Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Access methods for text
Faloutsos C. ACM Computing Surveys17 (1):49-74,1985.Type:Article
Date Reviewed: Jan 1 1986

Automated text retrieval methods are used in libraries and in many online bibliographic and numerical data files. They provide the library user with fast and accurate access to books and journal papers. Text retrieval is also important in office automation systems where letters, reports, memos, and other documents are created, received, and filed for later retrieval. Office workers could benefit from automated information storage and retrieval systems. When these are combined with word processing and electronic mail, the amount of paper circulating in an office could be reduced. With the objective of applying text retrieval methods to an office environment, Faloutsos reviews various text retrieval techniques, indicates some of the difficulties involved, and describes some methods that he considers to be particularly applicable for use in office automation.

This is a well-organized and comprehensive paper which examines different text retrieval access methods: full test scanning, inverted lists of key words, multiattribute hashing (superimposed coding), signature files, and clustering techniques. Each of these methods has a long developmental history, and lengthy explanations would be required for a full description of the method with both its advantages and disadvantages. Faloutsos does an admirable job of summarizing, but unless the reader is aleady somewhat familiar with these techniques the exposition may be hard to follow. However, there is an excellent set of references, about 100 of them, which will enable the interested reader to pursue any topic in greater depth.

In the latter part of the paper, the author discusses the integration of text retrieval systems with database management systems appropriate for an office environment. He analyzes primary-key, secondary-key, and text retrieval access methods and compares these on the following criteria: space or memory utilization; response time for searching; handling of insertions, deletions, and updates; ease of growth; preservation of key-order; and the ability to integrate with other retrieval methods. The author concludes that, “In our opinion the signature file approach seems most promising for archiving documents in an office. It provides a reasonable compromise between the inversion method, which is fast on retrieval but expensive on insertion, and the full text screening method, which requires minimal insertion cost, but is slow.” But still, in the author’s words, “There are many open problems in the area.”

Reviewer:  H. Borko Review #: CR109940
Bookmark and Share
 
Information Search And Retrieval (H.3.3 )
 
 
Access Methods (H.2.2 ... )
 
 
Library Automation (H.3.6 )
 
 
Miscellaneous (I.7.m )
 
 
Office Automation (H.4.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Information Search And Retrieval": Date
Nested transactions in a combined IRS-DBMS architecture
Schek H. (ed)  Research and development in information retrieval (, King’s College, Cambridge,701984. Type: Proceedings
Nov 1 1985
An integrated fact/document information system for office automation
Ozkarahan E., Can F. (ed) Information Technology Research Development Applications 3(3): 142-156, 1984. Type: Article
Oct 1 1985
Storage and retrieval considerations of binary data bases
Spiegler I., Maayan R. Information Processing and Management: an International Journal 21(3): 233-254, 1985. Type: Article
Apr 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy