Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Software | 7 |
| Models | 6 |
| Data Analysis | 2 |
| Academic Libraries | 1 |
| Benchmarking | 1 |
| Causal Models | 1 |
| Computer Simulation | 1 |
| Computers | 1 |
| Contracts | 1 |
| Costs | 1 |
| Data Interpretation | 1 |
| More ▼ | |
Source
| Grantee Submission | 1 |
| International Journal of… | 1 |
| Library Software Review | 1 |
| National Science Teachers… | 1 |
| Online | 1 |
Author
| Angier, Jennifer J. | 1 |
| Bret Staudt Willet | 1 |
| Draper, Jesse M. | 1 |
| Ferguson, Sarah L. | 1 |
| Gallagher, Leonard J. | 1 |
| Guan Saw | 1 |
| Hoehl, Susan B. | 1 |
| Hull, Darrell M. | 1 |
| Johnson, Millard F., Jr. | 1 |
| Joshua Rosenberg | 1 |
| Ken Frank | 1 |
| More ▼ | |
Publication Type
| Guides - General | 7 |
| Journal Articles | 3 |
| Reports - Descriptive | 3 |
| Books | 1 |
| Opinion Papers | 1 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedKen Frank; Guan Saw; Qinyun Lin; Ran Xu; Joshua Rosenberg; Spiro Maroulis; Bret Staudt Willet – Grantee Submission, 2025
This is a practical guide for applying the Impact Threshold for a Confounding Variable and the Robustness of Inference to Replacement using the konfound packages in Stata and R as well as the R-shiny app. It includes motivation worked examples, and tutorials.
Descriptors: Robustness (Statistics), Statistical Inference, Programming Languages, Computer Software
Ferguson, Sarah L.; Moore, E. Whitney G.; Hull, Darrell M. – International Journal of Behavioral Development, 2020
The present guide provides a practical guide to conducting latent profile analysis (LPA) in the Mplus software system. This guide is intended for researchers familiar with some latent variable modeling but not LPA specifically. A general procedure for conducting LPA is provided in six steps: (a) data inspection, (b) iterative evaluation of models,…
Descriptors: Statistical Analysis, Computer Software, Data Analysis, Goodness of Fit
Gallagher, Leonard J.; Draper, Jesse M. – 1984
A tutorial introduction to data models in general is provided, with particular emphasis on the relational and network models defined by the two proposed ANSI (American National Standards Institute) database language standards. Examples based on the network and relational models include specific syntax and semantics, while examples from the other…
Descriptors: Computer Software, Databases, Information Retrieval, Information Storage
Robertson, William C. – National Science Teachers Association (NJ3), 2005
Shocked by static? Mixed up about magnets? Curious about currents? Teachers can get past memorizing all those electricity-related formulas, rules, and procedures so they can understand the subject at a level deep enough to teach it with confidence and comfort. Here to help is "Electricity and Magnetism," the fifth title in the award-winning NSTA…
Descriptors: Computer Software, Science Teachers, Information Needs, Energy
Peer reviewedJohnson, Millard F., Jr. – Library Software Review, 1987
Suggests a model for using a spreadsheet to allocate academic library salary increases. Seven variables are incorporated in the model: (1) experience; (2) difficulty of the job; (3) initiative; (4) cost of living; (5) inflation; (6) equity; and (7) merit. One reference is listed. (MES)
Descriptors: Academic Libraries, Computer Software, Higher Education, Library Administration
Letmanyi, Helen – 1984
Developed to identify and qualitatively assess computer system evaluation techniques for use during acquisition of general purpose computer systems, this document presents several criteria for comparison and selection. An introduction discusses the automatic data processing (ADP) acquisition process and the need to plan for uncertainty through…
Descriptors: Benchmarking, Computer Simulation, Computer Software, Computers
Angier, Jennifer J.; Hoehl, Susan B. – Online, 1986
Presents a planning model for the automation of operations in a large hospital library and specifically describes the design and implementation of a local area network. Part 1 deals with the evolution of the idea, system planning, and design, and Part 2 addresses installation and implementation issues. (EM)
Descriptors: Computer Software, Hospital Libraries, Library Automation, Library Planning

Direct link
