NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
PDF pending restoration PDF pending restoration
Rothstein, Jerome – 1977
Addressing the problem of protecting confidential information and data stored in computer databases from access by unauthorized parties, this paper details coding schemes which present such astronomical work factors to potential code breakers that security breaches are hopeless in any practical sense. Two procedures which can be used to encode for…
Descriptors: Algorithms, Codification, Computer Programs, Confidentiality
Peer reviewed Peer reviewed
Reisig, Gerhard H. R. – Information Processing and Management, 1978
Presents the "Evidence-of-Existence" information system in which the structure is developed, with application of cybernetic concepts, as an isomorphic model in analogy to the system structure of communication technology. Three criteria of structuring are postulated: (1) source-channel-sink, with input-output characteristics, (2) filter-type…
Descriptors: Codification, Cybernetics, Documentation, Information Retrieval
Pradels, Jean Louis – 1973
Rooted binary trees with weighted nodes are structures encountered in many areas, such as coding theory, searching and sorting, information storage and retrieval. The path length is a meaningful quantity which gives indications about the expected time of a search or the length of a code, for example. In this paper, two sharp bounds for the total…
Descriptors: Codification, Computer Science, Information Retrieval, Information Science
Ryan, Michael G. – 1972
A historical review of the background of the theories and observations of Marshall McLuhan demonstrates that these ideas arose from or were first articulated by several antecedent social scientists. Some of McLuhan's ideas arise directly from the linguistic observations of Benjamin Lee Whorf. Other ideas show signs of having been influenced by…
Descriptors: Codification, Communication (Thought Transfer), History, Information Theory
Hays, David G. – 1973
The design of codes and formats for information storage must be guided by the requirements of the processes in which the stored information is to be used. In the case of medical data, a code must be designed to facilitate several different processes, including case management, administration, evaluation and research. Design of such a system can be…
Descriptors: Codification, Computational Linguistics, Information Needs, Information Science
Rogers, L. Edna; Farace, Richard – 1973
Relational communication refers to the control or dominance aspects of message exchange in dyads--distinguishing it from the report or referential aspects of communication. In relational communicational analysis, messages as transactions are emphasized; major theoretical concepts which emerge are symmetry, transitoriness, and complementarity of…
Descriptors: Codification, Communication (Thought Transfer), Human Relations, Individual Power
Wilden, Anthony – 1972
This book ranges widely over the fields of communication theory, Freudian and Lacanian psychology, and Levi-Straussian anthropology. The primary goal of the book is an examination of the structural and analogic patterns within human communication and exchange. This examination involves discourses upon the computer compared to the human nervous…
Descriptors: Analog Computers, Anthropology, Codification, Digital Computers