Publication Date
| In 2026 | 0 |
| Since 2025 | 185 |
| Since 2022 (last 5 years) | 865 |
| Since 2017 (last 10 years) | 912 |
| Since 2007 (last 20 years) | 918 |
Descriptor
Source
Author
| van der Linden, Wim J. | 17 |
| Kiers, Henk A. L. | 13 |
| ten Berge, Jos M. F. | 10 |
| Gongjun Xu | 9 |
| Gerlach, Vernon S. | 8 |
| Willett, Peter | 8 |
| Chun Wang | 7 |
| Stocking, Martha L. | 7 |
| Charp, Sylvia | 6 |
| Chen, Hsinchun | 6 |
| Craven, Timothy C. | 6 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 256 |
| Teachers | 128 |
| Researchers | 116 |
| Policymakers | 7 |
| Administrators | 5 |
| Students | 5 |
| Counselors | 1 |
| Media Staff | 1 |
| Support Staff | 1 |
Location
| China | 23 |
| Australia | 19 |
| Turkey | 16 |
| Netherlands | 14 |
| United States | 11 |
| USSR | 10 |
| California | 8 |
| Canada | 8 |
| Europe | 8 |
| Germany | 7 |
| South Korea | 7 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedten Berge, Jos M. F.; And Others – Psychometrika, 1981
Several algorithms for computing the greatest lower bound to reliability or the constrained minimum-trace communality solution in factor analysis have been developed. The convergence properties of these methods are examined. A uniqueness proof for the desired solution is offered. (Author/JKS)
Descriptors: Algorithms, Factor Analysis, Test Reliability
Peer reviewedPrice, Lewis C. – Psychometrika, 1980
Two algorithms based on a latent class model are presented for discovering hierarchical relations that exist among a set of dichotomous items. The algorithms presented, and three competing deterministic algorithms are compared using computer-generated data. (Author/JKS)
Descriptors: Algorithms, Mathematical Models, Statistical Analysis
Peer reviewedHeuchenne, Christian – Structural Equation Modeling, 1997
A rule is presented to identify the model in structural equation modeling. This rule includes the null B and recursive rules as extreme cases. Proof is given for the theorem. (SLD)
Descriptors: Algorithms, Identification, Structural Equation Models
Peer reviewedShipley, Bill – Structural Equation Modeling, 2002
Describes a method for choosing rejection probabilities for the tests of independence that are used in constraint-based algorithms of exploratory path analysis. The method consists of generating a Markov or semi-Markov model from the equivalence class represented by a partial ancestral graph and then testing the d-separation implications. (SLD)
Descriptors: Algorithms, Markov Processes, Path Analysis
Peer reviewedThiele, Harold E., Jr. – Library Trends, 1990
Adapting the principles that have evolved in the development of heraldry to current needs, an algorithm was developed to aid in the description of graphic designs. It provides an efficient method of describing trademarks, logos, and other designs so that they can be found quickly using mechanical searching techniques. (26 references) (EAM)
Descriptors: Algorithms, Graphic Arts, Online Searching
Peer reviewedClarkson, Douglas B.; Gonzalez, Richard – Psychometrika, 2001
Defines a random effects diagonal metric multidimensional scaling model, gives its computational algorithms, describes researchers' experiences with these algorithms, and provides an illustration of the use of the model and algorithms. (Author/SLD)
Descriptors: Algorithms, Mathematical Models, Multidimensional Scaling
Peer reviewedMillan, Eva; Agosta, John Mark; Perez de la Cruz, Jose Luis – British Journal of Educational Technology, 2001
Discusses intelligent tutoring systems and the application of Bayesian networks to student modeling. Considers reasons for not using Bayesian networks, including the computational complexity of the algorithms and the difficulty of knowledge acquisition, and proposes an approach to simplify knowledge acquisition that applies causal independence to…
Descriptors: Algorithms, Computation, Intelligent Tutoring Systems
Peer reviewedFox, Brian; Fox, Christopher J. – Information Processing & Management, 2002
Discussion of word stemming for text processing and information retrieval focuses on an algorithm for generating stemmers from text stemmer specification files. Highlights include the use of finite state machines for stemming; stemmer specification file format; stemmer generation and driver algorithms; and stemmer timing comparisons. (Author/LRW)
Descriptors: Algorithms, Information Retrieval, Word Processing
Peer reviewedJennrich, Robert I. – Psychometrika, 2001
Identifies a general algorithm for orthogonal rotation and shows that when an algorithm parameter alpha is sufficiently large, the algorithm converges monotonically to a stationary point of the rotation criterion from any starting value. Introduces a modification that does not require a large alpha and discusses the use of this modification as a…
Descriptors: Algorithms, Factor Structure, Orthogonal Rotation
Garbarino, Jennifer J. – 1996
All parametric analysis focuses on the "synthetic" variables created by applying weights to "observed" variables, but these synthetic variables are called by different names across methods. This paper explains four ways of computing the synthetic scores in factor analysis: (1) regression scores; (2) M. S. Bartlett's algorithm…
Descriptors: Algorithms, Factor Analysis, Regression (Statistics), Scores
Heaps, H. S.; Schuegraf, E. J. – Information Storage and Retrieval, 1975
Describes the advantages of using variable length equifrequent fragments as the language elements for compression coding of large data bases. (Author)
Descriptors: Algorithms, Databases, Information Storage, Information Systems
Peer reviewedAngione, Pauline V. – Journal of the American Society for Information Science, 1975
Proof is given of the equivalence of Boolean and weighted search methods. (Author)
Descriptors: Algorithms, Information Retrieval, Logic, Search Strategies
Yamomoto, Yoneo; Wise, Steven L. – 1980
An order-analysis procedure, which uses graph theory to extract efficiently nonredundant, unidimensional chains of items from multidimensional data sets and chain consistency as a criterion for chain membership is outlined in this paper. The procedure is intended as an alternative to the Reynolds (1976) procedure which is described as being…
Descriptors: Algorithms, Data Processing, Mathematical Applications, Testing
Oldehoeft, Arthur E. – 1970
The design and development of a program of computer-assisted instruction (CAI) which assists the student in learning elementary algorithms of an undergraduate numerical methods course is presented, along with special programing features such as partial precision arithmetic, computer-generated problems, and approximate matching of mathematical…
Descriptors: Algorithms, College Students, Computer Assisted Instruction
Peer reviewedKrishnan, S.; Krishnamurthy, E. V. – Information Processing and Management, 1976
Described here is an efficient encoding procedure for Algorithmic Wiswesser Notation (ALWIN), using the Morgan labelling algorithm and the neighborhood relationship in a chemical graph. This procedure introduces a hierarchy to bring an order for the unique description of the chemical structure with a minimal computational effect. (Author)
Descriptors: Algorithms, Chemical Nomenclature, Chemistry, Information Storage


