Search results

1 – 10 of 14
Article
Publication date: 1 March 1990

Karen Markey Drabenstott and Diane Vizine‐Goetz

Search trees presented in this article control system responses and determine appropriate subject searching approaches to user queries. Users do not explicitly choose a particular…

Abstract

Search trees presented in this article control system responses and determine appropriate subject searching approaches to user queries. Users do not explicitly choose a particular approach. Rather, systems respond with an approach based on the extent to which queries match the catalog's controlled vocabulary and produce retrievals. The benefit of incorporating search trees into online bibliographic systems is the ability to place the responsibility of determining which approach produces the best results on the system.

Details

Library Hi Tech, vol. 8 no. 3
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 February 1993

Thomas A. Peters

The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a…

Abstract

The purpose of this article is to present an overview of the history and development of transaction log analysis (TLA) in library and information science research. Organizing a literature review of the first twenty‐five years of TLA poses some challenges and requires some decisions. The primary organizing principle could be a strict chronology of the published research, the research questions addressed, the automated information retrieval (IR) systems that generated the data, the results gained, or even the researchers themselves. The group of active transaction log analyzers remains fairly small in number, and researchers who use transaction logs tend to use this method more than once, so tracing the development and refinement of individuals' uses of the methodology could provide insight into the progress of the method as a whole. For example, if we examine how researchers like W. David Penniman, John Tolle, Christine Borgman, Ray Larson, and Micheline Hancock‐Beaulieu have modified their own understandings and applications of the method over time, we may get an accurate sense of the development of all applications.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 January 1994

Karen M. Drabenstott and Marjorie S. Weller

Library users continue to experience difficulty in using the online catalog, particularly in the area of subject access. This project describes a test of a new design for subject…

Abstract

Library users continue to experience difficulty in using the online catalog, particularly in the area of subject access. This project describes a test of a new design for subject access to online catalogs. The new design requires a wide range of subject searching capabilities and search trees to govern the system's selection of searching capabilities in response to user queries. Is the performance of search trees superior to subject searching approaches chosen at random? This project is geared to make that determination.

Details

Library Hi Tech, vol. 12 no. 1
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 February 1993

Martin Kurth

Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the…

Abstract

Introduction Since the earliest transaction monitoring studies, researchers have encountered the boundaries that define transaction log analysis as a methodology for studying the use of online information retrieval systems. Because, among other reasons, transaction log databases contain relatively few fields and lack sufficient retrieval tools, students of transaction log data have begun to ask as many questions about what transaction logs cannot reveal as they have asked about what transaction logs can reveal. Researchers have conducted transaction monitoring studies to understand the objective phenomena embodied in this statement: “Library patrons enter searches into online information retrieval systems.” Transaction log data effectively describe what searches patrons enter and when they enter them, but they don't reflect, except through inference, who enters the searches, why they enter them, and how satisfied they are with their results.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Content available
Article
Publication date: 2 November 2015

Heidi Hanson and Zoe Stewart-Marshall

185

Abstract

Details

Library Hi Tech News, vol. 32 no. 9
Type: Research Article
ISSN: 0741-9058

Article
Publication date: 1 February 1993

Beth Sandore

The ability to conduct unobtrusive observation of user searching is a potential strength of the method of information retrieval system analysis known as transaction log analysis…

Abstract

The ability to conduct unobtrusive observation of user searching is a potential strength of the method of information retrieval system analysis known as transaction log analysis (TLA). Transaction logs supply unequivocal information about what a user typed while searching. All other methods rely on self‐reporting, which, as Nielsen points out, is not always corroborated by the logs. Regardless of where in an institution information retrieval (IR) system evaluation takes place, TLA is a method that enables library staff at all levels to examine a variety of system and user‐related activities that are recorded on the log. Dominick suggested that TLA can enable the examination of three broad categories of activity: 1) system performance and resource utilization, 2) information retrieval performance, and 3) user interaction with the IR system. This article has been divided into several sections corresponding to functional areas in a library to suggest useful applications of TLA.

Details

Library Hi Tech, vol. 11 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 February 1989

Geoffrey D. Smith

For a library planning to add to a collection and develop a bibliography in a given area, the computer database can be a key factor in terms of efficiency of the process and the…

Abstract

For a library planning to add to a collection and develop a bibliography in a given area, the computer database can be a key factor in terms of efficiency of the process and the comprehensiveness of the end result. The Ohio State University Libraries (OSUL) in Columbus, Ohio house the outstanding William Charvat Collection of American Fiction, named in honor of a distinguished professor of American authorship at Ohio State University. For works published in the 18th and 19th centuries, the Charvat Collection compares favorably with collections at Yale University, the Henry E. Huntington Library, and the American Antiquarian Society. The Charvat collection is particularly strong for the period 1876–1900. Among 20th‐century titles, its holdings for the period 1901–1925 are rivalled only by the Library of Congress. Efforts have begun to develop holdings in American fiction from 1926 through the present.

Details

Collection Building, vol. 9 no. 2
Type: Research Article
ISSN: 0160-4953

Article
Publication date: 1 June 1997

Alan Poulter

A ‘World Wide Web search engine’ is defined as a retrieval service, consisting of a database (or databases) describing mainly resources available on the World Wide Web (WWW)…

1188

Abstract

A ‘World Wide Web search engine’ is defined as a retrieval service, consisting of a database (or databases) describing mainly resources available on the World Wide Web (WWW), search software and a user interface also available via WWW. After intro ducing early Internet search engines, which are pertinent as precursors for the current range of WWW search engines, the problems of searching the WWW (link persistence, lack of integrated search software) and the resulting search engine types (keyword or directory) are analysed. Search engines of all types are then compared across their generic features (database content, retrieval software, and search interface), rather than on a search engine by search engine basis. Finally, wider information access issues aris ing from the nature of the Internet and web search engines are considered, and a general strategy for using web search engines is proposed.

Details

Program, vol. 31 no. 2
Type: Research Article
ISSN: 0033-0337

Keywords

Article
Publication date: 1 January 1990

Denise Kaplan, Joseph R. Matthews, William Horton, Karen Markey Drabenstott, Charles R. Hildreth, Katharina Klemperer, Lare Mischo, K.T. Noerr and Marilee Winiarski

Most second‐generation online catalogs give libraries some capability to customize help messages, screen displays, and system prompts. Microcomputer applications designed or…

Abstract

Most second‐generation online catalogs give libraries some capability to customize help messages, screen displays, and system prompts. Microcomputer applications designed or mounted locally may offer even more flexibility. Commercially available information systems offer the user some type of assistance, even when not totally profitable. The librarian has become an active, if not always willing, participant in the design of his or her system's user interface. Knowledge of both patrons and collections can have direct bearing on the structure and effectiveness of the library's automated system, its interface, and online help features.

Details

Library Hi Tech, vol. 8 no. 1
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 September 2005

Christopher Cox, Alice L. Daugherty, Julia Gelfand and S.G. Ranti Junus

To highlight content of interest to this journal’s readership that promotes current thinking and activities in information technology.

1009

Abstract

Purpose

To highlight content of interest to this journal’s readership that promotes current thinking and activities in information technology.

Design/methodology/approach

A selective conference report of the annual meeting of the American Library Association and a pre‐conference.

Findings

The largest conference of librarians, the variety of programs, activities, exhibit halls, creates one of the best professional development opportunities for librarians. Attracting librarians from all sectors and work environments from around the globe, this conference is hard to describe in a brief way except to say it is an experience. Documenting relevant programs about information technology was the goal of this contribution.

Practical implications

An alternative to not being present while gaining some information and coverage.

Originality/value

Contains information of particular interest to readers who did not attend these sessions. Introducers them to presenters and important hot topics.

Details

Library Hi Tech News, vol. 22 no. 8
Type: Research Article
ISSN: 0741-9058

Keywords

Access

Year

Content type

Article (14)
1 – 10 of 14