Publication Date
In 2025 | 71 |
Since 2024 | 384 |
Since 2021 (last 5 years) | 759 |
Since 2016 (last 10 years) | 785 |
Since 2006 (last 20 years) | 788 |
Descriptor
Source
Author
van der Linden, Wim J. | 17 |
Kiers, Henk A. L. | 13 |
ten Berge, Jos M. F. | 10 |
Gongjun Xu | 9 |
Gerlach, Vernon S. | 8 |
Willett, Peter | 8 |
Chun Wang | 7 |
Stocking, Martha L. | 7 |
Charp, Sylvia | 6 |
Chen, Hsinchun | 6 |
Craven, Timothy C. | 6 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 255 |
Teachers | 126 |
Researchers | 114 |
Policymakers | 6 |
Administrators | 5 |
Students | 4 |
Counselors | 1 |
Media Staff | 1 |
Support Staff | 1 |
Location
China | 17 |
Australia | 15 |
Netherlands | 14 |
Turkey | 12 |
USSR | 10 |
United States | 9 |
California | 8 |
United Kingdom (England) | 7 |
Brazil | 6 |
Europe | 6 |
Germany | 6 |
More ▼ |
Laws, Policies, & Programs
Elementary and Secondary… | 2 |
Coronavirus Aid Relief and… | 1 |
Family Educational Rights and… | 1 |
Privacy Act 1974 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating

Kiers, Henk A. L.; And Others – Psychometrika, 1990
An algorithm is described for fitting the DEDICOM model (proposed by R. A. Harshman in 1978) for the analysis of asymmetric data matrices. The method modifies a procedure proposed by Y. Takane (1985) to provide guaranteed monotonic convergence. The algorithm is based on a technique known as majorization. (SLD)
Descriptors: Algorithms, Data Analysis, Generalizability Theory, Matrices

van der Linden, Wim J.; Boekkooi-Timminga, Ellen – Applied Psychological Measurement, 1988
Gulliksen's matched random subtests method is a graphical method to split a test into parallel test halves, allowing maximization of coefficient alpha as a lower bound to the classical test reliability coefficient. This problem is formulated as a zero-one programing problem solvable by algorithms that already exist. (TJH)
Descriptors: Algorithms, Equations (Mathematics), Programing, Test Reliability

Ozkarahan, Esen – Information Processing & Management, 1995
This study develops an integrated conceptual representation scheme for multimedia documents that are viewed to comprise an object-oriented database; the necessary abstractions for the conceptual model and extensions to the relational model used as the search structure; a retrieval model that includes associative, semantic and media-specific…
Descriptors: Algorithms, Information Retrieval, Models, Multimedia Materials

Kiers, Henk A. L. – Psychometrika, 1995
Monotonically convergent algorithms are described for maximizing sums of quotients of quadratic forms. Six (constrained) functions are investigated. The general formulation of the functions and the algorithms allow for application of the algorithms in various situations in multivariate analysis. (SLD)
Descriptors: Algorithms, Equations (Mathematics), Matrices, Multivariate Analysis

Markas, Tassos; Reif, John – Information Processing and Management, 1992
Presents a class of distortion controlled vector quantizers that are capable of compressing images so they comply with certain distortion requirements. Highlights include tree-structured vector quantizers; multiresolution vector quantization; error coding vector quantizer; error coding multiresolution algorithm; and Huffman coding of the quad-tree…
Descriptors: Algorithms, Coding, Information Processing, Mathematical Formulas

Scheines, Richard; Spirtes, Peter; Glymour, Clark; Meek, Christopher; Richardson, Thomas – Multivariate Behavioral Research, 1998
The TETRAD for constraint-based aids to causal model specification project and related work in computer science aims to apply standards of rigor and precision to the problem of using data and background knowledge to make inferences about a model's specifications. Several algorithms that are implemented in the TETRAD II program are presented. (SLD)
Descriptors: Algorithms, Computer Science, Inferences, Models

Kiers, Henk A. L.; Groenen, Patrick – Psychometrika, 1996
An iterative majorization algorithm is proposed for orthogonal congruence rotation that is guaranteed to converge from every starting point. In addition, the algorithm is easier to program than the algorithm proposed by F. B. Brokken, which is not guaranteed to converge. The derivation of the algorithm is traced in detail. (SLD)
Descriptors: Algorithms, Comparative Analysis, Matrices, Orthogonal Rotation

Guerrero, Vicente P.; Moya Anegon, Felix de – Journal of the American Society for Information Science and Technology, 2001
Discusses vectors used in information retrieval and the algorithms used to manipulate them. Uses the Kohonen neural algorithm and a fuzzification model to perform a fuzzy clustering of document terms to reduce the high dimension and presents results from a test database. (Author/LRW)
Descriptors: Algorithms, Information Retrieval, Subject Index Terms

Wu, Ing-Long – Journal of Educational and Behavioral Statistics, 2001
Presents two binary programming models with a special network structure that can be explored computationally for simultaneous test construction. Uses an efficient special purpose network algorithm to solve these models. An empirical study illustrates the approach. (SLD)
Descriptors: Algorithms, Computer Software, Networks, Test Construction

Mihoubi, Houria; Simonet, Ana; Simonet, Michel – Information Systems, 1998
Examines how a domain ontology can be reused by different knowledge representation systems. Describes a meta-language which allows a declarative description of any model based on frames, objects, relations, or description logics. Discusses the meta-relation concept which, associated to a definition, represents the signification of the construct…
Descriptors: Algorithms, Information Systems, Knowledge Representation, Models

Kolata, Gina Bari – Science, 1974
Although today's computers can perform as many as one million operations per second, there are many problems that are still too large to be solved in a straightforward manner. Recent work indicates that many approximate solutions are useful and more efficient than exact solutions. (Author/RH)
Descriptors: Algorithms, Computers, Mathematics, Prediction

King, Donald R. – Journal of Library Automation, 1974
The binary vector is suggested as an alternative to the usual method of storing document pointers in an inverted index file. (Author)
Descriptors: Algorithms, Databases, Indexes, Information Retrieval
Kam, Alan C. H. – 1970
The report is a collection of internal reports dealing with the library management. The preliminary design details the anticipated system. The structure of data base reveals the implementation scheme on an IBM 2314 Disk Facility. Various algorithms are presented to document the actual system conditioned by using XPL and OS/MVT/HASP. Finally a…
Descriptors: Administration, Algorithms, Data Processing, Information Systems

Gold, E. Mark; Hoffman, Paul J. – Multivariate Behavioral Research, 1976
A clustering technique is described, the objective of which is to detect deviant subpopulations which deviate from a primary subpopulation in a well defined direction. (Author/DEP)
Descriptors: Algorithms, Cluster Analysis, Cluster Grouping, Mathematical Models

Hofmann, Richard J. – Educational and Psychological Measurement, 1978
A general factor analysis computer algorithm is briefly discussed. The algorithm is highly transportable with minimum limitations on the number of observations. Both singular and non-singular data can be analyzed. (Author/JKS)
Descriptors: Algorithms, Computer Programs, Factor Analysis, Transformations (Mathematics)