Author of the publication

A comparative study of the bias corrected estimates in logistic regression.

, and . Statistical methods in medical research, 17 (6): 621-34 (December 2008)5470<m:linebreak></m:linebreak>JID: 9212457; 2008/03/28 aheadofprint; 2008/04/03 aheadofprint; 2008/04/15 aheadofprint; ppublish;<m:linebreak></m:linebreak>Regressió logística.
DOI: 10.1177/0962280207084156

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comparative study of the bias corrected estimates in logistic regression., and . Statistical methods in medical research, 17 (6): 621-34 (December 2008)5470<m:linebreak></m:linebreak>JID: 9212457; 2008/03/28 aheadofprint; 2008/04/03 aheadofprint; 2008/04/15 aheadofprint; ppublish;<m:linebreak></m:linebreak>Regressió logística.Conditional Generative Adversarial Network Model for Conversion of 2 Dimensional Radiographs Into 3 Dimensional Views., , , , , and . IEEE Access, (2023)An Efficient Cache-oblivious Parallel Viterbi Algorithm., , , , and . Euro-Par, volume 9833 of Lecture Notes in Computer Science, page 574-587. Springer, (2016)Small-sample comparisons of confidence intervals for the difference of two independent binomial proportions., , , , and . Comput. Stat. Data Anal., 51 (12): 5791-5799 (2007)Confidence Interval of the Difference of Two Independent Binomial Proportions Using Weighted Profile Likelihood., and . Communications in Statistics - Simulation and Computation, 37 (4): 645-659 (2008)Efficient Certificateless Online/Offline Signature., , , and . J. Internet Serv. Inf. Secur., 2 (3/4): 77-92 (2012)A Revocable Online-Offline Certificateless Signature Scheme without Pairing., , , , , and . IACR Cryptology ePrint Archive, (2013)Efficient Certificateless Online/Offline Signature with tight security., , , and . J. Internet Serv. Inf. Secur., 3 (1/2): 115-137 (2013)In Search of Ambiguity: A Three-Stage Workflow Design to Clarify Annotation Guidelines for Crowd Workers., , and . Frontiers Artif. Intell., (2022)In Search of Ambiguity: A Three-Stage Workflow Design to Clarify Annotation Guidelines for Crowd Workers., , and . CoRR, (2021)