISCRETE DISTRIBUTIONS IN EXPONENTIAL FAMILIES

TOLERANCE INTERVALS FOR DISCRETE DISTRIBUTIONS IN EXPONENTIAL FAMILIES Statistica Sinica 19 (2009), 905-923 TOLERANCE INTERVALS FOR DISCRETE DISTRIBUTIONS IN EXPONENTIAL FAMILIES Tianwen Tony Cai and Hsiuying Wang University of Pennsylvania and National Chiao Tung University

More information

Summary. Recap ... Last Lecture. Summary. Theorem

Summary. Recap ... Last Lecture. Summary. Theorem Last Lecture Biostatistics 602 - Statistical Iferece Lecture 23 Hyu Mi Kag April 11th, 2013 What is p-value? What is the advatage of p-value compared to hypothesis testig procedure with size α? How ca

More information

Chase Joyner. 901 Homework 1. September 15, 2017

Chase Joyner. 901 Homework 1. September 15, 2017 Chase Joyner 901 Homework 1 September 15, 2017 Problem 7 Suppose there are different types of coupons available when buying cereal; each box contains one coupon and the collector is seeking to collect

More information

Some Expectations of a Non-Central Chi-Square Distribution With an Even Number of Degrees of Freedom

Some Expectations of a Non-Central Chi-Square Distribution With an Even Number of Degrees of Freedom Some Expectations of a Non-Central Chi-Square Distribution With an Even Number of Degrees of Freedom Stefan M. Moser April 7, 007 Abstract The non-central chi-square distribution plays an important role

More information

Lecture 4: September Reminder: convergence of sequences

Lecture 4: September Reminder: convergence of sequences 36-705: Intermediate Statistics Fall 2017 Lecturer: Siva Balakrishnan Lecture 4: September 6 In this lecture we discuss the convergence of random variables. At a high-level, our first few lectures focused

More information

large number of i.i.d. observations from P. For concreteness, suppose

large number of i.i.d. observations from P. For concreteness, suppose 1 Subsampling Suppose X i, i = 1,..., n is an i.i.d. sequence of random variables with distribution P. Let θ(p ) be some real-valued parameter of interest, and let ˆθ n = ˆθ n (X 1,..., X n ) be some estimate

More information

Generalization to Unseen Cases

Generalization to Unseen Cases In Y. Weiss, B. Schölkopf, and J. Platt (Eds.), Advances in Neural Information Processing Systems 18 (NIPS-05), pp. 1129 1136, MIT Press, Cambridge, MA, 2006 Generalization to Unseen Cases Teemu Roos Helsinki

More information

STATISTICAL METHODS FOR SIGNAL PROCESSING c Alfred Hero

STATISTICAL METHODS FOR SIGNAL PROCESSING c Alfred Hero STATISTICAL METHODS FOR SIGNAL PROCESSING c Alfred Hero 1999 32 Statistic used Meaning in plain english Reduction ratio T (X) [X 1,..., X n ] T, entire data sample RR 1 T (X) [X (1),..., X (n) ] T, rank

More information

Discrete Random Variables

Discrete Random Variables Chapter 5 Discrete Random Variables Suppose that an experiment and a sample space are given. A random variable is a real-valued function of the outcome of the experiment. In other words, the random variable

More information

Plugin Confidence Intervals in Discrete Distributions

Plugin Confidence Intervals in Discrete Distributions Plugin Confidence Intervals in Discrete Distributions T. Tony Cai Department of Statistics The Wharton School University of Pennsylvania Philadelphia, PA 19104 Abstract The standard Wald interval is widely

More information

THE SHORTEST CONFIDENCE INTERVAL FOR PROPORTION IN FINITE POPULATIONS

THE SHORTEST CONFIDENCE INTERVAL FOR PROPORTION IN FINITE POPULATIONS APPLICATIOES MATHEMATICAE Online First version Wojciech Zieliński (Warszawa THE SHORTEST COFIDECE ITERVAL FOR PROPORTIO I FIITE POPULATIOS Abstract. Consider a finite population. Let θ (0, 1 denote the

More information

Sequential Procedure for Testing Hypothesis about Mean of Latent Gaussian Process

Sequential Procedure for Testing Hypothesis about Mean of Latent Gaussian Process Applied Mathematical Sciences, Vol. 4, 2010, no. 62, 3083-3093 Sequential Procedure for Testing Hypothesis about Mean of Latent Gaussian Process Julia Bondarenko Helmut-Schmidt University Hamburg University

More information

Fundamentals. CS 281A: Statistical Learning Theory. Yangqing Jia. August, Based on tutorial slides by Lester Mackey and Ariel Kleiner

Fundamentals. CS 281A: Statistical Learning Theory. Yangqing Jia. August, Based on tutorial slides by Lester Mackey and Ariel Kleiner Fundamentals CS 281A: Statistical Learning Theory Yangqing Jia Based on tutorial slides by Lester Mackey and Ariel Kleiner August, 2011 Outline 1 Probability 2 Statistics 3 Linear Algebra 4 Optimization

More information

arxiv: v1 [math.co] 13 Jul 2017

arxiv: v1 [math.co] 13 Jul 2017 A GENERATING FUNCTION FOR THE DISTRIBUTION OF RUNS IN BINARY WORDS arxiv:1707.04351v1 [math.co] 13 Jul 2017 JAMES J. MADDEN Abstract. Let N(n, r, k) denote the number of binary words of length n that begin

More information

DS-GA 1002 Lecture notes 11 Fall Bayesian statistics

DS-GA 1002 Lecture notes 11 Fall Bayesian statistics DS-GA 100 Lecture notes 11 Fall 016 Bayesian statistics In the frequentist paradigm we model the data as realizations from a distribution that depends on deterministic parameters. In contrast, in Bayesian

More information

Stratégies bayésiennes et fréquentistes dans un modèle de bandit

Stratégies bayésiennes et fréquentistes dans un modèle de bandit Stratégies bayésiennes et fréquentistes dans un modèle de bandit thèse effectuée à Telecom ParisTech, co-dirigée par Olivier Cappé, Aurélien Garivier et Rémi Munos Journées MAS, Grenoble, 30 août 2016

More information

Statistics: Learning models from data

Statistics: Learning models from data DS-GA 1002 Lecture notes 5 October 19, 2015 Statistics: Learning models from data Learning models from data that are assumed to be generated probabilistically from a certain unknown distribution is a crucial

More information

The circular law. Lewis Memorial Lecture / DIMACS minicourse March 19, Terence Tao (UCLA)

The circular law. Lewis Memorial Lecture / DIMACS minicourse March 19, Terence Tao (UCLA) The circular law Lewis Memorial Lecture / DIMACS minicourse March 19, 2008 Terence Tao (UCLA) 1 Eigenvalue distributions Let M = (a ij ) 1 i n;1 j n be a square matrix. Then one has n (generalised) eigenvalues

More information

The Liapunov Method for Determining Stability (DRAFT)

The Liapunov Method for Determining Stability (DRAFT) 44 The Liapunov Method for Determining Stability (DRAFT) 44.1 The Liapunov Method, Naively Developed In the last chapter, we discussed describing trajectories of a 2 2 autonomous system x = F(x) as level

More information

Bandits : optimality in exponential families

Bandits : optimality in exponential families Bandits : optimality in exponential families Odalric-Ambrym Maillard IHES, January 2016 Odalric-Ambrym Maillard Bandits 1 / 40 Introduction 1 Stochastic multi-armed bandits 2 Boundary crossing probabilities

More information

CSE 525 Randomized Algorithms & Probabilistic Analysis Spring Lecture 3: April 9

CSE 525 Randomized Algorithms & Probabilistic Analysis Spring Lecture 3: April 9 CSE 55 Randomized Algorithms & Probabilistic Analysis Spring 01 Lecture : April 9 Lecturer: Anna Karlin Scribe: Tyler Rigsby & John MacKinnon.1 Kinds of randomization in algorithms So far in our discussion

More information

Acta Universitatis Carolinae. Mathematica et Physica

Acta Universitatis Carolinae. Mathematica et Physica Acta Universitatis Carolinae. Mathematica et Physica František Žák Representation form of de Finetti theorem and application to convexity Acta Universitatis Carolinae. Mathematica et Physica, Vol. 52 (2011),

More information

STA 711: Probability & Measure Theory Robert L. Wolpert

STA 711: Probability & Measure Theory Robert L. Wolpert STA 711: Probability & Measure Theory Robert L. Wolpert 6 Independence 6.1 Independent Events A collection of events {A i } F in a probability space (Ω,F,P) is called independent if P[ i I A i ] = P[A

More information

PCA with random noise. Van Ha Vu. Department of Mathematics Yale University

PCA with random noise. Van Ha Vu. Department of Mathematics Yale University PCA with random noise Van Ha Vu Department of Mathematics Yale University An important problem that appears in various areas of applied mathematics (in particular statistics, computer science and numerical

More information

Economics 520. Lecture Note 19: Hypothesis Testing via the Neyman-Pearson Lemma CB 8.1,

Economics 520. Lecture Note 19: Hypothesis Testing via the Neyman-Pearson Lemma CB 8.1, Economics 520 Lecture Note 9: Hypothesis Testing via the Neyman-Pearson Lemma CB 8., 8.3.-8.3.3 Uniformly Most Powerful Tests and the Neyman-Pearson Lemma Let s return to the hypothesis testing problem

More information

International Journal of Pure and Applied Mathematics Volume 21 No , THE VARIANCE OF SAMPLE VARIANCE FROM A FINITE POPULATION

International Journal of Pure and Applied Mathematics Volume 21 No , THE VARIANCE OF SAMPLE VARIANCE FROM A FINITE POPULATION International Journal of Pure and Applied Mathematics Volume 21 No. 3 2005, 387-394 THE VARIANCE OF SAMPLE VARIANCE FROM A FINITE POPULATION Eungchun Cho 1, Moon Jung Cho 2, John Eltinge 3 1 Department

More information

A Probabilistic Upper Bound on Differential Entropy

A Probabilistic Upper Bound on Differential Entropy A Probabilistic Upper on ifferential Joseph estefano Member IEEE and Erik Learned-Miller Abstract A novel, non-trivial, probabilistic upper bound on the entropy of an unknown one-dimensional distribution,

More information

Primer on statistics:

Primer on statistics: Primer on statistics: MLE, Confidence Intervals, and Hypothesis Testing ryan.reece@gmail.com http://rreece.github.io/ Insight Data Science - AI Fellows Workshop Feb 16, 018 Outline 1. Maximum likelihood

More information

CSCI-6971 Lecture Notes: Monte Carlo integration

CSCI-6971 Lecture Notes: Monte Carlo integration CSCI-6971 Lecture otes: Monte Carlo integration Kristopher R. Beevers Department of Computer Science Rensselaer Polytechnic Institute beevek@cs.rpi.edu February 21, 2006 1 Overview Consider the following

More information

P Values and Nuisance Parameters

P Values and Nuisance Parameters P Values and Nuisance Parameters Luc Demortier The Rockefeller University PHYSTAT-LHC Workshop on Statistical Issues for LHC Physics CERN, Geneva, June 27 29, 2007 Definition and interpretation of p values;

More information

arxiv: v2 [math.st] 20 Feb 2013

arxiv: v2 [math.st] 20 Feb 2013 Exact bounds on the closeness between the Student and standard normal distributions arxiv:1101.3328v2 [math.st] 20 Feb 2013 Contents Iosif Pinelis Department of Mathematical Sciences Michigan Technological

More information

A MODEL FOR THE LONG-TERM OPTIMAL CAPACITY LEVEL OF AN INVESTMENT PROJECT

A MODEL FOR THE LONG-TERM OPTIMAL CAPACITY LEVEL OF AN INVESTMENT PROJECT A MODEL FOR HE LONG-ERM OPIMAL CAPACIY LEVEL OF AN INVESMEN PROJEC ARNE LØKKA AND MIHAIL ZERVOS Abstract. We consider an investment project that produces a single commodity. he project s operation yields

More information

Lecture 5: January 30

Lecture 5: January 30 CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 5: January 30 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

Statistical Inference

Statistical Inference Statistical Inference Classical and Bayesian Methods Class 7 AMS-UCSC Tue 31, 2012 Winter 2012. Session 1 (Class 7) AMS-132/206 Tue 31, 2012 1 / 13 Topics Topics We will talk about... 1 Hypothesis testing

More information

Slope Fields: Graphing Solutions Without the Solutions

Slope Fields: Graphing Solutions Without the Solutions 8 Slope Fields: Graphing Solutions Without the Solutions Up to now, our efforts have been directed mainly towards finding formulas or equations describing solutions to given differential equations. Then,

More information

arxiv: v1 [stat.ap] 17 Mar 2012

arxiv: v1 [stat.ap] 17 Mar 2012 A Note On the Use of Fiducial Limits for Control Charts arxiv:1203.3882v1 [stat.ap] 17 Mar 2012 Mokin Lee School of Mechanical Automotive Engineering University of Ulsan Ulsan, South Korea Chanseok Park

More information

3.3 Estimator quality, confidence sets and bootstrapping

3.3 Estimator quality, confidence sets and bootstrapping Estimator quality, confidence sets and bootstrapping 109 3.3 Estimator quality, confidence sets and bootstrapping A comparison of two estimators is always a matter of comparing their respective distributions.

More information

Nonparametric Inference via Bootstrapping the Debiased Estimator

Nonparametric Inference via Bootstrapping the Debiased Estimator Nonparametric Inference via Bootstrapping the Debiased Estimator Yen-Chi Chen Department of Statistics, University of Washington ICSA-Canada Chapter Symposium 2017 1 / 21 Problem Setup Let X 1,, X n be

More information

COMP2610/COMP Information Theory

COMP2610/COMP Information Theory COMP2610/COMP6261 - Information Theory Lecture 9: Probabilistic Inequalities Mark Reid and Aditya Menon Research School of Computer Science The Australian National University August 19th, 2014 Mark Reid

More information

Induced subgraphs with many repeated degrees

Induced subgraphs with many repeated degrees Induced subgraphs with many repeated degrees Yair Caro Raphael Yuster arxiv:1811.071v1 [math.co] 17 Nov 018 Abstract Erdős, Fajtlowicz and Staton asked for the least integer f(k such that every graph with

More information

An Asymptotically Optimal Algorithm for the Max k-armed Bandit Problem

An Asymptotically Optimal Algorithm for the Max k-armed Bandit Problem An Asymptotically Optimal Algorithm for the Max k-armed Bandit Problem Matthew J. Streeter February 27, 2006 CMU-CS-06-110 Stephen F. Smith School of Computer Science Carnegie Mellon University Pittsburgh,

More information

THE DVORETZKY KIEFER WOLFOWITZ INEQUALITY WITH SHARP CONSTANT: MASSART S 1990 PROOF SEMINAR, SEPT. 28, R. M. Dudley

THE DVORETZKY KIEFER WOLFOWITZ INEQUALITY WITH SHARP CONSTANT: MASSART S 1990 PROOF SEMINAR, SEPT. 28, R. M. Dudley THE DVORETZKY KIEFER WOLFOWITZ INEQUALITY WITH SHARP CONSTANT: MASSART S 1990 PROOF SEMINAR, SEPT. 28, 2011 R. M. Dudley 1 A. Dvoretzky, J. Kiefer, and J. Wolfowitz 1956 proved the Dvoretzky Kiefer Wolfowitz

More information

A Simple Approximate Procedure for Constructing Binomial and Poisson Tolerance Intervals

A Simple Approximate Procedure for Constructing Binomial and Poisson Tolerance Intervals This article was downloaded by: [Kalimuthu Krishnamoorthy] On: 11 February 01, At: 08:40 Publisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Number: 107954 Registered office:

More information

Stochastic Optimization with Inequality Constraints Using Simultaneous Perturbations and Penalty Functions

Stochastic Optimization with Inequality Constraints Using Simultaneous Perturbations and Penalty Functions International Journal of Control Vol. 00, No. 00, January 2007, 1 10 Stochastic Optimization with Inequality Constraints Using Simultaneous Perturbations and Penalty Functions I-JENG WANG and JAMES C.

More information

Distinguishing a truncated random permutation from a random function

Distinguishing a truncated random permutation from a random function Distinguishing a truncated random permutation from a random function Shoni Gilboa Shay Gueron July 9 05 Abstract An oracle chooses a function f from the set of n bits strings to itself which is either

More information

Grundlagen der Künstlichen Intelligenz

Grundlagen der Künstlichen Intelligenz Grundlagen der Künstlichen Intelligenz Uncertainty & Probabilities & Bandits Daniel Hennes 16.11.2017 (WS 2017/18) University Stuttgart - IPVS - Machine Learning & Robotics 1 Today Uncertainty Probability

More information

The best expert versus the smartest algorithm

The best expert versus the smartest algorithm Theoretical Computer Science 34 004 361 380 www.elsevier.com/locate/tcs The best expert versus the smartest algorithm Peter Chen a, Guoli Ding b; a Department of Computer Science, Louisiana State University,

More information

Refining the Central Limit Theorem Approximation via Extreme Value Theory

Refining the Central Limit Theorem Approximation via Extreme Value Theory Refining the Central Limit Theorem Approximation via Extreme Value Theory Ulrich K. Müller Economics Department Princeton University February 2018 Abstract We suggest approximating the distribution of

More information

A process capability index for discrete processes

A process capability index for discrete processes Journal of Statistical Computation and Simulation Vol. 75, No. 3, March 2005, 175 187 A process capability index for discrete processes MICHAEL PERAKIS and EVDOKIA XEKALAKI* Department of Statistics, Athens

More information

DS-GA 1002 Lecture notes 2 Fall Random variables

DS-GA 1002 Lecture notes 2 Fall Random variables DS-GA 12 Lecture notes 2 Fall 216 1 Introduction Random variables Random variables are a fundamental tool in probabilistic modeling. They allow us to model numerical quantities that are uncertain: the

More information

Approximation of Average Run Length of Moving Sum Algorithms Using Multivariate Probabilities

Approximation of Average Run Length of Moving Sum Algorithms Using Multivariate Probabilities Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 3-1-2010 Approximation of Average Run Length of Moving Sum Algorithms Using Multivariate

More information

MARKING A BINARY TREE PROBABILISTIC ANALYSIS OF A RANDOMIZED ALGORITHM

MARKING A BINARY TREE PROBABILISTIC ANALYSIS OF A RANDOMIZED ALGORITHM MARKING A BINARY TREE PROBABILISTIC ANALYSIS OF A RANDOMIZED ALGORITHM XIANG LI Abstract. This paper centers on the analysis of a specific randomized algorithm, a basic random process that involves marking

More information

Since X n /n P p, we know that X n (n. Xn (n X n ) Using the asymptotic result above to obtain an approximation for fixed n, we obtain

Since X n /n P p, we know that X n (n. Xn (n X n ) Using the asymptotic result above to obtain an approximation for fixed n, we obtain Assigmet 9 Exercise 5.5 Let X biomial, p, where p 0, 1 is ukow. Obtai cofidece itervals for p i two differet ways: a Sice X / p d N0, p1 p], the variace of the limitig distributio depeds oly o p. Use the

More information

On Reparametrization and the Gibbs Sampler

On Reparametrization and the Gibbs Sampler On Reparametrization and the Gibbs Sampler Jorge Carlos Román Department of Mathematics Vanderbilt University James P. Hobert Department of Statistics University of Florida March 2014 Brett Presnell Department

More information

Bootstrap inference for the finite population total under complex sampling designs

Bootstrap inference for the finite population total under complex sampling designs Bootstrap inference for the finite population total under complex sampling designs Zhonglei Wang (Joint work with Dr. Jae Kwang Kim) Center for Survey Statistics and Methodology Iowa State University Jan.

More information

A Tight Upper Bound on the Second-Order Coding Rate of Parallel Gaussian Channels with Feedback

A Tight Upper Bound on the Second-Order Coding Rate of Parallel Gaussian Channels with Feedback A Tight Upper Bound on the Second-Order Coding Rate of Parallel Gaussian Channels with Feedback Vincent Y. F. Tan (NUS) Joint work with Silas L. Fong (Toronto) 2017 Information Theory Workshop, Kaohsiung,

More information

Application: Bucket Sort

Application: Bucket Sort 5.2.2. Application: Bucket Sort Bucket sort breaks the log) lower bound for standard comparison-based sorting, under certain assumptions on the input We want to sort a set of =2 integers chosen I+U@R from

More information

Bahadur representations for bootstrap quantiles 1

Bahadur representations for bootstrap quantiles 1 Bahadur representations for bootstrap quantiles 1 Yijun Zuo Department of Statistics and Probability, Michigan State University East Lansing, MI 48824, USA zuo@msu.edu 1 Research partially supported by

More information

Hypothesis Testing. 1 Definitions of test statistics. CB: chapter 8; section 10.3

Hypothesis Testing. 1 Definitions of test statistics. CB: chapter 8; section 10.3 Hypothesis Testing CB: chapter 8; section 0.3 Hypothesis: statement about an unknown population parameter Examples: The average age of males in Sweden is 7. (statement about population mean) The lowest

More information

Probability and Measure

Probability and Measure Probability and Measure Robert L. Wolpert Institute of Statistics and Decision Sciences Duke University, Durham, NC, USA Convergence of Random Variables 1. Convergence Concepts 1.1. Convergence of Real

More information

Test Volume 11, Number 1. June 2002

Test Volume 11, Number 1. June 2002 Sociedad Española de Estadística e Investigación Operativa Test Volume 11, Number 1. June 2002 Optimal confidence sets for testing average bioequivalence Yu-Ling Tseng Department of Applied Math Dong Hwa

More information

Exact formulae for the prime counting function

Exact formulae for the prime counting function Notes on Number Theory and Discrete Mathematics Vol. 19, 013, No. 4, 77 85 Exact formulae for the prime counting function Mladen Vassilev Missana 5 V. Hugo Str, 114 Sofia, Bulgaria e-mail: missana@abv.bg

More information

arxiv: v1 [stat.co] 26 May 2009

arxiv: v1 [stat.co] 26 May 2009 MAXIMUM LIKELIHOOD ESTIMATION FOR MARKOV CHAINS arxiv:0905.4131v1 [stat.co] 6 May 009 IULIANA TEODORESCU Abstract. A new approach for optimal estimation of Markov chains with sparse transition matrices

More information

Reports of the Institute of Biostatistics

Reports of the Institute of Biostatistics Reports of the Institute of Biostatistics No 02 / 2008 Leibniz University of Hannover Natural Sciences Faculty Title: Properties of confidence intervals for the comparison of small binomial proportions

More information

A Note on Hypothesis Testing with Random Sample Sizes and its Relationship to Bayes Factors

A Note on Hypothesis Testing with Random Sample Sizes and its Relationship to Bayes Factors Journal of Data Science 6(008), 75-87 A Note on Hypothesis Testing with Random Sample Sizes and its Relationship to Bayes Factors Scott Berry 1 and Kert Viele 1 Berry Consultants and University of Kentucky

More information

Negative Examples for Sequential Importance Sampling of Binary Contingency Tables

Negative Examples for Sequential Importance Sampling of Binary Contingency Tables Negative Examples for Sequential Importance Sampling of Binary Contingency Tables Ivona Bezáková Alistair Sinclair Daniel Štefankovič Eric Vigoda arxiv:math.st/0606650 v2 30 Jun 2006 April 2, 2006 Keywords:

More information

Chernoff Bounds. Theme: try to show that it is unlikely a random variable X is far away from its expectation.

Chernoff Bounds. Theme: try to show that it is unlikely a random variable X is far away from its expectation. Chernoff Bounds Theme: try to show that it is unlikely a random variable X is far away from its expectation. The more you know about X, the better the bound you obtain. Markov s inequality: use E[X ] Chebyshev

More information

Symmetric Probability Theory

Symmetric Probability Theory Symmetric Probability Theory Kurt Weichselberger, Munich I. The Project p. 2 II. The Theory of Interval Probability p. 4 III. The Logical Concept of Probability p. 6 IV. Inference p. 11 Kurt.Weichselberger@stat.uni-muenchen.de

More information

EFFECTIVE WLLN, SLLN, AND CLT IN STATISTICAL MODELS

EFFECTIVE WLLN, SLLN, AND CLT IN STATISTICAL MODELS EFFECTIVE WLLN, SLLN, AND CLT IN STATISTICAL MODELS Ryszard Zieliński Ist Math Polish Acad Sc POBox 21, 00-956 Warszawa 10, Polad e-mail: rziel@impagovpl ABSTRACT Weak laws of large umbers (W LLN), strog

More information

Transactions on Business and Engineering Intelligent Applications 71

Transactions on Business and Engineering Intelligent Applications 71 Transactions on Business and Engineering Intelligent Applications 71 EVALUATING EFFECTIVENESS OF LINGUISTIC TECHNOLOGIES OF KNOWLEDGE IDENTIFICATION IN TEXT COLLECTIONS Nina Khairova, Gennady Shepelyov,

More information

Statistical Estimation of Min-Entropy Leakage

Statistical Estimation of Min-Entropy Leakage Statistical Estimation of Min-Entropy eakage Tom Chothia Yusuke Kawamoto School of Computer Science, University of Birmingham, United Kingdom April 014 Abstract This manuscript presents new results on

More information

Symmetric polynomials and symmetric mean inequalities

Symmetric polynomials and symmetric mean inequalities Symmetric polynomials and symmetric mean inequalities Karl Mahlburg Department of Mathematics Louisiana State University Baton Rouge, LA 70803, U.S.A. mahlburg@math.lsu.edu Clifford Smyth Department of

More information

A New Confidence Interval for the Difference Between Two Binomial Proportions of Paired Data

A New Confidence Interval for the Difference Between Two Binomial Proportions of Paired Data UW Biostatistics Working Paper Series 6-2-2003 A New Confidence Interval for the Difference Between Two Binomial Proportions of Paired Data Xiao-Hua Zhou University of Washington, azhou@u.washington.edu

More information

Lecture 18: March 15

Lecture 18: March 15 CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 18: March 15 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They may

More information

The properties of L p -GMM estimators

The properties of L p -GMM estimators The properties of L p -GMM estimators Robert de Jong and Chirok Han Michigan State University February 2000 Abstract This paper considers Generalized Method of Moment-type estimators for which a criterion

More information

arxiv:math/ v1 [math.mg] 31 May 2006

arxiv:math/ v1 [math.mg] 31 May 2006 Covering spheres with spheres arxiv:math/060600v1 [math.mg] 31 May 006 Ilya Dumer College of Engineering, University of California at Riverside, Riverside, CA 951, USA dumer@ee.ucr.edu Abstract Given a

More information

Introduction to Probability and Statistics (Continued)

Introduction to Probability and Statistics (Continued) Introduction to Probability and Statistics (Continued) Prof. icholas Zabaras Center for Informatics and Computational Science https://cics.nd.edu/ University of otre Dame otre Dame, Indiana, USA Email:

More information

Chapter 6. Order Statistics and Quantiles. 6.1 Extreme Order Statistics

Chapter 6. Order Statistics and Quantiles. 6.1 Extreme Order Statistics Chapter 6 Order Statistics and Quantiles 61 Extreme Order Statistics Suppose we have a finite sample X 1,, X n Conditional on this sample, we define the values X 1),, X n) to be a permutation of X 1,,

More information

Stat 260/CS Learning in Sequential Decision Problems. Peter Bartlett

Stat 260/CS Learning in Sequential Decision Problems. Peter Bartlett Stat 260/CS 294-102. Learning in Sequential Decision Problems. Peter Bartlett 1. Multi-armed bandit algorithms. Concentration inequalities. P(X ǫ) exp( ψ (ǫ))). Cumulant generating function bounds. Hoeffding

More information