A reanalysis of all studies with available data suggests that researcher's discretion is not a major driver of these pathological features, but researchers tend to use inappropriate methods for inference, rendering standard errors artificially small.

Methodology

TWEETS

Given a feature dependency structure, one can ask if the observations are exchangeable, in which case we say that they are homogeneous.

Methodology Probability Statistics Theory Quantitative Methods Statistics Theory 62G10, 62H15

TWEETS

The emerging need for subnational estimation of demographic and health indicators in low- and middle-income countries (LMICs) is driving a move from design-based methods to spatial and spatio-temporal approaches.

Applications Methodology

TWEETS

We first present incremental causal effects for the case when there is a single binary treatment, such that it can be compared to average treatment effects and thus shed light on key concepts.

Methodology

TWEETS

We outline a Bayesian model-averaged meta-analysis for standardized mean differences in order to quantify evidence for both treatment effectiveness $\delta$ and across-study heterogeneity $\tau$.

Methodology 62F15 G.3

TWEETS

In an influential critique of empirical practice, Freedman (2008) showed that the linear regression estimator was biased for the analysis of randomized controlled trials under the randomization model.

Methodology Econometrics

TWEETS

Federal administrative tax data are invaluable for research, but because of privacy concerns, access to these data is typically limited to select agencies and a few individuals.

Applications

TWEETS

A key aspect that emerged is that learning and forecasting may highly benefit from distributed data, though not only in the geographical sense.

Applications Computer Science and Game Theory Systems and Control Systems and Control

TWEETS

We present a method for producing unbiased parameter estimates and valid confidence intervals under the constraints of differential privacy, a formal framework for limiting individual information leakage from sensitive data.

Methodology Cryptography and Security Statistics Theory Statistics Theory

TWEETS

We consider cut distributions from an asymptotic perspective, find the equivalent of the Laplace approximation, and notice a lack of frequentist coverage for the associate credible regions.

Methodology Statistics Theory Statistics Theory

TWEETS