NotesFAQContact Us
Collection
Advanced
Search Tips
Education Level
Audience
Practitioners9
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 138 results Save | Export
Peer reviewed Peer reviewed
Wright, William R. – Journal of the American Society for Information Science, 1972
Descriptors: Algorithms, Computer Programs, Correlation, Documentation
Peer reviewed Peer reviewed
Dolker, Michael; And Others – Psychometrika, 1982
Efron's Monte Carlo bootstrap algorithm is shown to cause degeneracies in Pearson's r for sufficiently small samples. Two ways of preventing this problem when programing the bootstrap of r are considered. (Author)
Descriptors: Algorithms, Computer Programs, Correlation, Sampling
Peer reviewed Peer reviewed
Tadikamalla, Pandu R. – Psychometrika, 1980
Six different algorithms to generate widely different non-normal distributions are reviewed. These algorithms are compared in terms of speed, simplicity, and generality of the technique. The advantages and disadvantages of using these algorithms are briefly discussed. (Author)
Descriptors: Algorithms, Computer Programs, Nonparametric Statistics, Statistics
Peer reviewed Peer reviewed
Hofmann, Richard J. – Educational and Psychological Measurement, 1978
A general factor analysis computer algorithm is briefly discussed. The algorithm is highly transportable with minimum limitations on the number of observations. Both singular and non-singular data can be analyzed. (Author/JKS)
Descriptors: Algorithms, Computer Programs, Factor Analysis, Transformations (Mathematics)
Peer reviewed Peer reviewed
Yu, Clement T. – Journal of the American Society for Information Science, 1974
A clustering algorithm which is tree-like in structure, and is based on user queries, is presented. It is compared to some existing algorithms and is found to be superior. (Author)
Descriptors: Algorithms, Classification, Cluster Analysis, Cluster Grouping
Christensen, Borge – People's Computers, 1978
This article is a tutorial on writing a simulator--the example used is a casino. The nontechnical, step by step approach is designed to enable even non-programmers to understand the design of such a simulation. (Author)
Descriptors: Algorithms, Computer Programs, Design, Game Theory
Kirk, David B. – 1971
Improvements of the Gaussian quadrature in conjunction with the Newton-Raphson iteration technique (TM 000 789) are discussed as effective methods of calculating the bivariate normal correlation coefficient. (CK)
Descriptors: Algorithms, Computer Programs, Correlation, Mathematical Models
Voros, Todd, L. – People's Computers, 1978
Sketchcode is a metaprograming pseudo-language documentation technique intended to simplify the process of program writing and debugging for both high and low-level users. Helpful hints and examples for the use of the technique are included. (CMV)
Descriptors: Algorithms, Computer Programs, Documentation, Flow Charts
Schuegraf, E. J. – Information Storage and Retrieval, 1973
The design of programs to search large document data bases is discussed with regard to the use of compression coding combined with adoption of word fragments as the basic language elements. An algorithm is described for determination of a set of almost equifrequent fragments. Its efficiency is tested. (23 references) (Author)
Descriptors: Algorithms, Computer Programs, Information Retrieval, Information Storage
Peer reviewed Peer reviewed
Yannakoudakis, E. J.; Fawthrop, D. – Information Processing and Management, 1983
Results of analysis of 1,377 spelling error forms including three categories of spelling errors (consonantal, vowel, and sequential) demonstrate that majority of spelling errors are highly predictable when set of predefined rules based on phonological and sequential considerations are followed algorithmically. Eleven references and equivalent…
Descriptors: Algorithms, Computer Programs, Consonants, Error Patterns
Peer reviewed Peer reviewed
Tritchler, D. L.; Pedrini, D. T. – Educational and Psychological Measurement, 1975
Considered in this paper are a mathematical discussion and an algorithm, and a computer program for Fisher's test. (Author)
Descriptors: Algorithms, Computer Programs, Hypothesis Testing, Input Output
Peer reviewed Peer reviewed
McClelland, Gary; Coombs, Clyde H. – Psychometrika, 1975
ORDMET is applicable to structures obtained from additive conjoint measurement designs, unfolding theory, general Fechnerian scaling, types of multidimensional scaling, and ordinal multiple regression. A description is obtained of the space containing all possible numerical representations which can satisfy the structure, size, and shape of which…
Descriptors: Algorithms, Computer Programs, Data Analysis, Matrices
Peer reviewed Peer reviewed
Wolff, J. G. – British Journal of Psychology, 1975
The main purpose of this paper is to describe and discuss the mechanism and properties of a computer program which can achieve an analogous segmentation of letter strings on punched cards. (Author)
Descriptors: Algorithms, Computer Programs, Phonemes, Program Descriptions
Lederman, Barbara J. – Journal of Computer-Based Instruction, 1975
Useful programming tricks are suggested to allow the reduction of many equations and non-polynomial-like expressions and the subsequent application of the mathematical algorithms. (Author)
Descriptors: Algebra, Algorithms, Computer Programs, Computer Science
PDF pending restoration PDF pending restoration
Rothstein, Jerome – 1977
Addressing the problem of protecting confidential information and data stored in computer databases from access by unauthorized parties, this paper details coding schemes which present such astronomical work factors to potential code breakers that security breaches are hopeless in any practical sense. Two procedures which can be used to encode for…
Descriptors: Algorithms, Codification, Computer Programs, Confidentiality
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10