-
Bookstein, A.: Informetric distributions : I. Unified overview (1990)
0.02
0.024700502 = product of:
0.049401004 = sum of:
0.049401004 = product of:
0.09880201 = sum of:
0.09880201 = weight(_text_:22 in 6902) [ClassicSimilarity], result of:
0.09880201 = score(doc=6902,freq=2.0), product of:
0.18240541 = queryWeight, product of:
3.5018296 = idf(docFreq=3622, maxDocs=44218)
0.052088603 = queryNorm
0.5416616 = fieldWeight in 6902, product of:
1.4142135 = tf(freq=2.0), with freq of:
2.0 = termFreq=2.0
3.5018296 = idf(docFreq=3622, maxDocs=44218)
0.109375 = fieldNorm(doc=6902)
0.5 = coord(1/2)
0.5 = coord(1/2)
- Date
- 22. 7.2006 18:55:29
-
Bookstein, A.: Informetric distributions : II. Resilience to ambiguity (1990)
0.02
0.024700502 = product of:
0.049401004 = sum of:
0.049401004 = product of:
0.09880201 = sum of:
0.09880201 = weight(_text_:22 in 4689) [ClassicSimilarity], result of:
0.09880201 = score(doc=4689,freq=2.0), product of:
0.18240541 = queryWeight, product of:
3.5018296 = idf(docFreq=3622, maxDocs=44218)
0.052088603 = queryNorm
0.5416616 = fieldWeight in 4689, product of:
1.4142135 = tf(freq=2.0), with freq of:
2.0 = termFreq=2.0
3.5018296 = idf(docFreq=3622, maxDocs=44218)
0.109375 = fieldNorm(doc=4689)
0.5 = coord(1/2)
0.5 = coord(1/2)
- Date
- 22. 7.2006 18:55:55
-
Bookstein, A.: Bibliocryptography (1996)
0.01
0.0108685335 = product of:
0.021737067 = sum of:
0.021737067 = product of:
0.043474134 = sum of:
0.043474134 = weight(_text_:libraries in 6502) [ClassicSimilarity], result of:
0.043474134 = score(doc=6502,freq=2.0), product of:
0.1711139 = queryWeight, product of:
3.2850544 = idf(docFreq=4499, maxDocs=44218)
0.052088603 = queryNorm
0.25406548 = fieldWeight in 6502, product of:
1.4142135 = tf(freq=2.0), with freq of:
2.0 = termFreq=2.0
3.2850544 = idf(docFreq=4499, maxDocs=44218)
0.0546875 = fieldNorm(doc=6502)
0.5 = coord(1/2)
0.5 = coord(1/2)
- Abstract
- Because of concerns about the privacy of its patrons, it is common for libraries to systematically destroy historic information about book circulation. I argue that this information has great potential value for improving retrieval effectiveness, and give 2 examples of how this information can be used. Further, I show how use-data can be preserved and exploited while still giving a high degree of protection for patron privacy. The methods are analyzed and formulae are derived indicating the tradeoff between retrieval effectiveness and security. A second, contrasting application, indicating how to introduce 'fingerprints' into digitized audio-visual material in a tamper-resistant manner, is described