Publication Date
| In 2026 | 1 |
| Since 2025 | 730 |
| Since 2022 (last 5 years) | 3580 |
| Since 2017 (last 10 years) | 7446 |
| Since 2007 (last 20 years) | 15030 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 2852 |
| Teachers | 2010 |
| Researchers | 608 |
| Administrators | 473 |
| Media Staff | 268 |
| Students | 245 |
| Policymakers | 202 |
| Parents | 78 |
| Counselors | 33 |
| Support Staff | 22 |
| Community | 21 |
| More ▼ | |
Location
| Australia | 499 |
| United Kingdom | 474 |
| Turkey | 472 |
| Canada | 364 |
| China | 309 |
| Taiwan | 248 |
| United States | 228 |
| Indonesia | 223 |
| Spain | 221 |
| California | 195 |
| Germany | 163 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 11 |
| Meets WWC Standards with or without Reservations | 16 |
| Does not meet standards | 17 |
Peer reviewedOlson, Nancy B. – Cataloging and Classification Quarterly, 1986
Proposed revisions to Anglo American Cataloging Rules, 2nd edition include the general material designation "computer material" and the option to use physical description for a physical item and file description when there is no physical item in hand. All areas of the bibliographic record are discussed, including numerous examples.…
Descriptors: Cataloging, Computer Software, Microcomputers
Rutkaus, Michael – Performance and Instruction, 1984
Presents eight humorous ways a consumer can tell whether he has purchased a good or bad microcomputer. (MBR)
Descriptors: Computer Software, Humor, Microcomputers
Peer reviewedDucheneaut, Nicolas; Bellotti, Victoria – Human-Computer Interaction, 2003
Shows how e-mail users have evolved new forms of electronic deictic references to refer to work objects and offers design suggestions for future electronic mail software. Highlights include a study of e-mail work conversations; and changing the way we talk by transforming the conversation itself into an object of conversation. (Author/LRW)
Descriptors: Computer Software, Electronic Mail
Peer reviewedKing, Jason E. – Educational and Psychological Measurement, 2002
Uses a sample data set to describe in nonmathematical terms how to implement and interpret results from a best-subsets logistic regression using the Statistical Analysis System. (SLD)
Descriptors: Computer Software, Regression (Statistics)
Peer reviewedDeCarlo, Lawrence T. – Multivariate Behavioral Research, 2002
Presents a latent class extension of signal detection theory and illustrates applications of this approach. Introduces an extension of the signal detection model to more than two latent classes, with a simple restriction on the detection parameters and provides some sample programs to fit the models. (SLD)
Descriptors: Computer Software, Multivariate Analysis
Peer reviewedThissen, David; Steinberg, Lynne; Kuang, Daniel – Journal of Educational and Behavioral Statistics, 2002
Illustrates that the Benjamini-Hochberg (B-H) procedure to controlling the false positive rate in multiple comparisons is easy to implement using widely available spreadsheet software. Shows that it is feasible to use the B-H procedure to augment or replace the Bonferroni technique. (SLD)
Descriptors: Comparative Analysis, Computer Software
Fickes, Michael – College Planning & Management, 2002
Describes the University of New Mexico's photo identification LOBO card system, which performs both security and validation tasks. It is used in conjunction with several C-CURE 800 Integrated Security Management Systems supplied by Software House of Lexington, Massachusetts. (EV)
Descriptors: Computer Software, School Security
Castaldi, John, Comp. – Community, Technical, and Junior College Journal, 1988
A directory of several hundred computer companies, divided into sections on hardware, software, and computer-related services and materials. Entries include company name, address, phone number, principals, contact person, product descriptions, and services. (DMM)
Descriptors: Computer Software, Computers, Microcomputers
Peer reviewedWeinberg, Sharon L. – Measurement and Evaluation in Counseling and Development, 1991
Describes several salient features of multidimensional scaling (MDS) for spatial distance models including proximity measures, interpoint distances, goodness-of-fit, and distinctions between metric and nonmetric scaling. Four commonly used MDS computer programs are described, and a section on applications of MDS selected from the counseling…
Descriptors: Computer Software, Multidimensional Scaling
Peer reviewedBernstein, Philip A.; Bergstraesser, Thomas; Carlson, Jason; Pal, Shankar; Sanders, Paul; Shutt, David – Information Systems, 1999
Describes the programming interface and implementation of the repository engine and the Open Information Model for Microsoft Repository, an object-oriented meta-data management facility that ships in Microsoft Visual Studio and Microsoft SQL Server. Discusses Microsoft's component object model, object manipulation, queries, and information…
Descriptors: Computer Software, Metadata, Models
Peer reviewedGraf, Richard G.; Alf, Edward F., Jr. – Applied Psychological Measurement, 1999
I. Olkin and J. Finn (1995) developed expressions for confidence intervals for functions of simple, partial, and multiple correlations. Describes procedures and computer programs for solving these problems and extending the methods for any number of predictors or for partialing out any number of variables. (Author/SLD)
Descriptors: Computer Software, Correlation, Prediction
Peer reviewedOsborne, Jason W. – Practical Assessment, Research & Evaluation, 2000
Introduces the problem of hierarchical, or nested, data structures and discusses how this problem is dealt with effectively. Provides examples of the pitfalls of not doing appropriate analyses. New software is making hierarchical linear modeling more user-friendly and accessible. (SLD)
Descriptors: Computer Software, Research Methodology
Peer reviewedAntonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex – Internet Research, 2001
Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…
Descriptors: Computer Security, Computer Software
Hadwin, Allyson F.; Winne, Philip H.; Nesbit, John C. – British Journal of Educational Psychology, 2005
While reviews abound on theoretical topics in educational psychology, it is rare that we examine our field's instrumentation development, and what effects this has on educational psychology's evolution. To repair this gap, this paper investigates and reveals the implications of software technologies for researching and theorizing about core issues…
Descriptors: Computer Software, Educational Psychology
Lovely, Gail – Learning & Leading with Technology, 2004
While I wrote this column, there seemed to be a lull in new software announcements for education and educators. Perhaps it is reflective of the tightening of school budgets or the heavy emphasis on standardized tests and strictly measurable results here in the United States, which has lead to fewer really exciting software announcements lately.…
Descriptors: Computer Software, Standardized Tests

Direct link
