Automated Information Retrieval" describes a fully automated Boolean System and gives special attention to theoretical problems in automatic retrieval of textual information. The book details algorithms in each process in the system, including those that are radically new in the retrieval process and those that are adaptable to the individual. New approaches to evaluating information retrieval systems and studying their performance are included. This book reviews the general principles of constructing any system, such as an information retrieval system. It provides a detailed analysis of...
Automated Information Retrieval" describes a fully automated Boolean System and gives special attention to theoretical problems in automatic retrieval...
This highly successful manual has served for nearly three decades as the definitive guide to the safe use of radioactive materials. Completely revised and updated, the fourth edition presents a new dimension by adding coverage of nonionizing radiation, and is thus concerned with the entire field of radiation protection.
The author takes the novel approach of introducing the whole range of energies possessed by particles and electromagnetic waves at the beginning of the text, thus integrating coverage of ionizing and nonionizing radiation rather than considering them as two separate...
This highly successful manual has served for nearly three decades as the definitive guide to the safe use of radioactive materials. Completely revi...
How do terrorist groups control their members? Do the tools groups use to monitor their operatives and enforce discipline create security vulnerabilities that governments can exploit? The Terrorist's Dilemma is the first book to systematically examine the great variation in how terrorist groups are structured. Employing a broad range of agency theory, historical case studies, and terrorists' own internal documents, Jacob Shapiro provocatively discusses the core managerial challenges that terrorists face and illustrates how their political goals interact with the operational...
How do terrorist groups control their members? Do the tools groups use to monitor their operatives and enforce discipline create security vulnerabi...