Publication Date
In 2025 | 77 |
Since 2024 | 391 |
Since 2021 (last 5 years) | 767 |
Since 2016 (last 10 years) | 793 |
Since 2006 (last 20 years) | 796 |
Descriptor
Source
Author
van der Linden, Wim J. | 17 |
Kiers, Henk A. L. | 13 |
ten Berge, Jos M. F. | 10 |
Gongjun Xu | 9 |
Gerlach, Vernon S. | 8 |
Willett, Peter | 8 |
Chun Wang | 7 |
Stocking, Martha L. | 7 |
Charp, Sylvia | 6 |
Chen, Hsinchun | 6 |
Craven, Timothy C. | 6 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 255 |
Teachers | 126 |
Researchers | 114 |
Policymakers | 6 |
Administrators | 5 |
Students | 4 |
Counselors | 1 |
Media Staff | 1 |
Support Staff | 1 |
Location
China | 17 |
Australia | 16 |
Netherlands | 14 |
Turkey | 13 |
USSR | 10 |
United States | 9 |
California | 8 |
United Kingdom (England) | 7 |
Brazil | 6 |
Europe | 6 |
Germany | 6 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Rorvig, Mark E. – Journal of the American Society for Information Science, 1993
Describes a method for automatically selecting key frames that can be used to represent the total image sequence of visual documents. An abstracting algorithm developed at the National Aeronautics and Space Administration is explained, and extensive examples of abstracted motion sequences are presented. (eight references) (LRW)
Descriptors: Abstracting, Algorithms, Automation, Films

Chang, Chin-Chen; Wu, Tzong-Chen – Information Processing and Management, 1993
Proposes and explains a new mechanism for controlling the access requests in information protection systems that is based on Newton's interpolating polynomial. Access control matrices are discussed; single-key-lock systems are described; relevant algorithms are explained; and an example of the new mechanism is included. (10 references) (LRW)
Descriptors: Access to Information, Algorithms, Information Systems, Mathematical Formulas

Howard, Paul G.; Vitter, Jeffrey Scott – Information Processing and Management, 1992
Analyzes the amount of compression possible when arithmetic coding is used for text compression in conjunction with various input models. Algorithms are analyzed; modeling effects are considered; scaling is discussed; higher order models are examined, including prediction by partial matching; and coding effects are described. (34 references) (LRW)
Descriptors: Algorithms, Coding, Computation, Information Processing

Grosswald, Sarina J. – Journal of Continuing Education in the Health Professions, 1992
Three experienced and eight novice physicians were asked to solve three problems. Results indicated that the ability to incorporate contextual information contributed to effective solutions. Experienced physicians tended to use more inclusive approaches, although both groups demonstrated premature diagnostic bias. (SK)
Descriptors: Algorithms, Experience, Heuristics, Physicians

Wood, Phillip – Multivariate Behavioral Research, 1992
Two Statistical Analysis System (SAS) macros are presented that perform the modified principal components approach of L. R. Tucker (1966) to modeling generalized learning curves analysis up to a rotation of the components. Three SAS macros are described that rotate the factor patterns to have characteristics Tucker considered desirable. (SLD)
Descriptors: Algorithms, Change, Computer Software, Factor Analysis

Collins, Linda M.; Wugalter, Stuart E. – Multivariate Behavioral Research, 1992
A simulation study was conducted to determine whether latent class model parameters are recovered adequately by Latent Transition Analysis (LTA). Results indicate that parameter recovery is satisfactory overall and that the benefits of adding indicators outweigh the costs. Additional indicators also improve standard errors. An example of LTA is…
Descriptors: Algorithms, Computer Simulation, Longitudinal Studies, Mathematical Models

Borgman, Christine L.; Siegfried, Susan L. – Journal of the American Society for Information Science, 1992
Discusses problems of matching personal names in information systems and factors influencing design of personal name matching algorithms. Several examples of name matching systems in the fields of art history, bibliography, commerce, genealogy, and law enforcement used for the purposes of authority control, information retrieval, and duplicate…
Descriptors: Algorithms, Art History, Artists, Information Retrieval

Rindskopf, David – Psychometrika, 1992
A general approach is described for the analysis of categorical data when there are missing values on one or more observed variables. The method is based on generalized linear models with composite links. Situations in which the model can be used are described. (SLD)
Descriptors: Algorithms, Classification, Data Analysis, Estimation (Mathematics)

Rozeboom, William W. – Multivariate Behavioral Research, 1992
Enriching factor rotation algorithms with the capacity to conduct repeated searches from random starting points can make the tendency to converge to optima that are merely local a way to catch rotations of the input factors that might otherwise elude discovery. Use of the HYBALL computer program is discussed. (SLD)
Descriptors: Algorithms, Comparative Analysis, Factor Analysis, Factor Structure

Belbin, Lee; And Others – Multivariate Behavioral Research, 1992
A method for hierarchical agglomerative polythetic (multivariate) clustering, based on unweighted pair group using arithmetic averages (UPGMA) is compared with the original beta-flexible technique, a weighted average method. Reasons the flexible UPGMA strategy is recommended are discussed, focusing on the ability to recover cluster structure over…
Descriptors: Algorithms, Cluster Analysis, Comparative Analysis, Equations (Mathematics)

Commandeur, Jacques J. F.; Groenen, Patrick J. F.; Meulman, Jacqueline J. – Psychometrika, 1999
Presents two methods for including weights in distance-based nonlinear multivariate data analysis. One method assigns weights to the objects, while the other is concerned with differential weighing of groups of variables. Discusses applications of these weighting schemes and proposed an algorithm to minimize the corresponding loss function. (SLD)
Descriptors: Algorithms, Multidimensional Scaling, Multivariate Analysis, Research Methodology

Sanders, Piet F.; Verschoor, Alfred J. – Applied Psychological Measurement, 1998
Presents minimization and maximization models for parallel test construction under constraints. The minimization model constructs weakly and strongly parallel tests of minimum length, while the maximization model constructs weakly and strongly parallel tests with maximum test reliability. (Author/SLD)
Descriptors: Algorithms, Models, Reliability, Test Construction

van der Linden, Wim J.; Adema, Jos J. – Journal of Educational Measurement, 1998
Proposes an algorithm for the assembly of multiple test forms in which the multiple-form problem is reduced to a series of computationally less intensive two-form problems. Illustrates how the method can be implemented using 0-1 linear programming and gives two examples. (SLD)
Descriptors: Algorithms, Linear Programming, Test Construction, Test Format

Mather, Laura A. – Journal of the American Society for Information Science, 2000
Discussion of models for information retrieval focuses on an application of linear algebra to text clustering, namely, a metric for measuring cluster quality based on the theory that cluster quality is proportional to the number of terms that are disjoint across the clusters. Explains term-document matrices and clustering algorithms. (Author/LRW)
Descriptors: Algorithms, Cluster Analysis, Information Retrieval, Mathematical Formulas

Mostafa, J.; Lam, W. – Information Processing & Management, 2000
Presents a multilevel model of the information filtering process that permits document classification. Evaluates a document classification approach based on a supervised learning algorithm, measures the accuracy of the algorithm in a neural network that was trained to classify medical documents on cell biology, and discusses filtering…
Descriptors: Algorithms, Classification, Cytology, Evaluation Methods