home *** CD-ROM | disk | FTP | other *** search
- ═══════════════════════════════════════════
- MIR TUTORIAL FIVE
- RELATED TOPICS AND APPLICATIONS
- Summary Table of Contents
- ═══════════════════════════════════════════
-
-
- 0. MIR TUTORIAL FIVE Table of contents
-
-
- 1. Pattern indexing revisited
-
- 1.1 Using indexed retrieval to upgrade indexes
-
-
- 2. Encryption
-
- 2.1 Raising the cost to the criminal
-
- 2.2 Tables versus algorithms
-
- 2.3 Exclusive OR techniques
-
- 2.4 Non-sequential exclusive ORs
-
- 2.5 Multi-seeding
-
- 2.6 Contest! Contest!
-
-
- 3. Concept search and the user
-
- 3.1 Automated concept recognition
-
- 3.2 Automated key word selection
-
-
- 4. Concept search... the techniques
-
-
- 5. Records management applications
-
- 5.1 What is records management?
-
- 5.2 Why records management?
-
- 5.3 Access to information
-
- 5.4 Legal obligations
-
- 5.5 Vital records
-
- 5.6 Value of time
-
- 5.7 Value of space
-
- 5.8 Sense of corporate identity
-
- 5.9 Setting up records management
-
- 5.10 The routines of records management
-
- 5.11 Records management and the searcher
-
-
- 6. Data cleaning software
-
-
- 7. Archiving
-
-
- 8. Correlation tools
-
-
- 9. Ideal futures
-
- 9.1 Standards in indexing and retrieval
-
- 9.2 Operating systems with indexing power
-
- 9.3 The fully organized person
-
- 9.4 The fully indexed firm (records management supreme)
-
- 9.5 The fully indexed society