NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 26 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ivan Jaramillo; Geovanny Brito; Anthony Pachay; Duval Carvajal – Journal of Technology and Science Education, 2023
Data repositories currently constitute essential programs within institutions. In fact, universities are the primary institutions that promote the creation, management and storage for the safekeeping of a variety of documents, data and/or projects. This work is carried out within the framework of institutional need and the application of knowledge…
Descriptors: Archives, Information Storage, Universities, Algorithms
Peer reviewed Peer reviewed
Direct linkDirect link
Hagadone-Bedir, Mariah; Voithofer, Rick; Kulp, Jessica T. – British Journal of Educational Technology, 2023
This conceptual study uses dynamic systems theory (DST) and phenomenology as lenses to examine data privacy implications surrounding wearable devices that incorporate stakeholder, contextual and technical factors. Wearable devices can impact people's behaviour and sense of self, and DST and phenomenology provide complementary approaches for…
Descriptors: Privacy, Information Security, Assistive Technology, Systems Approach
Peer reviewed Peer reviewed
Direct linkDirect link
Yaohua Huang; Chengbo Zhang – International Journal of Web-Based Learning and Teaching Technologies, 2024
This study combines link grammar (LG) detector with N-grammar model to analyze and evaluate grammar in compositions. And then the composition level is judged through information entropy. Finally, the composition score is calculated based on the overall composition level and grammar weight. The experimental results show that the combined weight of…
Descriptors: Grammar, Student Evaluation, Artificial Intelligence, Writing (Composition)
Peer reviewed Peer reviewed
Raita, Timo; Teuhola, Jukka – Information Processing and Management, 1989
Presents three text compression methods of increasing power and evaluates each based on the trade-off between compression gain and processing time. The advantages of using hash coding for speed and optimal arithmetic coding to successor information for compression gain are discussed. (26 references) (Author/CLB)
Descriptors: Algorithms, Comparative Analysis, Data Processing, Efficiency
Peer reviewed Peer reviewed
Grotophorst, Clyde W. – Library Software Review, 1988
Describes a system that provides online access to holdings information for more than 4,500 journals on a single self-executing diskette. A brief discussion of data compression is offered, along with program listings in both BASIC and C. (MES)
Descriptors: Algorithms, Computer Software, Information Storage, Library Automation
Peer reviewed Peer reviewed
Sharma, Ravi – Information Processing and Management, 1989
Introduces two distribution schemes that partition documents over multiple processors and the corresponding multiprocessor retrieval algorithms that match relevant documents to user queries. The suggested framework is based on a general purpose hypercube multicomputer architecture with a dedicated disk for each node. A timing analysis for the…
Descriptors: Algorithms, Cost Effectiveness, Efficiency, Information Retrieval
Wirth, Niklaus – Scientific American, 1984
Built-in data structures are the registers and memory words where binary values are stored; hard-wired algorithms are the fixed rules, embodied in electronic logic circuits, by which stored data are interpreted as instructions to be executed. Various topics related to these two basic elements of every computer program are discussed. (JN)
Descriptors: Algorithms, Computer Science, Computer Software, Data
Peer reviewed Peer reviewed
Howard, Paul G; Vitter, Jeffrey Scott – Information Processing & Management, 1994
Describes a detailed algorithm for fast text compression. Related to the PPM (prediction by partial matching) method, it simplifies the modeling phase by eliminating the escape mechanism and speeds up coding by using a combination of quasi-arithmetic coding and Rice coding. Details of the use of quasi-arithmetic code tables are given, and their…
Descriptors: Algorithms, Coding, Electronic Text, Information Storage
Peer reviewed Peer reviewed
Lin, Jianhua; Storer, James A. – Information Processing & Management, 1994
Describes the design of optimal tree-structured vector quantizers that minimize the expected distortion subject to cost functions related to storage cost, encoding rate, or quantization time. Since the optimal design problem is intractable in most cases, the performance of a general design heuristic based on successive partitioning is analyzed.…
Descriptors: Algorithms, Coding, Comparative Analysis, Costs
Peer reviewed Peer reviewed
Shishibori, Masami; Koyama, Masafumi; Okada, Makoto; Aoe, Jun-ichi – Information Processing & Management, 2000
Discusses information retrieval and the use of binary trees as a fast access method for search strategies such as hashing. Proposes new methods based on compact binary trees that provide faster access and more compact storage, explains the theoretical basis, and confirms the validity of the methods through empirical observations. (LRW)
Descriptors: Access to Information, Algorithms, Information Retrieval, Information Storage
Peer reviewed Peer reviewed
Bratley, Paul; Choueka, Yaacov – Information Processing and Management, 1982
Presents uniform and efficient approach for processing all truncated query terms in information retrieval which requires one disk access to obtain from the permuted dictionary all strings represented by truncated term. The problem of the overhead storage required to implement the permuted dictionary is discussed. Fifteen references are provided.…
Descriptors: Algorithms, Information Retrieval, Information Storage, Information Systems
Peer reviewed Peer reviewed
Zaki, M.; Elboraey, F. – Information Processing and Management, 1985
Investigates applicability of inverted file processing in magnetic bubble memories by presenting four magnetic bubble memory models as storage mediums: one based on a major-minor loop configuration; one utilizing a decoder design on a magnetic bubble memory chip; and two based on different structural configurations of the first two. (MBR)
Descriptors: Algorithms, Classification, Computer Storage Devices, Data Processing
Peer reviewed Peer reviewed
Constantinescu, Cornel; Storer, James A. – Information Processing & Management, 1994
Presents a new image compression algorithm that employs some of the most successful approaches to adaptive lossless compression to perform adaptive online (single pass) vector quantization with variable size codebook entries. Results of tests of the algorithm's effectiveness on standard test images are given. (12 references) (KRN)
Descriptors: Algorithms, Coding, Data Processing, Evaluation
Peer reviewed Peer reviewed
Feygin, Gennady; And Others – Information Processing & Management, 1994
Presents two new algorithms for performing arithmetic coding without employing multiplication and discusses their implementation requirements. The first algorithm, suitable for an alphabet of arbitrary size, reduces the worst case excess length to under 0.8%. The second algorithm, suitable only for alphabets of less than 12 symbols, allows even…
Descriptors: Algorithms, Coding, Comparative Analysis, Evaluation
Peer reviewed Peer reviewed
Culik, Karel II; Kari, Jarkko – Information Processing & Management, 1994
Presents an inference algorithm that produces a weighted finite automata (WFA), in particular, the grayness functions of graytone images. Image-data compression results based on the new inference algorithm produces a WFA with a relatively small number of edges. Image-data compression results alone and in combination with wavelets are discussed.…
Descriptors: Algorithms, Coding, Comparative Analysis, Data Processing
Previous Page | Next Page »
Pages: 1  |  2