Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Data Processing | 3 |
Statistical Inference | 3 |
Bayesian Statistics | 2 |
Foreign Countries | 2 |
Simulation | 2 |
Accuracy | 1 |
Achievement Tests | 1 |
Algorithms | 1 |
Attitudes | 1 |
Behavior Patterns | 1 |
Bias | 1 |
More ▼ |
Author
Buchanan, Taylor L. | 1 |
Cai, Chaoli | 1 |
Chun Wang | 1 |
Gongjun Xu | 1 |
Jing Lu | 1 |
Jiwei Zhang | 1 |
Lohse, Keith R. | 1 |
Sainan Xu | 1 |
Publication Type
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Journal Articles | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Location
Canada | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 1 |
What Works Clearinghouse Rating
Sainan Xu; Jing Lu; Jiwei Zhang; Chun Wang; Gongjun Xu – Grantee Submission, 2024
With the growing attention on large-scale educational testing and assessment, the ability to process substantial volumes of response data becomes crucial. Current estimation methods within item response theory (IRT), despite their high precision, often pose considerable computational burdens with large-scale data, leading to reduced computational…
Descriptors: Educational Assessment, Bayesian Statistics, Statistical Inference, Item Response Theory
Buchanan, Taylor L.; Lohse, Keith R. – Measurement in Physical Education and Exercise Science, 2016
We surveyed researchers in the health and exercise sciences to explore different areas and magnitudes of bias in researchers' decision making. Participants were presented with scenarios (testing a central hypothesis with p = 0.06 or p = 0.04) in a random order and surveyed about what they would do in each scenario. Participants showed significant…
Descriptors: Researchers, Attitudes, Statistical Significance, Bias
Cai, Chaoli – ProQuest LLC, 2009
Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…
Descriptors: Energy Conservation, Testing, Computer Security, Statistical Inference