[1]
|
Morrison, W.P. and Peairs, F.B. (1994) Response Model Concept and Economic Impact. Proceedings of the Thomas Say Publications in Entomology, Entomological Society of America, Lanham, 16 December 1994, 1-11.
|
[2]
|
Kovacs, K.F., Haight, R.G., McCullough, D.G., Mercader, R.J., Siegert, N.W. and Liebhold, A.M. (2010) Cost of Potential Emerald Ash Borer Damage in US Communities, 2009-2019. Ecological Economics, 69, 569-578.
http://dx.doi.org/10.1016/j.ecolecon.2009.09.004
|
[3]
|
Rabaglia, R., Duerr, D., Acciavatti, R. and Ragenovich, I. (2008) Early Detection and Rapid Response for Non-Native Bark and Ambrosia Beetles. U.S.D.A. Forest Service, Forest Health Protection, Washington DC, 2 Pages.
|
[4]
|
Legg, D.E and Archer, T.L. (1994) Sampling Methods, Economic Injury Levels, and Economic Thresholds for the Russian Wheat Aphid (Homoptera: Aphididae). Proceedings of the Thomas Say Publications in Entomology, Entomological Society of America, Lanham, 16 December 1994, 313-336.
|
[5]
|
Legg, D.E, Fidgen, J.G. and Ryall, K.L. (2010) Computing Union Probabilities of Many Independent Events: With a Case Study Example on Sampling of the Invasive Emerald Ash Borer, Agrilus planipennis.
http://w3.uwyo.edu/~dlegg/union2.html
|
[6]
|
Efron, B. and Tibshirani, R.J. (1993) An Introduction to the Bootstrap. Section 6.4, Chapman & Hall/CRC, Boca Raton, 50-53.
|
[7]
|
Fidgen, J.G., Legg, D.E. and Salom, S.M. (2006) Binomial Sequential Sampling Plan for Hemlock Wooly Adelgid (Hemiptera: Adelgidae) Sistens Infesting Individual Eastern Hemlock Trees. Journal of Economic Entomology, 99, 1500-1508. http://dx.doi.org/10.1603/0022-0493-99.4.1500
|
[8]
|
Press, W.H., Teukolsky, S.A., Vetterling, W.T. and Flannery, B.P. (2003) Numerical Recipes in FORTRAN 77. 2nd Edition, Vol. 1, Cambridge University Press, Cambridge, 267-276.
|
[9]
|
Fisher, R.A. and Yates, F. (1938) Statistical Tables for Biological, Agricultural, and Medical Research. Oliver and Boyd, London, 20, Example 12.
|
[10]
|
Durstenfield, R. (1964) Algorithm 235: Random Permutation. Communications of the ACM, 7, 420.
http://dx.doi.org/10.1145/364520.364540
|
[11]
|
Knuth, D.E. (1969) The Art of Computer Programming. Vol. 2, 3rd Edition, Addison-Wessley, Reading, 124-125.
|
[12]
|
Haberman, S.J. (1978) Analysis of Qualitative Data. Vol. 1, Academic, New York, 292-353.
|
[13]
|
Legg, D. (2003) LINLOGIT: A Computer Program for Calculating Linear Logistic Regression Functions.
http://w3.uwyo.edu/~dlegg/curve.html
|
[14]
|
Poland, T.M. and McCullough, D.G. (2006) Emerald Ash Borer: Invasion of the Urban Forest and the Threat to North America’s Ash Resource. Journal of Forestry, 104, 118-124.
|
[15]
|
Ryall, K.L., Fidgen, J.G. and Turgeon, J.J. (2011) Detectability of the Emerald Ash Borer (Coleoptera: Buprestidae) in Asymptomatic Urban Trees by Using Branch Samples. Environmental Entomology, 40, 679-688.
http://dx.doi.org/10.1603/EN10310
|
[16]
|
Legg, D.E. and Yeargan, K.V. (1985) Method for Random Sampling Insect Populations. Journal of Economic Entomology, 78, 1003-1008.
|