Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Bayesian Statistics | 5 |
| Probability | 5 |
| Testing | 5 |
| Models | 2 |
| Research Methodology | 2 |
| Ability | 1 |
| Achievement | 1 |
| Behavior Patterns | 1 |
| Classification | 1 |
| Computer Security | 1 |
| Criterion Referenced Tests | 1 |
| More ▼ | |
Author
| Cai, Chaoli | 1 |
| Drummond, Gordon B. | 1 |
| Hoijtink, Herbert | 1 |
| Kuiper, Rebecca M. | 1 |
| Lewis, Charles | 1 |
| Steinheiser, Frederick, Jr. | 1 |
| Tom, Brian D. M. | 1 |
Publication Type
| Journal Articles | 2 |
| Dissertations/Theses -… | 1 |
| Reports - Descriptive | 1 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
Audience
| Researchers | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Drummond, Gordon B.; Tom, Brian D. M. – Advances in Physiology Education, 2011
Statisticians use words deliberately and specifically, but not necessarily in the way they are used colloquially. For example, in general parlance "statistics" can mean numerical information, usually data. In contrast, one large statistics textbook defines the term "statistic" to denote "a characteristic of a…
Descriptors: Intervals, Research Methodology, Testing, Statistics
Kuiper, Rebecca M.; Hoijtink, Herbert – Psychological Methods, 2010
This article discusses comparisons of means using exploratory and confirmatory approaches. Three methods are discussed: hypothesis testing, model selection based on information criteria, and Bayesian model selection. Throughout the article, an example is used to illustrate and evaluate the two approaches and the three methods. We demonstrate that…
Descriptors: Models, Testing, Hypothesis Testing, Probability
Cai, Chaoli – ProQuest LLC, 2009
Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…
Descriptors: Energy Conservation, Testing, Computer Security, Statistical Inference
Peer reviewedLewis, Charles; And Others – Psychometrika, 1975
A Bayesian Model II approach to the estimation of proportions in m groups is extended to obtain posterior marginal distributions for the proportions. The approach is extended to allow greater use of prior information than previously and the specification of this prior information is discussed. (Author/RC)
Descriptors: Bayesian Statistics, Data Analysis, Individualized Instruction, Models
Steinheiser, Frederick, Jr. – 1975
Summarizing work which is part of an Army research program on Methodological Issues in the Construction of Criterion Referenced Tests, the focus of this paper is on a Bayesian model, which gives the probability of correctly classifying an examiner as a master or as a nonmaster while taking into consideration the test length and the mastery cut-off…
Descriptors: Ability, Achievement, Bayesian Statistics, Classification

Direct link
