11 results
Search Results
2. Hash Coding with a Non-Unique Search Key.
- Author
-
Bookstein, Abraham
- Subjects
HASHING ,COMPUTER storage devices ,ELECTRONIC file management ,INFORMATION storage & retrieval systems ,ALGORITHMS ,INFORMATION retrieval ,INFORMATION science - Abstract
This paper defines a hash coding model for non-unique search keys and derives the expected number of accesses needed to retrieve all desired records from a computer storage device. The assumption that the records are stored on the basis of a non-unique key is often realized in information retrieval environments. The model assumes that the hashing algorithm and, should a collision occur, the skipping algorithm, both distribute the records randomly in memory. The results of this analysis are compared with those from a simulation in which the randomness criterion is not strictly met. [ABSTRACT FROM AUTHOR]
- Published
- 1974
- Full Text
- View/download PDF
3. Journal Disposition Decision Policies.
- Author
-
Rush, Barbara, Steinberg, Sam, and Kraft, Donald H.
- Subjects
PERIODICALS ,ACADEMIC libraries ,DOCUMENTATION ,ALGORITHMS ,CAPITAL investments ,INVESTMENTS - Abstract
The problem of whether to bind, microcopy or discard back issues of journals in a university library branch system is considered and an algorithm is developed to solve the journal disposition problem. A cost-effectiveness approach is pursued, employing an analytical model. This model uses a set of weighted factors to quantify the value of a specific journal to the library. Such factors as relevance, usage, availability elsewhere and capital investment are specified. Budget constraints, which involve the relevant costs of binding and microcopying, are considered, as are upper and lower threshold values on the worth of a journal to guarantee the retention of exceptionally good journals and the disposal of very poor ones. An example based on data from a real university special library situation is presented as an illustration of the model. Thus, this paper extends the work of others in modeling of the library collection development decision process. [ABSTRACT FROM AUTHOR]
- Published
- 1974
- Full Text
- View/download PDF
4. Search Strategy, Construction and Use of Citation Networks, with a Socio-Scientific Example: "Amorphous Semi-Conductors and S.R. Ovshinsky"
- Author
-
Cawkell, Anthony E.
- Subjects
GRAPHIC methods ,ALGORITHMS ,SEMICONDUCTORS ,CHARTS, diagrams, etc. ,GEOMETRICAL drawing ,ALGEBRA - Abstract
The deductions which may be made from inspection of a citation map of the literature are briefly described, and a search algorithm is given for the construction of such maps. Following the construction and assessment of a network describing the development of amorphous semi- conductors, it is concluded that citation diagrams are a valuable aid for socio-scientific studies. [ABSTRACT FROM AUTHOR]
- Published
- 1974
- Full Text
- View/download PDF
5. An Alogorithm for Generating Structural Surrogates of English Text.
- Author
-
Strong, Suzanne M.
- Subjects
COMPUTER algorithms ,ALGORITHMS ,SYNTAX (Grammar) ,GRAMMAR ,COMPUTER programming ,VOCABULARY - Abstract
This paper describes the development and application of an algorithm which generates non-linear representations of English text. The algorithm uses the results of a syntactic analysis system and a set of rules which prescribe linkages to generate a graph of a sentence. The shape of these graphs corresponds to the syntax of the sentence; the labels correspond to the vocabulary of the sentence and the edge types correspond to case grammar roles. The sentence graphs can then be interconnected at common nodes and analyzed according to common edges. Preliminary experimentation has yielded promising results. It appears that the algorithm produces a representation of English text which could be quite useful in automatic language processing. [ABSTRACT FROM AUTHOR]
- Published
- 1974
- Full Text
- View/download PDF
6. Effectiveness of Retrieval Key Abbreviation Schemes.
- Author
-
Lowe, Thomas C.
- Subjects
INFORMATION retrieval ,ALGORITHMS ,DOCUMENTATION ,INFORMATION storage & retrieval systems ,MATHEMATICAL transformations ,INFORMATION science - Abstract
Frequently it is useful to abbreviate or otherwise transform keys used for the retrieval of information. These transformations include the compression of long keys into a fixed field length by operations on characters or groups of characters, hash or random transformations in order to obtain a direct address, or phonetic coding to order to group together keys that are in some way similar. The various transformations have differing effects on file retrieval schemes. Given a transformation algorithm and data to be transformed, it is possible to characterize certain qualities of the algorithm that re late to retrieval problems. This paper is concerned with some measures of effectiveness of such transformation algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 1971
- Full Text
- View/download PDF
7. Error Evaluation for Stemming Algorithms as Clustering Algorithms.
- Author
-
Lovins, Julie B.
- Subjects
ALGORITHMS ,MATHEMATICS ,ALGEBRA ,INFORMATION retrieval ,FOUNDATIONS of arithmetic ,SUBJECT headings ,QUERY (Information retrieval system) - Abstract
This paper presents mathematical evaluation measures to characterize the effect of known erroneous performance by stemming routines, and generalizes these procedures to other types of nonstatistical clustering algorithms. When clusters, or groups of intrinsically related elements, are split into smaller groups (by under-matching the elements), there is a loss in recall in information retrieval; larger groups (caused by over- matching) induce a loss in precision or relevance. The magnitude of error is taken to be a function of frequencies of cluster elements. When these ore words in a subject-term index generated by a stemming algorithm, retrieval capability is also affected by the strength of the algorithm, the size and content of the stemmed index, and the number of words in a query. The present Project Intrex stemming algorithm has estimated stemming-error losses of 4% in recall and 1% in relevance on one-word queries; the former could be reduced to almost zero by straightforward corrections of known errors in the algorithm. An expanded probabilistic model is introduced to handle a more general case in which any element need not belong unambiguously to a single cluster. Error evaluation in document classification and thesauri also is discussed in broad terms. [ABSTRACT FROM AUTHOR]
- Published
- 1971
- Full Text
- View/download PDF
8. A Clustering Algorithm Based on User Queries.
- Author
-
Yu, Clement T.
- Subjects
COMPUTER science ,ALGORITHMS ,QUESTIONS & answers ,COMPUTER programming ,INFORMATION science ,INFORMATION technology - Abstract
A clustering algorithm which is tree-like in structure, and is based on user queries, is presented. It is compared to Bonner's Method, Rocchio's Method, Dattola's Method and the Single Link Method in three different aspects, namely system effectiveness, system efficiency and the time required for clustering. Experimental results using the Cranfield 424 collection indicate that the proposed method is superior to the other methods. [ABSTRACT FROM AUTHOR]
- Published
- 1974
- Full Text
- View/download PDF
9. Format Recognition: A Report of a Project at the Library of Congress.
- Author
-
Maruyama, Lenore S.
- Subjects
BIBLIOGRAPHY ,INFORMATION retrieval ,INFORMATION organization ,DOCUMENTATION ,COMPUTER software ,ALGORITHMS - Abstract
An experiment using a computer to assign content designators to unedited machine readable bibliographic data to create MARC records is described. Input typing conventions are briefly discussed. A computer program (Assembler Language for DOS) is being developed which analyzes unedited data according to predefined algorithms and builds MARC records. A manual simulation using 150 catalog records was done to test the computer algorithms. The results of the test in terms of accuracy and throughput compared favorably with the current MARC input system in use at the Library of Congress. [ABSTRACT FROM AUTHOR]
- Published
- 1971
- Full Text
- View/download PDF
10. Computers Are for Concepts.
- Author
-
Reno, Charles
- Subjects
INSTRUCTIONAL systems ,EDUCATIONAL technology ,CREATIVE ability ,ALGORITHMS ,TEACHERS ,EDUCATION - Abstract
The article discusses how the computer is used to extend the teacher's facilities and capabilities. The computer provides three important advantages in helping to understand concepts. It provides the opportunity for discovery, exploration, and extension, opportunities that are often lacking with ordinary instructional methods. Computerized instruction not only requires more precise communication, but also offers a chance to be creative. This creativity might be expressed by the construction of an algorithm to solve a given problem, or of one to explore a new topic.
- Published
- 1970
- Full Text
- View/download PDF
11. Performance of Kilgour's Truncation Algorithm in Files of Different Subjects.
- Author
-
Kjell, Bradley
- Subjects
ALGORITHMS ,LIBRARIES ,LITERATURE ,DOCUMENTATION ,CATALOGS ,RESEARCH - Abstract
The article informs that researcher Frederick Kilgour's algorithm for forming search keys for automated library catalogs was tested in a file of about 2000 books in science and technology and in a file of about 2000 books in art and literature. Both 3-3 and 2-2 author-title search keys were tested. It was found that both types of search keys yielded a significantly greater number of false-drops in the file of science and technology than in the file of art and literature. Frederick Kilgour and his associates have developed an algorithm for forming search keys for automated library catalogs. These search keys consist of the first few letters of the author's last name concatenated with the first few letters of the first non-article word of the title.
- Published
- 1974
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.