Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Bayesian Statistics | 2 |
| Data Processing | 2 |
| Statistical Inference | 2 |
| Accuracy | 1 |
| Achievement Tests | 1 |
| Algorithms | 1 |
| Behavior Patterns | 1 |
| Computation | 1 |
| Computer Security | 1 |
| Data Analysis | 1 |
| Data Collection | 1 |
| More ▼ | |
Source
| Grantee Submission | 1 |
| ProQuest LLC | 1 |
Publication Type
| Dissertations/Theses -… | 1 |
| Reports - Research | 1 |
Education Level
| Secondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 1 |
What Works Clearinghouse Rating
Sainan Xu; Jing Lu; Jiwei Zhang; Chun Wang; Gongjun Xu – Grantee Submission, 2024
With the growing attention on large-scale educational testing and assessment, the ability to process substantial volumes of response data becomes crucial. Current estimation methods within item response theory (IRT), despite their high precision, often pose considerable computational burdens with large-scale data, leading to reduced computational…
Descriptors: Educational Assessment, Bayesian Statistics, Statistical Inference, Item Response Theory
Cai, Chaoli – ProQuest LLC, 2009
Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…
Descriptors: Energy Conservation, Testing, Computer Security, Statistical Inference

Peer reviewed
Direct link
