NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
PDF pending restoration PDF pending restoration
Rothstein, Jerome – 1977
Addressing the problem of protecting confidential information and data stored in computer databases from access by unauthorized parties, this paper details coding schemes which present such astronomical work factors to potential code breakers that security breaches are hopeless in any practical sense. Two procedures which can be used to encode for…
Descriptors: Algorithms, Codification, Computer Programs, Confidentiality
Richards, William D., Jr. – 1975
Network Analysis is an observational system focusing on the relationships of individuals within a system--their subgroups, their leaders, and the frequency of their communications. The strength of relationships can be measured by examining the incidence and duration of intercommunications. Using data accumulated by questioning each member of the…
Descriptors: Algorithms, Communication (Thought Transfer), Computer Programs, Information Theory
Peer reviewed Peer reviewed
de Heer, T. – Information Processing and Management, 1982
Addresses problem of developing machine-based information system capable of indicating one document, out of a set of documents written in natural language, which shows maximal degree of homeosemy (relationship in meaning between two texts language-fragments ) toward natural language query. Linguistic aspects, information traces, trigrams,…
Descriptors: Algorithms, Computer Programs, Information Retrieval, Information Systems
Salton, Gerard – 1974
The twenty-second in a series, this report describes research in information organization and retrieval conducted by the Department of Computer Science at Cornell University. The report covers work carried out during the period summer 1972 through summer 1974 and is divided into four parts: indexing theory, automatic content analysis, feedback…
Descriptors: Algorithms, Computer Programs, Computer Science, Content Analysis