This document summarizes a Bayesian adaptive dose selection procedure with overdispersed count endpoint. The procedure uses Bayesian model averaging to model dose-response relationships with a monotonicity constraint. It evaluates doses at an interim analysis based on exclusion and efficacy criteria calculated using predictive probabilities from importance sampling. Simulations examine the procedure's performance under different dose-response scenarios and initial allocations.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Fitness inheritance in the Bayesian optimization algorithmMartin Pelikan
This paper describes how fitness inheritance can be used to estimate fitness for a proportion of newly sampled candidate solutions in the Bayesian optimization algorithm (BOA). The goal of estimating fitness for some candidate solutions is to reduce the number of fitness evaluations for problems where fitness evaluation is expensive. Bayesian networks used in BOA to model promising solutions and generate the new ones are extended to allow not only for modeling and sampling candidate solutions, but also for estimating their fitness. The results indicate that fitness inheritance is a promising concept in BOA, because population-sizing requirements for building appropriate models of promising solutions lead to good fitness estimates even if only a small proportion of candidate solutions is evaluated using the actual fitness function. This can lead to a reduction of the number of actual fitness evaluations by a factor of 30 or more.
We describe different approaches for specifying models and prior distributions for estimating heterogeneous treatment effects using Bayesian nonparametric models. We make an affirmative case for direct, informative (or partially informative) prior distributions on heterogeneous treatment effects, especially when treatment effect size and treatment effect variation is small relative to other sources of variability. We also consider how to provide scientifically meaningful summaries of complicated, high-dimensional posterior distributions over heterogeneous treatment effects with appropriate measures of uncertainty.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Fitness inheritance in the Bayesian optimization algorithmMartin Pelikan
This paper describes how fitness inheritance can be used to estimate fitness for a proportion of newly sampled candidate solutions in the Bayesian optimization algorithm (BOA). The goal of estimating fitness for some candidate solutions is to reduce the number of fitness evaluations for problems where fitness evaluation is expensive. Bayesian networks used in BOA to model promising solutions and generate the new ones are extended to allow not only for modeling and sampling candidate solutions, but also for estimating their fitness. The results indicate that fitness inheritance is a promising concept in BOA, because population-sizing requirements for building appropriate models of promising solutions lead to good fitness estimates even if only a small proportion of candidate solutions is evaluated using the actual fitness function. This can lead to a reduction of the number of actual fitness evaluations by a factor of 30 or more.
We describe different approaches for specifying models and prior distributions for estimating heterogeneous treatment effects using Bayesian nonparametric models. We make an affirmative case for direct, informative (or partially informative) prior distributions on heterogeneous treatment effects, especially when treatment effect size and treatment effect variation is small relative to other sources of variability. We also consider how to provide scientifically meaningful summaries of complicated, high-dimensional posterior distributions over heterogeneous treatment effects with appropriate measures of uncertainty.
Foundations of Statistics in Ecology and Evolution. 8. Bayesian StatisticsAndres Lopez-Sepulcre
1. Philosophy of Science and Bayes Theorem
2. Parameter estimation through MCMC
- Shopping for a Solution
- Is prior information subjective?
3. The beauty of (statistical) Marginalization
- Multiple parameters and Gibbs Sampling
- Estimating the unseen (latent variables)
A presentation about NGBoost (Natural Gradient Boosting) which I presented in the Information Theory and Probabilistic Programming course at the University of Oklahoma.
Factors are categorical variables. The sums of the values of these variables are called levels. In this talk, we consider the variable selection problem where the set of potential predictors contains both factors and numerical variables. Formally, this problem is a particular case of the standard variable selection problema, where factors are coded using dummy variables. As such, the Bayesian solution would be straightforward and, possibly because of this, the problem. Despite its importance, this issue has not received much attention in the literature. Nevertheless, we show that this perception is illusory and that in fact several inputs, like the assignment of prior probabilities over the model space or the parameterization adopted for factors may have a large (and difficult to anticipate) impact on the results. We provide a solution to these issues that extends the proposals in the standard variable selection problem and does not depend on how the factors are coded using dummy variables. Our approach is illustrated with a real example concerning a childhood obesity study in Spain.
Authors: Gonzalo Garcia-donato and Rui Paulo
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Luca Pozzi JSM 2011
1. A Bayesian
Adaptive Dose
Selection
Procedure with A Bayesian Adaptive Dose Selection
Overdispersed
Count
Endpoint
Procedure with Overdispersed Count
Luca Pozzi Endpoint
Introduction
Bayesian
Model
Averaging
Luca Pozzi
Dose-Response
Framework
Application
University of California, Berkeley
Study Layout
Decision Rules
Computations
Simulations
Results
Conclusions
p.luc@stat.berkeley.edu
References
Thanks
August 1st, 2011 - Joint Statistical Meeting, Miami Beach, FL
2. Motivating Example: Problem Setting
A Bayesian
Adaptive Dose
Selection Objective: Lowest Effective Dose (LED), i.e. dose whose efficacy
Procedure with
Overdispersed is at least 50% better than Placebo (Dose 1) and
Count
Endpoint
at most 20% worse than the highest dose (Dose 5);
Luca Pozzi Design of the Study: Start with initial allocation 1:a:b:c:1 then at
Introduction
interim stop or select the most promising dose d for a
Bayesian
second phase with only Placebo, Dose d and Dose 5;
Model
Averaging Endpoint: Overdispersed count data Y modeled by the negative
Dose-Response
Framework
binomial distribution (gamma-poisson mixture):
Application
Study Layout Y |λ ∼ Pois(λ)
Decision Rules
Computations
λ|(α, β) ∼ Gamma(α, β)
Simulations
Results
Dose-Response Relationship: Sigmoidal relationship
EMAX d
Conclusions
e.g. EMAX -model: E (d ) = E0 1 − ED50 +d
.
References
Strong prior information available for Placebo (E0 ) and
Thanks
highest dose (EMAX );
3. Modeling Dose-Response Relationship
A Bayesian
Adaptive Dose
Selection
Procedure with 1st challenge: Modeling
Overdispersed
Count
Endpoint Too few doses to adopt Parametric Dose-Response model.
Luca Pozzi (Adaptive design will start with only one lower dose)
Introduction
Bayesian Strategy: Semiparametric Specification
Model
Averaging
Dose-Response
The mode of action of the drug and Ph.III outcomes suggest
Framework
Application
that a monotonicity constraint holds for the dose-response
Study Layout
relationship:
Decision Rules
Computations
Simulations
Results
Mm = µj ≡ E[Yij ] : E0 = µ1 ≥ µ2 ≥ µ3 ≥ µ4 ≥ µ5 = EMAX
Conclusions
References
Thanks
4. Modeling Approach
A Bayesian
Adaptive Dose Bayesian Model Averaging: Ingredients
Selection
Procedure with
Overdispersed
Count 1 A set of mutually exclusive models M = {M1 , ..., MM }.
Endpoint
To each model corresponds a probability distribution
Luca Pozzi
f (y |θ(m) , Mm );
Introduction
2 One set of priors g (θ(m) |Mm ) on θ(m) for each Mm ;
Bayesian
Model
Averaging
3 A vector of prior model probabilities
Dose-Response π = (π1 , ..., πM ), πm = P{Mm }, (e.g. πm = 1
M
), ∀ m = 1, ..., M.
Framework
Application
Study Layout
Decision Rules We have then
Computations
Simulations
Results
M
P{success|y } = P{success|Mm , y }P{Mm |y }
Conclusions
References
m=1
Thanks
5. Bayesian model
A Bayesian
Adaptive Dose
Selection Gamma-Poisson mixture
Procedure with
Overdispersed
Count
Endpoint
Luca Pozzi
Yij |λij ∼ dpois(λij ) (i -th patient-j -th dose group);
λij |αj , β ∼ dgamma(αj , β)
Introduction
Bayesian
So Yij marginal distribution is a dnegbin(αj , β)
Model
Averaging
Dose-Response
Framework
Application
Priors
Study Layout
Decision Rules
Computations
Simulations
log(α1 ) ∼ N(µα , σ2 );
α
Results α|m ∼ fm λd (m)
N(0, σ2 )
Conclusions
log(β) ∼ β
References
Thanks
6. Monotonicity Constraints
A Bayesian
Adaptive Dose
We introduce the jump variables
Selection
Procedure with
Overdispersed
δk = log(αk ) − log(αk −1 ) ≥ 0
δk 0 iff αk > αk +1
Count
Endpoint
Luca Pozzi
and we put a truncated normal prior on
Introduction
4
Bayesian
Model δsum = δk = log(α1 ) − log(α5 ) ∼ T N(µsum , σ2 )
sum
Averaging
Dose-Response 1
Framework
Application
being T N a normal distribution folded around its mean:
Study Layout
Decision Rules
formally if Z ∼ N(0, 1) then X ∼ T N(ν, τ2 ) ⇐⇒ X = ν + τ|Z |
Computations
Simulations
Results
Conclusions
α1 ≥ α2 ≥ α3 ≥ α4 ≥ α5
References
δ1,m δ2,m δ3,m δ4,m
Thanks
8. Criteria
A Bayesian
Adaptive Dose
Selection Futility-Success
Procedure with
Overdispersed
Count
Endpoint
Exclusion criterion P{µd /µ1 ≥ 0.7|data} ≥ 50%, i.e. Dose d is not
Luca Pozzi
superior to Placebo.
Introduction
Efficacy criterion is the intersection of the following events:
Bayesian (i) the dose is far enough from Dose 1
Model
Averaging
Dose-Response
Framework
P{µd /µ1 < 1|data} ≥ 95%
Application
Study Layout (ii) the dose is either at least 50% better
Decision Rules than Dose 1, or at most 20% worse
Computations
than Dose 5.
Simulations
Results P{µd /µ1 ≤ 0.5|data}
max ≥ 50%
P{µd /µ5 ≤ 1.2|data}
Conclusions
References
Thanks
9. Interim decision
A Bayesian
Adaptive Dose
Selection
Procedure with At Interim
Overdispersed
Count
Endpoint • if Dose 4 meets Exclusion criterion stop for futility: no
Luca Pozzi dose lower than Dose 5 is effective;
Introduction • if Dose 2 meets Efficacy criteria stop for success: Dose 2
Bayesian
Model
is the LED;
Averaging
Dose-Response
• otherwise, for each not futile Dose d calculate the
Framework
Application
Predictive Probability of Success (PPS) and allocate to
Study Layout the lowest dose for which
Decision Rules
P{{(i)|Ad , Y ∗ , Y } ∩ {(ii)|Ad , Y ∗ , Y } > 50%|Y } ≥ t
Computations
Simulations
(1)
Results
Conclusions with Ad = {allocate to Dose d }.
References
Thanks
10. Decision Tree
A Bayesian
Adaptive Dose
LED = d4
Selection
Procedure with
Overdispersed
LED = d3
Count
A2
Endpoint
LED = d3
Luca Pozzi LED
LED = d2
Introduction
LED = d2
A3
Bayesian
Model
LED = d4
Averaging Begin Trial
LED = d2
Dose-Response
LED
Framework
Application
Study Layout
LED = d2
Decision Rules
LED
Computations
LED
Simulations
A4
Results
Conclusions
LED = d3
References
LED = d4
Thanks
11. Performing Predictive Probability Calculations
A Bayesian
Adaptive Dose
Selection
Procedure with
Overdispersed
Count
Endpoint 2nd challenge: Computational
Luca Pozzi
Not feasible to use WinBUGS for Predictive calculations
Introduction
Bayesian
Model
Stategy: Importance Sampling
Averaging
Dose-Response Sample from the posterior sample using weighted resampling:
Framework
Application
Study Layout
Decision Rules
(α, β)(1) , ..., (α, β)(N ) → (α, β)∗
Computations
Simulations
Results
Conclusions
References
Thanks
12. Algorithm: Predictive Resample
Sample (α, β)(1) , ..., (α, β)(k ) , ..., (α, β)(N ) ;
A Bayesian
Adaptive Dose 1
Selection
Procedure with 2 Select Dose d;
for l = 1, ..., L draw (α, β)(l ) from the posterior sample at
Overdispersed
Count 3
Endpoint
interim of size N;
∗(l )
simulate one dataset Yd |(α, β)(l ) , Ad ;
Luca Pozzi
4
Introduction
Bayesian SIR
Model
Averaging
(l )
Dose-Response 5 compute p Yd |(α, β)(k ) , k = 1, ..., N;
Framework
Application ∗(l )
l (θk ;Y ∗ ) p (Yd |(α,β)(k ) )
Study Layout 6 compute wk = ∗ = ∗(l ) ;
Decision Rules j l (θj ;Y ) j p (Yd |(α,β)(j ) )
Computations
(l )
Simulations 7 compute by resampling PPd [criterion] for each criteria;
Results
Conclusions
In the end
L
References
1 (l )
{PPd [criterion] c }
PPd = mean
Thanks
{criteria} l =1
13. Posterior Probability of Success
A Bayesian
Adaptive Dose
Selection Instead of the above predictive criterion we could require a dose to
Procedure with
Overdispersed
satisfy an upper bound on the posterior power. By an argument of
Count conditional probability we can show it equivalent to a smoothed
Endpoint
version of the predictive criterion:
Luca Pozzi
Introduction P{θ ∈ ΘE |Aj , Y } = EY ∗ P θ ∈ ΘE |Aj , Y ∗ , Y |Aj , Y (2)
Bayesian
Model
Averaging being
Dose-Response
Framework
PPS = PY ∗ {P{θ ∈ ΘE |Y ∗ , Y , Aj } ≥ c |Aj , Y }
Application
Study Layout
Markov inequality gives us the following:
Decision Rules
Computations Posterior Lower Bound
Simulations
Results EY ∗ P θ ∈ ΘE |Aj , Y ∗ , Y |Aj , Y P{θ ∈ ΘE |Aj , Y }
Conclusions PPS ≤ = (3)
c c
References
Thanks
15. Simulation Setup
A Bayesian
Adaptive Dose
Selection
Procedure with
Initial Allocation: assuming we start with 1 : a : b : c : 1:
Overdispersed
Count • a = 0, b = 1, c = 0, i.e. 1:0:1:0:1;
Endpoint
• a = 1, b = 1, c = 1, i.e. 1:1:1:1:1;
• a = 1, b = 2, c = 1, i.e. 1:1:2:1:1.
Luca Pozzi
Introduction
0.4
Predictive Probability Threshold: t = 0.5
Bayesian
Model
Averaging 0.6
Dose-Response
Framework
Application Number of Patients: split the 250 patients between the first
Study Layout and the second phase:
Decision Rules
Computations • 1/3 at interim and 2/3 for the next phase;
Simulations • half at interim and half for the next phase.
Results
Conclusions Size: 500 simulations with 500 simulated studies for
References prediction and N = 104 for the resampling.
Thanks
20. Summarizing
A Bayesian
Adaptive Dose
Selection
Procedure with 1 The procedure succeeds in detecting the properties of
Overdispersed
Count different Scenarios.
Endpoint
Luca Pozzi 2 The Adaptive Design, when using an appropriate
threshold, is more efficient than the non-adaptive one in
Introduction
Bayesian
terms of number of patients and not inferior in terms of
Model
Averaging
sensitivity and specificity.
Dose-Response
Framework
3 The BMA allows for correction of suboptimal interim
Application
decisions about the allocation.
Study Layout
Decision Rules 4 Increasing the threshold we require the dose to have a
higher margin of superiority (0.6 too strict).
Computations
Simulations
Results 5 The 1/3 - 2/3 proportion and the 1:0:1:0:1 allocation are
Conclusions
definitely less efficient than the other configurations.
References
Thanks
21. Some References
A Bayesian
Adaptive Dose
Selection
Procedure with 1 D.Ohlssen, A.Racine, A Flexible Bayesian Approach for
Overdispersed
Count
Modeling Monotonic Dose-Response Relationships in
Endpoint
Clinical Trials with Applications in Drug Development,
Luca Pozzi
Computational Statistics and Data Analysis,(Under
Introduction Revision);
Bayesian
Model 2 A.F.M Smith, A.E. Gelfand, Bayesian Statistics without
Averaging
Dose-Response
Tears, The American Statistician, (1992);
Framework
Application 3 J.A.Hoeting, D.Madigan, A.E.Raftery , C.T.Volinsky,
Study Layout Bayesian Model Averaging: a Tutorial (with Discussion).
Decision Rules
Computations Statistical Science, (1999);
Simulations
4 A.Doucet, A.M.Johansen et al., A Tutorial on Particle
Results
Conclusions Filtering and Smoothing: Fifteen Years Later. Tech.
References Report U.B.C., (2008)
Thanks
22. Acknowledgements
A Bayesian
Adaptive Dose
Thank you for your attention!!!
Selection
Procedure with Authors
Overdispersed
Count Luca Pozzi, U.C. Berkeley
Endpoint
Amy Racine, Novartis
Luca Pozzi
Heinz Schmidli, Novartis
Introduction Mauro Gasparini, Politecnico di Torino
Bayesian
Model
Averaging
Special Thanks to
Dose-Response
Framework David Ohlssen, Novartis
Application
Jouni Kerman, Novartis
Study Layout
Decision Rules
Computations
Funding
Simulations American Statistical Association, San Francisco-Bay Area Chapter
Results Travel Award.
Conclusions
MIUR (Italian Ministry for University and Research), PRIN 2007
References
prot. 2007AYHZWC ”Statistical methods for learning in clinical
Thanks
research”.