NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
What Works Clearinghouse Rating
Showing 106 to 120 of 178 results Save | Export
Peer reviewed Peer reviewed
Karakos, Alexandros – Journal of the American Society for Information Science and Technology, 2003
Explains transliteration and describes Greeklish, a Windows application that automatically produces English to Greek transliteration and back-transliteration (retransliteration), based on an algorithm with a table of associations between the two character sets. Describes how the table can be modified for personal preferences and discusses its…
Descriptors: Algorithms, Computer Interfaces, Computer Software, English
Peer reviewed Peer reviewed
Wood, Phillip – Multivariate Behavioral Research, 1992
Two Statistical Analysis System (SAS) macros are presented that perform the modified principal components approach of L. R. Tucker (1966) to modeling generalized learning curves analysis up to a rotation of the components. Three SAS macros are described that rotate the factor patterns to have characteristics Tucker considered desirable. (SLD)
Descriptors: Algorithms, Change, Computer Software, Factor Analysis
Peer reviewed Peer reviewed
Mukhopadhyay, Snehasis; Peng, Shengquan; Raje, Rajeev; Palakal, Mathew; Mostafa, Javed – Journal of the American Society for Information Science and Technology, 2003
Discussion of automated information services focuses on information classification and collaborative agents, i.e. intelligent computer programs. Highlights include multi-agent systems; distributed artificial intelligence; thesauri; document representation and classification; agent modeling; acquaintances, or remote agents discovered through…
Descriptors: Algorithms, Artificial Intelligence, Classification, Computer Software
Peer reviewed Peer reviewed
Grotophorst, Clyde W. – Library Software Review, 1988
Describes a system that provides online access to holdings information for more than 4,500 journals on a single self-executing diskette. A brief discussion of data compression is offered, along with program listings in both BASIC and C. (MES)
Descriptors: Algorithms, Computer Software, Information Storage, Library Automation
PDF pending restoration PDF pending restoration
Wolfle, Lee M.; Ethington, Corinna A. – 1984
In his early exposition of path analysis, Duncan (1966) noted that the method "provides a calculus for indirect effects." Despite the interest in indirect causal effects, most users treat them as if they are population parameters and do not test whether they are statistically significant. Sobel (1982) has recently derived the asymptotic…
Descriptors: Algorithms, Computer Software, Hypothesis Testing, Path Analysis
Knol, Dirk L.; ten Berge, Jos M. F. – 1987
An algorithm is presented for the best least-squares fitting correlation matrix approximating a given missing value or improper correlation matrix. The proposed algorithm is based on a solution for C. I. Mosier's oblique Procrustes rotation problem offered by J. M. F. ten Berge and K. Nevels (1977). It is shown that the minimization problem…
Descriptors: Algorithms, Computer Software, Correlation, Estimation (Mathematics)
van der Burg, Eeke; And Others – 1986
Homogeneity analysis, or multiple correspondence analysis, is usually applied to k separate variables. In this paper, it is applied to sets of variables by using sums within sets. The resulting technique is referred to as OVERALS. It uses the notion of optimal scaling, with transformations that can be multiple or single. The single transformations…
Descriptors: Algorithms, Computer Software, Least Squares Statistics, Linear Programing
Peer reviewed Peer reviewed
Kingma, Johannes; Reuvekamp, Johan – Educational and Psychological Measurement, 1986
A description of a Mokken test program to test the robustness of nonparametric Stochastic scales is presented. For each sample and the whole population, different scale statistics (both on scale and on item level) are computed recursively. A statistic T is presented for testing the robustness of the scales in the samples. (Author)
Descriptors: Algorithms, Computer Software, Input Output, Mathematical Models
Harmon, Paul – Performance and Instruction, 1984
Considers three powerful techniques--heuristics, context trees, and search via backward chaining--that a knowledge engineer might employ to develop an expert system to automate performance engineering, i.e., the branch of instructional technology that focuses on the problems of business and industry. (MBR)
Descriptors: Algorithms, Artificial Intelligence, Computer Software, Educational Technology
Peer reviewed Peer reviewed
Darling, Alexander L. – College and University, 1987
A method for checking college students' completion of program and graduation requirements by computer is outlined. The procedure operates by having degree programs defined in tables and is simple enough to be achieved by junior program staff without the need for programmers and analysts. (MSE)
Descriptors: Algorithms, College Administration, Computer Software, Degree Requirements
Marion, Rodger; Niebuhr, Bruce R. – Collegiate Microcomputer, 1986
Discusses an algorithm for developing problem solving simulations using microcomputers, and describes both the components of the simulation algorithm and the user interface. Examples of simulation and programming methods are presented. (MBR)
Descriptors: Algorithms, Computer Simulation, Computer Software, Design
Peer reviewed Peer reviewed
Mansheim, Jan; Baldridge, Phyllis – Mathematics Teacher, 1987
How set theory, combinatorics, probability, and the study of algorithms can be used in solving two problems is described in detail. Three computer programs are listed. (MNS)
Descriptors: Algorithms, Computer Software, Flow Charts, Learning Activities
Wirth, Niklaus – Scientific American, 1984
Built-in data structures are the registers and memory words where binary values are stored; hard-wired algorithms are the fixed rules, embodied in electronic logic circuits, by which stored data are interpreted as instructions to be executed. Various topics related to these two basic elements of every computer program are discussed. (JN)
Descriptors: Algorithms, Computer Science, Computer Software, Data
Peer reviewed Peer reviewed
Kiernan, Gerard – College Mathematics Journal, 1985
Provides several algorithms that use extended precision methods to compute large factorials exactly. The programs are written in BASIC and PASCAL. The approach used for computing N considers how large N is, how the built-in limitation on exact integer representation can be bypassed, and how long it takes to compute N. (JN)
Descriptors: Algorithms, College Mathematics, Computation, Computer Software
Peer reviewed Peer reviewed
Olson, Alton T. – Journal of Computers in Mathematics and Science Teaching, 1986
Presents an example of mathematics from an algorithmic point of view, with emphasis on the design and verification of this algorithm. The program involves finding roots for algebraic equations using the half-interval search algorithm. The program listing is included. (JN)
Descriptors: Algebra, Algorithms, Computer Software, Equations (Mathematics)
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12