Publication Date
| In 2026 | 0 |
| Since 2025 | 174 |
| Since 2022 (last 5 years) | 853 |
| Since 2017 (last 10 years) | 900 |
| Since 2007 (last 20 years) | 906 |
Descriptor
Source
Author
| van der Linden, Wim J. | 17 |
| Kiers, Henk A. L. | 13 |
| ten Berge, Jos M. F. | 10 |
| Gongjun Xu | 9 |
| Gerlach, Vernon S. | 8 |
| Willett, Peter | 8 |
| Chun Wang | 7 |
| Stocking, Martha L. | 7 |
| Charp, Sylvia | 6 |
| Chen, Hsinchun | 6 |
| Craven, Timothy C. | 6 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 256 |
| Teachers | 128 |
| Researchers | 116 |
| Policymakers | 7 |
| Administrators | 5 |
| Students | 5 |
| Counselors | 1 |
| Media Staff | 1 |
| Support Staff | 1 |
Location
| China | 23 |
| Australia | 18 |
| Turkey | 16 |
| Netherlands | 14 |
| United States | 11 |
| USSR | 10 |
| California | 8 |
| Canada | 8 |
| Europe | 8 |
| Germany | 7 |
| South Korea | 7 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedNorton, Robert W. – Small Group Behavior, 1979
Maintains that coalitions form as a function of the popularity of an individual and the reciprocation between individuals. An algorithm is introduced, incorporating both popularity and reciprocation components, to generate units of analysis for coalition identification. The algorithm reflects aspects of the whole group and intensity of dyads.…
Descriptors: Algorithms, Group Behavior, Group Dynamics, Interaction Process Analysis
Peer reviewedBell, C. L. M.; Jones, K. P. – Information Processing and Management, 1980
Explains, with supporting figures and flowcharts of programing logic, two search strategies introduced to the MORPHS System since 1976: one that employs the normal Boolean operators in strings without bracketing or in the form of marked steps, and one that treats a string of keywords as a compound word. (Author/JD)
Descriptors: Algorithms, Flow Charts, Information Retrieval, Minicomputers
Peer reviewedClarkson, D. B.; Jennrich, R. I. – Psychometrika, 1980
A jackknife-like procedure is developed for producing standard errors of estimate in maximum likelihood factor analysis. Unlike earlier methods based on information theory, the procedure developed is computationally feasible on larger problems. Examples are given to demonstrate the feasibility of the method. (Author/JKS)
Descriptors: Algorithms, Data Analysis, Error of Measurement, Factor Analysis
Braun, Peter – Journal of Computer-Based Instruction, 1976
Teaching methods which emphasize understanding and insight can be effectively supported and expanded by using A Programming Language (APL) as a notation for both writing the algorithms of a discipline and then exploring the behavior of these algorithms by computer. (Author/LS)
Descriptors: Algorithms, Behavioral Objectives, Computer Oriented Programs, Programing Languages
Peer reviewedBaffes, Paul; Mooney, Raymond – Journal of Artificial Intelligence in Education, 1996
Discussion of student modeling and intelligent tutoring systems focuses on the development of the ASSERT algorithm (Acquiring Stereotypical Student Errors by Refining Theories). Topics include overlay modeling; bug libraries (databases of student misconceptions); dynamic modeling; refinement-based modeling; and experimental results from tests at…
Descriptors: Algorithms, Databases, Error Correction, Higher Education
Peer reviewedMiyamoto, Sadaaki – Information Processing & Management, 2003
Proposes a fuzzy multiset model for information clustering with application to information retrieval on the World Wide Web. Highlights include search engines; term clustering; document clustering; algorithms for calculating cluster centers; theoretical properties concerning clustering algorithms; and examples to show how the algorithms work.…
Descriptors: Algorithms, Information Retrieval, Mathematical Formulas, Models
Peer reviewedDatta, Anindya; Viguier, Igor R. – Information Systems, 1997
In environments where the state of the system changes rapidly, such as stock trading, air traffic control, network management, and process control, databases have been proposed as the platform to develop automated control systems. Information in such systems consists of "updates," reporting on the state of the environment and…
Descriptors: Air Traffic Control, Algorithms, Automation, Database Management Systems
Peer reviewedPinchback, C. L.; Tomer, Damber S. – Mathematics Teacher, 2002
Discusses an algorithm from Vedic mathematics that has similarities to FOIL and the standard algorithm for multiplication. (Author/NB)
Descriptors: Algorithms, Computation, Mathematical Applications, Mathematics Education
Mtetwa, David; Garofalo, Joe – Academic Therapy, 1989
The article identifies five incorrect beliefs about mathematics often held by students who have difficulty with mathematics. They include: the relative size of numbers is more important than the relationships between quantities; computation problems must be solved by using a step-by-step algorithm; mathematics problems have only one correct…
Descriptors: Algorithms, Arithmetic, Beliefs, Computation
Peer reviewedSharma, Ravi – Information Processing and Management, 1989
Introduces two distribution schemes that partition documents over multiple processors and the corresponding multiprocessor retrieval algorithms that match relevant documents to user queries. The suggested framework is based on a general purpose hypercube multicomputer architecture with a dedicated disk for each node. A timing analysis for the…
Descriptors: Algorithms, Cost Effectiveness, Efficiency, Information Retrieval
Peer reviewedHjerppe, Roland; Olander, Birgitta – Journal of the American Society for Information Science, 1989
Describes a project that developed two expert systems for library cataloging using the second edition of the Anglo American Cataloging Rules (AACR2) as a knowledge base. The discussion covers cataloging as interpretation, the structure of AACR2, and the feasibility of using expert systems for cataloging in traditional library settings. (26…
Descriptors: Algorithms, Cataloging, Expert Systems, Library Automation
Peer reviewedFornell, Claes; And Others – Multivariate Behavioral Research, 1988
This paper shows that redundancy maximization with J. K. Johansson's extension can be accomplished via a simple iterative algorithm based on H. Wold's Partial Least Squares. The model and the iterative algorithm for the least squares approach to redundancy maximization are presented. (TJH)
Descriptors: Algorithms, Equations (Mathematics), Least Squares Statistics, Mathematical Models
Peer reviewedKnol, Dirk L.; ten Berge, Jos M. F. – Psychometrika, 1989
An algorithm, based on a solution for C. I. Mosier's oblique Procrustes rotation problem, is presented for the best least-squares fitting correlation matrix approximating a given missing value or improper correlation matrix. Results are of interest for missing value and tetrachoric correlation, indefinite matrix correlation, and constrained…
Descriptors: Algorithms, Correlation, Equations (Mathematics), Estimation (Mathematics)
Peer reviewedHodgson, Ted – Educational Studies in Mathematics, 1996
Analysis of (n=92) university students' construction of visual representations (Venn diagrams) of eight set expressions found competent and error-prone students constructed and used procedures to complete set translation tasks, and two-thirds of observed errors arose from consistent implementation of ill-formed procedures. (Author/MKR)
Descriptors: Algorithms, College Students, Higher Education, Mathematics Skills
Peer reviewedNiaz, Mansoor – Science Education, 1995
Describes a study with the main objective of constructing models based on strategies students use to solve chemistry problems and to show that these models form sequences of progressive transitions termed "problemshifts" that increase the explanatory/heuristic power of the model. Results implies that the relationship between algorithmic…
Descriptors: Algorithms, Chemistry, Concept Formation, Models


