Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Accuracy | 3 |
| Bayesian Statistics | 3 |
| Predictive Measurement | 3 |
| Academic Achievement | 1 |
| Competition | 1 |
| Computation | 1 |
| Computer Networks | 1 |
| Computer Security | 1 |
| Cues | 1 |
| Dance | 1 |
| Dance Education | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 2 |
| Reports - Research | 2 |
| Dissertations/Theses -… | 1 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Slater, Stefan; Baker, Ryan – Distance Education, 2019
Considerable attention has been given to methods for knowledge estimation, a category of methods for automatic assessment of a student's degree of skill mastery or knowledge at a specific time. Knowledge estimation is frequently used to make decisions about when a student has reached mastery and is ready to advance to new material, but there has…
Descriptors: Prediction, Mastery Learning, Academic Achievement, Bayesian Statistics
Larson, Jeffrey S.; Billeter, Darron M. – Journal of Experimental Psychology: Learning, Memory, and Cognition, 2017
Competition judges are often selected for their expertise, under the belief that a high level of performance expertise should enable accurate judgments of the competitors. Contrary to this assumption, we find evidence that expertise can reduce judgment accuracy. Adaptation level theory proposes that discriminatory capacity decreases with greater…
Descriptors: Expertise, Novices, Singing, Music
Koc, Levent – ProQuest LLC, 2013
With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…
Descriptors: Bayesian Statistics, Computer Security, Computer Networks, Data Collection

Peer reviewed
Direct link
