Search (3 results, page 1 of 1)

  • × author_ss:"Bookstein, A."
  • × author_ss:"Swanson, D.R."
  • × language_ss:"e"
  • × type_ss:"a"
  1. Bookstein, A.; Swanson, D.R.: Probabilistic models for automatic indexing (1974) 0.01
    0.0050056577 = product of:
      0.015016973 = sum of:
        0.015016973 = weight(_text_:a in 5466) [ClassicSimilarity], result of:
          0.015016973 = score(doc=5466,freq=4.0), product of:
            0.05209492 = queryWeight, product of:
              1.153047 = idf(docFreq=37942, maxDocs=44218)
              0.045180224 = queryNorm
            0.28826174 = fieldWeight in 5466, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              1.153047 = idf(docFreq=37942, maxDocs=44218)
              0.125 = fieldNorm(doc=5466)
      0.33333334 = coord(1/3)
    
    Type
    a
  2. Bookstein, A.; Swanson, D.R.: ¬A decision theoretic foundation for indexing (1975) 0.00
    0.0040970687 = product of:
      0.012291206 = sum of:
        0.012291206 = weight(_text_:a in 76) [ClassicSimilarity], result of:
          0.012291206 = score(doc=76,freq=14.0), product of:
            0.05209492 = queryWeight, product of:
              1.153047 = idf(docFreq=37942, maxDocs=44218)
              0.045180224 = queryNorm
            0.23593865 = fieldWeight in 76, product of:
              3.7416575 = tf(freq=14.0), with freq of:
                14.0 = termFreq=14.0
              1.153047 = idf(docFreq=37942, maxDocs=44218)
              0.0546875 = fieldNorm(doc=76)
      0.33333334 = coord(1/3)
    
    Abstract
    The indexing of a document is among the most crucial steps in preparing that document for retrieval. The adequacy of the indexing determines the ability of the system to respond to patron requests. This paper discusses this process, and document retrieval in general, on the basis of formal decision theory. The basic theoretical approach taken is illustrated by means of a model of word occurrences in documents in the context of a model information system; both models are fully defined in this paper. Through the main purpose of this papers is to provide insights into a very complex process, formulae are developed that may prove to be of value for an automated operating system. The paper concludes with an interpretation of recall and precision curves as seen from the point of view of decision theory
    Type
    a
  3. Swanson, D.R.; Smalheiser, N.R.; Bookstein, A.: Information discovery from complementary literatures : categorizing viruses as potential weapons (2001) 0.00
    0.0029264777 = product of:
      0.008779433 = sum of:
        0.008779433 = weight(_text_:a in 6513) [ClassicSimilarity], result of:
          0.008779433 = score(doc=6513,freq=14.0), product of:
            0.05209492 = queryWeight, product of:
              1.153047 = idf(docFreq=37942, maxDocs=44218)
              0.045180224 = queryNorm
            0.1685276 = fieldWeight in 6513, product of:
              3.7416575 = tf(freq=14.0), with freq of:
                14.0 = termFreq=14.0
              1.153047 = idf(docFreq=37942, maxDocs=44218)
              0.0390625 = fieldNorm(doc=6513)
      0.33333334 = coord(1/3)
    
    Abstract
    Using novel informatics techniques to process the Output of Medline searches, we have generated a list of viruses that may have the potential for development as weapons. Our findings are intended as a guide to the virus literature to support further studies that might then lead to appropriate defense and public health measures. This article stresses methods that are more generally relevant to information science. Initial Medline searches identified two kinds of virus literaturesthe first concerning the genetic aspects of virulence, and the second concerning the transmission of viral diseases. Both literatures taken together are of central importance in identifying research relevant to the development of biological weapons. Yet, the two literatures had very few articles in common. We downloaded the Medline records for each of the two literatures and used a computer to extract all virus terms common to both. The fact that the resulting virus list includes most of an earlier independently published list of viruses considered by military experts to have the highest threat as potential biological weapons served as a test of the method; the test outcome showed a high degree of statistical significance, thus supporting an inference that the new viruses an the list share certain important characteristics with viruses of known biological
    Type
    a