Descriptor
Source
Information Processing and… | 58 |
Author
Danilowicz, Czeslaw | 3 |
Willett, Peter | 3 |
Bookstein, Abraham | 2 |
Fawthrop, D. | 2 |
Gordon, Michael D. | 2 |
Kraft, Donald H. | 2 |
Waller, W. G. | 2 |
Yannakoudakis, E. J. | 2 |
Bartschi, Martin | 1 |
Can, Fazli | 1 |
Chang, Chin-Chen | 1 |
More ▼ |
Publication Type
Journal Articles | 58 |
Reports - Research | 58 |
Opinion Papers | 7 |
Information Analyses | 4 |
Speeches/Meeting Papers | 3 |
Reports - Descriptive | 2 |
Education Level
Audience
Researchers | 15 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Markas, Tassos; Reif, John – Information Processing and Management, 1992
Presents a class of distortion controlled vector quantizers that are capable of compressing images so they comply with certain distortion requirements. Highlights include tree-structured vector quantizers; multiresolution vector quantization; error coding vector quantizer; error coding multiresolution algorithm; and Huffman coding of the quad-tree…
Descriptors: Algorithms, Coding, Information Processing, Mathematical Formulas

Lin, Jianhua; And Others – Information Processing and Management, 1992
Analyzes the computational complexity of optimal binary tree pruning for tree-structured vector quantization. Topics discussed include the combinatorial nature of the optimization problem; the complexity of optimal tree pruning; and finding a minimal size pruned tree. (11 references) (LRW)
Descriptors: Algorithms, Coding, Computation, Information Processing

Uratani, Noriyoshi; Takeda, Masayuki – Information Processing and Management, 1993
Describes a string-searching algorithm for multiple patterns in a text string; explains the construction of a pattern-matching machine; presents a theoretical analysis and empirical evidence that supports the sublinearity of the algorithm; and compares this algorithm with the Boyer-Moore algorithm for a single pattern. (Contains 10 references.)…
Descriptors: Algorithms, Comparative Analysis, Information Retrieval, Mathematical Formulas

Chen, Oscal T.-C.; And Others – Information Processing and Management, 1992
Describes a modified frequency-sensitive self-organization (FSO) algorithm for image data compression and the associated VLSI architecture. Topics discussed include vector quantization; VLSI neural processor architecture; detailed circuit implementation; and a neural network vector quantization prototype chip. Examples of images using the FSO…
Descriptors: Algorithms, Coding, Information Processing, Mathematical Formulas

Shen, Sheldon – Information Processing and Management, 1988
Describes a model for a front end query processor to deal with incomplete information in a database. The effectiveness of the processor in restricting the number of objects to be processed in a query and in aiding the interpretation of a query is discussed. (26 references) (Author/CLB)
Descriptors: Algorithms, Computational Linguistics, Databases, Mathematical Formulas

El-Hamdouchi, Abdelmoula; Willett, Peter – Information Processing and Management, 1988
Describes an algorithm for the calculation of term discrimination values that may be used when the interdocument similarity measure used is the cosine coefficient and when the document representations have been weighted using one particular term weighting scheme. (7 references) (Author/CLB)
Descriptors: Algorithms, Automatic Indexing, Computational Linguistics, Discriminant Analysis

Yannakoudakis, E. J.; Fawthrop, D. – Information Processing and Management, 1983
Results of analysis of 1,377 spelling error forms including three categories of spelling errors (consonantal, vowel, and sequential) demonstrate that majority of spelling errors are highly predictable when set of predefined rules based on phonological and sequential considerations are followed algorithmically. Eleven references and equivalent…
Descriptors: Algorithms, Computer Programs, Consonants, Error Patterns

Raita, Timo; Teuhola, Jukka – Information Processing and Management, 1989
Presents three text compression methods of increasing power and evaluates each based on the trade-off between compression gain and processing time. The advantages of using hash coding for speed and optimal arithmetic coding to successor information for compression gain are discussed. (26 references) (Author/CLB)
Descriptors: Algorithms, Comparative Analysis, Data Processing, Efficiency

Chang, Chin-Chen; Wu, Tzong-Chen – Information Processing and Management, 1993
Proposes and explains a new mechanism for controlling the access requests in information protection systems that is based on Newton's interpolating polynomial. Access control matrices are discussed; single-key-lock systems are described; relevant algorithms are explained; and an example of the new mechanism is included. (10 references) (LRW)
Descriptors: Access to Information, Algorithms, Information Systems, Mathematical Formulas

Howard, Paul G.; Vitter, Jeffrey Scott – Information Processing and Management, 1992
Analyzes the amount of compression possible when arithmetic coding is used for text compression in conjunction with various input models. Algorithms are analyzed; modeling effects are considered; scaling is discussed; higher order models are examined, including prediction by partial matching; and coding effects are described. (34 references) (LRW)
Descriptors: Algorithms, Coding, Computation, Information Processing

Croft, W. B.; And Others – Information Processing and Management, 1989
Presents a model of information retrieval based on plausible inference which suggests that techniques should be found for combining multiple search strategies into an overall assessment of a document's relevance. The results of experiments designed to test this approach using a simple spreading activation search are discussed. (21 references) (CLB)
Descriptors: Algorithms, Inferences, Models, Online Searching

Lu, Xin – Information Processing and Management, 1990
Describes the development of a structural model of document retrieval based on lexical-semantic relationships between index terms. An algorithm that uses tree-to-tree distance to measure structural closeness between a document and a query statement is explained, and the proposed model is compared to a vector retrieval model. (18 references) (LRW)
Descriptors: Algorithms, Databases, Distance, Documentation

Voorhees, Ellen M. – Information Processing and Management, 1986
Describes a computerized information retrieval system that uses three agglomerative hierarchic clustering algorithms--single link, complete link, and group average link--and explains their implementations. It is noted that these implementations have been used to cluster a collection of 12,000 documents. (LRW)
Descriptors: Algorithms, Cluster Analysis, Databases, Information Retrieval

Sharma, Ravi – Information Processing and Management, 1989
Introduces two distribution schemes that partition documents over multiple processors and the corresponding multiprocessor retrieval algorithms that match relevant documents to user queries. The suggested framework is based on a general purpose hypercube multicomputer architecture with a dedicated disk for each node. A timing analysis for the…
Descriptors: Algorithms, Cost Effectiveness, Efficiency, Information Retrieval

Margulis, Eugene L. – Information Processing and Management, 1993
Reports on the validity of the Multiple Poisson (nP) model of word distribution in full-text document collections. A practical algorithm for determining whether a certain word is distributed according to an nP distribution and the results of a test of this algorithm in three different document collections are described. (14 references) (KRN)
Descriptors: Algorithms, Full Text Databases, Graphs, Information Retrieval