Publication Date
| In 2026 | 0 |
| Since 2025 | 178 |
| Since 2022 (last 5 years) | 858 |
| Since 2017 (last 10 years) | 905 |
| Since 2007 (last 20 years) | 911 |
Descriptor
Source
Author
| van der Linden, Wim J. | 17 |
| Kiers, Henk A. L. | 13 |
| ten Berge, Jos M. F. | 10 |
| Gongjun Xu | 9 |
| Gerlach, Vernon S. | 8 |
| Willett, Peter | 8 |
| Chun Wang | 7 |
| Stocking, Martha L. | 7 |
| Charp, Sylvia | 6 |
| Chen, Hsinchun | 6 |
| Craven, Timothy C. | 6 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 256 |
| Teachers | 128 |
| Researchers | 116 |
| Policymakers | 7 |
| Administrators | 5 |
| Students | 5 |
| Counselors | 1 |
| Media Staff | 1 |
| Support Staff | 1 |
Location
| China | 23 |
| Australia | 18 |
| Turkey | 16 |
| Netherlands | 14 |
| United States | 11 |
| USSR | 10 |
| California | 8 |
| Canada | 8 |
| Europe | 8 |
| Germany | 7 |
| South Korea | 7 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedWright, William R. – Journal of the American Society for Information Science, 1972
Descriptors: Algorithms, Computer Programs, Correlation, Documentation
Mason, Robert M. – J Res Mus Educ, 1969
Descriptors: Algorithms, Harmony (Music), Music Theory
Peer reviewedLowe, Thomas – Journal of the American Society for Information Science, 1971
Frequently it is useful to abbreviate or otherwise transform keys used for information retrieval. Given a transformation algorithm and data to be transformed, certain qualities of the algorithm relating to retrieval problems can be characterized. This paper gives some measures of effectiveness of such transformation algorithms. (11 references)…
Descriptors: Algorithms, Information Retrieval, Search Strategies
Peer reviewedPhillips, J. P. N. – Psychometrika, 1982
An algorithm, using a short cut due to Feldman and Klingler, for the Fisher-Yates exact test is presented. The algorithm is quick, simple and accurate. (Author)
Descriptors: Algorithms, Expectancy Tables, Nonparametric Statistics
Peer reviewedFinkbeiner, C. T.; Tucker, L. R. – Psychometrika, 1982
The residual variance is often used as an approximation to the uniqueness in factor analysis. An upper bound approximation to the residual variance is presented for the case when the correlation matrix is singular. (Author/JKS)
Descriptors: Algorithms, Correlation, Factor Analysis, Matrices
Peer reviewedDolker, Michael; And Others – Psychometrika, 1982
Efron's Monte Carlo bootstrap algorithm is shown to cause degeneracies in Pearson's r for sufficiently small samples. Two ways of preventing this problem when programing the bootstrap of r are considered. (Author)
Descriptors: Algorithms, Computer Programs, Correlation, Sampling
Peer reviewedCraven, Timothy C. – Journal of the American Society for Information Science, 1982
Describes a system for the automatic coding of most descriptive titles which generates Nested Phrase Indexing System (NEPHIS) input strings of sufficient quality for permuted index production. A series of examples and an 11-item reference list accompany the text. (JL)
Descriptors: Algorithms, Automatic Indexing, Permuted Indexes
Peer reviewedHafner, Robert – Psychometrika, 1981
The method proposed by Harman and Fukuda to treat the so-called Heywood case in the minres method in factor analysis (i.e., the case where the resulting communalities are greater than one) involves the frequent solution of eigenvalue problems. A simple method to treat this problem is presented. (Author/JKS)
Descriptors: Algorithms, Data Analysis, Factor Analysis
Peer reviewedten Berge, Jos M. F.; And Others – Psychometrika, 1981
Several algorithms for computing the greatest lower bound to reliability or the constrained minimum-trace communality solution in factor analysis have been developed. The convergence properties of these methods are examined. A uniqueness proof for the desired solution is offered. (Author/JKS)
Descriptors: Algorithms, Factor Analysis, Test Reliability
Peer reviewedPrice, Lewis C. – Psychometrika, 1980
Two algorithms based on a latent class model are presented for discovering hierarchical relations that exist among a set of dichotomous items. The algorithms presented, and three competing deterministic algorithms are compared using computer-generated data. (Author/JKS)
Descriptors: Algorithms, Mathematical Models, Statistical Analysis
Peer reviewedHeuchenne, Christian – Structural Equation Modeling, 1997
A rule is presented to identify the model in structural equation modeling. This rule includes the null B and recursive rules as extreme cases. Proof is given for the theorem. (SLD)
Descriptors: Algorithms, Identification, Structural Equation Models
Peer reviewedShipley, Bill – Structural Equation Modeling, 2002
Describes a method for choosing rejection probabilities for the tests of independence that are used in constraint-based algorithms of exploratory path analysis. The method consists of generating a Markov or semi-Markov model from the equivalence class represented by a partial ancestral graph and then testing the d-separation implications. (SLD)
Descriptors: Algorithms, Markov Processes, Path Analysis
Peer reviewedThiele, Harold E., Jr. – Library Trends, 1990
Adapting the principles that have evolved in the development of heraldry to current needs, an algorithm was developed to aid in the description of graphic designs. It provides an efficient method of describing trademarks, logos, and other designs so that they can be found quickly using mechanical searching techniques. (26 references) (EAM)
Descriptors: Algorithms, Graphic Arts, Online Searching
Peer reviewedClarkson, Douglas B.; Gonzalez, Richard – Psychometrika, 2001
Defines a random effects diagonal metric multidimensional scaling model, gives its computational algorithms, describes researchers' experiences with these algorithms, and provides an illustration of the use of the model and algorithms. (Author/SLD)
Descriptors: Algorithms, Mathematical Models, Multidimensional Scaling
Peer reviewedMillan, Eva; Agosta, John Mark; Perez de la Cruz, Jose Luis – British Journal of Educational Technology, 2001
Discusses intelligent tutoring systems and the application of Bayesian networks to student modeling. Considers reasons for not using Bayesian networks, including the computational complexity of the algorithms and the difficulty of knowledge acquisition, and proposes an approach to simplify knowledge acquisition that applies causal independence to…
Descriptors: Algorithms, Computation, Intelligent Tutoring Systems


