Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Don X. Sun is active.

Publication


Featured researches published by Don X. Sun.


Bell Labs Technical Journal | 2003

Internet Traffic Tends Toward Poisson and Independent as the Load Increases

Jin Cao; William Cleveland; Dong Lin; Don X. Sun

Network devices put packets on an Internet link, and multiplex, or superpose, the packets from different active connections.


Handbook of massive data sets | 2002

Detecting fraud in the real world

Michael H. Cahill; Diane Lambert; José C. Pinheiro; Don X. Sun

Finding telecommunications fraud in masses of call records is more difficult than finding a needle in a haystack. In the haystack problem, there is only one needle that does not look like hay, the pieces of hay all look similar, and neither the needle nor the hay changes much over time. Fraudulent calls may be rare like needles in haystacks, but they are much more challenging to find. Callers are dissimilar, so calls that look like fraud for one account look like expected behavior for another, while all needles look the same. Moreover, fraud has to be found repeatedly, as fast as fraud calls are placed, the nature of fraud changes over time, the extent of fraud is unknown in advance, and fraud may be spread over more than one type of service. For example, calls placed on a stolen wireless telephone may be charged to a stolen credit card. Finding fraud is like finding a needle in a haystack only in the sense of sifting through masses of data to find something rare. This chapter describes some issues involved in creating tools for building fraud systems that are accurate, able to adapt to changing legitimate and fraudulent behavior, and easy to use.


Technometrics | 1997

Optimal Blocking Schemes for 2n and 2n—p Designs

Don X. Sun; C. F. Jeff Wu; Youyi Chen

Systematic sources of variations in factorial experiments can be effectively reduced without biasing the estimates of the treatment effects by grouping the runs into blocks. For full factorial designs, optimal blocking schemes are obtained by applying the minimum aberration criterion to the block defining contrast subgroup. A related concept of order of estimability is proposed. For fractional factorial designs, because of the intrinsic difference between treatment factors and block variables, the minimum aberration approach has to be modified. A concept of admissible blocking schemes is proposed for selecting block designs based on multiple criteria. The resulting 2 n and 2 n–P designs are shown to have better overall properties for practical experiments than those in the literature.


Technometrics | 2000

Analysis of Interval-Censored Data From Fractionated Experiments Using Covariance Adjustment

Chuanhai Liu; Don X. Sun

Censored data are commonly observed in industrial experiments such as for life testing and reliability improvement. Analyzing censored data from highly fractionated experiments presents a challenging problem to experimenters because many traditional methods become inadequate. Motivated by the data from a fluorescent-lamp experiment, we consider in this article analyzing censored data from highly fractionated experiments using covariance adjustment based on multivariate multiple regression models, which make use of the joint distribution of multivariate response variables. The Bayesian approach is taken for the main statistical inference. The posterior distribution of the parameters is obtained using the data augmentation algorithm. We illustrate the methodology with the fluorescent-lamp experiment data. With the real example and a simulation study, we show that covariance adjustment can lead to both dramatic variance reduction and possible bias reduction.


Gastroenterology | 2001

Fluorescence, reflectance, and light-scattering spectroscopy for evaluating dysplasia in patients with Barrett's esophagus

Irene Georgakoudi; Brian C. Jacobson; Jacques Van Dam; Vadim Backman; Michael B. Wallace; Markus G. Müller; Qingguo Zhang; Kamran Badizadegan; Don X. Sun; Gordon A. Thomas; Lev T. Perelman; Michael S. Feld


Technometrics | 1997

Optimal blocking schemes for 2 n and 2 n−p designs

Don X. Sun; C. F. Jeff Wu; Youyi Chen


knowledge discovery and data mining | 1998

Methods for linking and mining massive heterogeneous databases

José C. Pinheiro; Don X. Sun


Archive | 1997

System and method for spectroscopic product recognition and identification

G. A. Thomas; Mark Hansen; Don X. Sun


Archive | 1998

A Support Vector/Hidden Markov Model Approach to Phoneme Recognition

Steven Eugene Golowich; Don X. Sun


Archive | 2000

Method and apparatus for updating records in a database system based on an improved model of time-dependent behavior

Diane Lambert; José C. Pinheiro; Don X. Sun

Collaboration


Dive into the Don X. Sun's collaboration.

Top Co-Authors

Avatar

Gordon A. Thomas

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

C. F. Jeff Wu

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

G. A. Thomas

New Jersey Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge