2012
DOI: 10.1093/biomet/ass066
|View full text |Cite
|
Sign up to set email alerts
|

Non-restarting cumulative sum charts and control of the false discovery rate

Abstract: Cumulative sum (CUSUM) charts are typically used to detect changes in a stream of observations e.g. shifts in the mean. Usually, after signalling, the chart is restarted by setting it to some value below the signalling threshold. We propose a non-restarting CUSUM chart which is able to detect periods during which the stream is out of control. Further, we advocate an upper boundary to prevent the CUSUM chart rising too high, which helps detecting a change back into control. We present a novel algorithm to contr… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(16 citation statements)
references
References 17 publications
(26 reference statements)
0
15
0
Order By: Relevance
“…Woodall and Montgomery (2014) listed several papers on the use of the false discovery rate approach in process monitoring. In addition, see Gandy and Lau (2013). Some of the network monitoring methods, for example those by Heard et al (2010) and Vigliotti and Hankin (2015), are already p-value based with a concern over the high number of false positives so use of a false discovery rate approach seems promising.…”
Section: Research Opportunities and Conclusionmentioning
confidence: 99%
“…Woodall and Montgomery (2014) listed several papers on the use of the false discovery rate approach in process monitoring. In addition, see Gandy and Lau (2013). Some of the network monitoring methods, for example those by Heard et al (2010) and Vigliotti and Hankin (2015), are already p-value based with a concern over the high number of false positives so use of a false discovery rate approach seems promising.…”
Section: Research Opportunities and Conclusionmentioning
confidence: 99%
“…Using the CUSUM statistic to determine the beginning and end of an attack, as in their Figure 4 (right), seems very close in goal to the method of Gandy and Lau . The level of attack illustrated in Figure 4 (left) is relatively high.…”
Section: Computer Network Surveillancementioning
confidence: 77%
“…As a result, this type of monitoring schemes needs to identify which data streams are OC. The monitoring schemes proposed in in Grigg and Spiegelhalter (2008), Tsung (2009, 2012), and Gandy and Lau (2013) belong to this category. In the past, the research on these two types of monitoring schemes has not overlapped.…”
Section: Discussionmentioning
confidence: 99%
“…The research problem of monitoring high-dimensional data streams for this purpose has attracted considerable attention in the literature recently. A number of monitoring schemes have been proposed, including those in Grigg and Spiegelhalter (2008), Tsung (2009, 2012), and Gandy and Lau (2013). A common theme in those methods is to monitor each data stream by one control chart, and calculate the p-values of the charting statistics, and then apply some existing false discover rate (FDR) controlling procedure from the multiple hypothesis testing literature to those p-values at each time point.…”
Section: Introductionmentioning
confidence: 99%