National Academies Press: OpenBook
« Previous: Information Capture and Access
Suggested Citation:"Conclusion." National Research Council. 1994. Computing, Communication, and the Information Age. Washington, DC: The National Academies Press. doi: 10.17226/9121.
×

Actually, one wants to index different types of documents differently. The above method of indexing is very effective for a journal article or a simple document on a coherent topic. However, for an electronic mail file with 5,000 unrelated messages, the method makes no sense at all. A single index for a file of 5,000 unrelated documents may say something about the collection as a whole but is not useful for retrieving an individual document. Thus, a file of electronic mail messages should be indexed by creating a separate index for each message. If different computer files are to be indexed differently, then one needs to be able to identify the type of file automatically.

I have not mentioned electronic libraries and the potential of accessing from one's living room an image of any printed document or work of art in the world. The reason for the omission is that by and large the technology already exists for electronic libraries. The main impediments seem to be legal. That is, we need to solve the legal issue of how to protect intellectual property rights and how to charge for the services provided.

CONCLUSION

In this lecture, I have tried to sketch some of the technical issues that need development as we enter the computer and information age. This age promises to be even more beneficial than the agricultural and industrial revolutions preceding it. We live in an exciting time, one in which we need to work together and share our ideas to build and support the emerging technologies of the new age.

REFERENCES

Bern, Marshall, and David Eppstein. 1992. Mesh Generation and Optimal Triangulation, pp. 23-90 in Computing in Euclidean Geometry, F.K. Hwang and D. Du (eds.), World Scientific, River Edge, N.J.

Cremer, James F. 1989. An Architecture for General Purpose Physical System Simulation— Integrating Geometry, Dynamics, and Control, Department of Computer Science Technical Report 89-987, Cornell University, Ithaca, N.Y., April.

Hopcroft, John, and Peter J. Kahn. 1992. A Paradigm for Robust Geometric Algorithms, Algorithmica7:339-380 .

Hopcroft, John, C.M. Hoffmann, and M. Karasick. 1989. Robust Set Operations on Polyhedral Solids, IEEE Computer Graphics and Applications 9(November):50-59.

Kahle, Brewster. 1989. Wide Area Information Server (WAIS) Concepts,Thinking Machines Corporation, Cambridge, Mass., November.

Palmer, Richard S., and James F. Cremer. 1991. SIMLAB: Automatically Creating Physical Systems Simulators.Department of Computer Science Technical Report 91-1246, Cornell University, Ithaca, N.Y., November.

Rus, Daniela. 1991. On Dexterous Rotations of Polygons.Department of Computer Science Technical Report 91-1258, Cornell University, Ithaca, N.Y., December.

Salton, Gerard. 1991. Developments in Automatic Text Retrieval, Science253(30 August):974-980.

Stewart, Arthur James Kennedy. 1991. The Theory and Practice of Robust Geometric Computation, or, How to Build Robust Solid Modelers, Department of Computer Science Technical Report 91-1229, Cornell University, Ithaca, N.Y., August.

Suggested Citation:"Conclusion." National Research Council. 1994. Computing, Communication, and the Information Age. Washington, DC: The National Academies Press. doi: 10.17226/9121.
×

FIGURE 11 Blank document.

characters. For a mathematical equation, the presence of subscripts and superscripts generates additional small peaks. A theory of blank space in lines and documents would aid in building tools for accessing text.

Why is it important to analyze text automatically? There are many reasons. As has already been mentioned, allowing standard database queries of English text documents in the case where the document has tables is one reason. Another reason involves automatic indexing. Consider WAIS, a tool created by Apple Computer, Dow Jones, Thinking Machines, and Dunn and Bradstreet for locating information from wire services and other text sources (Kahle, 1989). Intuitively, WAIS operates by taking a document, sorting the words, and creating a vector whose components indicate the number of occurrences of various words in the document. One retrieves a document by providing a set of keywords. The keywords are used to form a search vector. The dot product of the search vector is computed with each vector representing a document in the collection. (This is basically the SMART technology (Salton, 1991). A short list of documents with the highest dot products is produced. The documents can then be displayed.

Suggested Citation:"Conclusion." National Research Council. 1994. Computing, Communication, and the Information Age. Washington, DC: The National Academies Press. doi: 10.17226/9121.
×
Page 16
Suggested Citation:"Conclusion." National Research Council. 1994. Computing, Communication, and the Information Age. Washington, DC: The National Academies Press. doi: 10.17226/9121.
×
Page 15
Next: References »
Computing, Communication, and the Information Age Get This Book
×
 Computing, Communication, and the Information Age
MyNAP members save 10% online.
Login or Register to save!

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!