{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:36:35Z","timestamp":1743118595661,"version":"3.40.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030021511"},{"type":"electronic","value":"9783030021528"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-02152-8_4","type":"book-chapter","created":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T13:20:14Z","timestamp":1556630414000},"page":"69-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Calvin Mooers, Zatocoding, and Early Research on Information Retrieval"],"prefix":"10.1007","author":[{"given":"Paul E.","family":"Ceruzzi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,1]]},"reference":[{"key":"4_CR1","unstructured":"Ball, W. W. Mathematical Recreations & Essays. London: MacMillan and Co., 11th edition, 1940."},{"issue":"11","key":"4_CR2","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1145\/355611.362534","volume":"16","author":"C Bachman","year":"1973","unstructured":"Bachman, Charles. 1973. The Programmers as Navigator. Communications of the ACM 16\/11: 652\u2013658.","journal-title":"Communications of the ACM"},{"key":"4_CR3","volume-title":"IBM\u2019s Early Computers","author":"CJ Bashe","year":"1986","unstructured":"Bashe, Charles J, Lyle R. Johnson, John H. Palmer, and Emerson W. Pugh. 1986. IBM\u2019s Early Computers. Cambridge, MA: MIT Press."},{"key":"4_CR4","unstructured":"Brand, Stewart, ed. 1971. The Last Whole Earth Catalog. Portola, CA, p. 320."},{"key":"4_CR5","volume-title":"II Cybernetic Frontiers","author":"S Brand","year":"1974","unstructured":"Brand, Stewatr. 1974. II Cybernetic Frontiers. New York, Random House."},{"key":"4_CR6","unstructured":"Burke, Colin. 1994. Information and Secrecy: Vannevar Bush, Ultra, and the other Memex. Metuchen, NJ: Scarecrow Press."},{"key":"4_CR7","volume-title":"It Wasn\u2019t All Magic: the Early Struggle to Automate Cryptanalysis, 1930\u20131960s","author":"C Burke","year":"2002","unstructured":"Burke, Colin. 2002. It Wasn\u2019t All Magic: the Early Struggle to Automate Cryptanalysis, 1930\u20131960s. Fort Meade, MD: National Security Agency, Center for Cryptologic History."},{"key":"4_CR8","unstructured":"Bush, Vannevar. 1945. Bush, \u201cAs We May Think,\u201d Atlantic Monthly 176\/1 (1945), pp. 641\u2013649."},{"key":"4_CR9","unstructured":"Carnegie-Mellon University, Software Engineering Institute. 2008. \u201cVulnerability Notes Database, VU 836068,\u201d https:\/\/www.kb.cert.org\/vuls\/id\/836068 . Accessed March 6, 2017"},{"volume-title":"Punched Cards: their Applications to Science and Industry","year":"1951","key":"4_CR10","unstructured":"Casey, Robert S. and James W. Perry, eds. 1951. Punched Cards: their Applications to Science and Industry. New York: Reinhold Publishing."},{"key":"4_CR11","volume-title":"A History of Modern Computing","author":"P Ceruzzi","year":"1998","unstructured":"Ceruzzi, Paul. 1998. A History of Modern Computing. Cambridge, MA: MIT Press."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Daly, R.P. 1956. \u201cIntegrated Data Processing with the Univac File Computer.\u201d Proceedings Western Joint Computer Conference.","DOI":"10.1145\/1455410.1455447"},{"key":"4_CR13","unstructured":"Garfield, Eugene, 1997. \u201cA Tribute to Calvin N. Mooers, A Pioneer of Information Retrieval,\u201d The Scientist 11\/4 (March), accessed electronically December 20, 2016."},{"key":"4_CR14","volume-title":"Historical Studies in Information Science","author":"TB Hahn","year":"1998","unstructured":"Hahn, Trudy Bellardo, and Michael Buckland. 1998. Historical Studies in Information Science.Metuchen, NJ: American Society for Information Science."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Heide, Lars. 2009 Punched-Card Systems and the Early Information Explosion, 1880\u20131945. Baltimore: Johns Hopkins University Press.","DOI":"10.1353\/book.3454"},{"key":"4_CR16","volume-title":"John von Neumann and Norbert Wiener: From Mathematics to the Technologies of Life and Death","author":"SJ Heims","year":"1980","unstructured":"Heims, Steve J. 1980. John von Neumann and Norbert Wiener: From Mathematics to the Technologies of Life and Death. Cambridge, MA: MIT Press."},{"key":"4_CR17","unstructured":"Institute for Numerical Analysis. 1949. Monte Carlo Method: Proceedings of a Symposium Held June 29, 30 and July 1, 1949, in Los Angeles, California (Washington, DC: US Government Printing Office, 1951)."},{"key":"4_CR18","unstructured":"Kelly 2008. \u201cOne Dead Media.\u201d The Technium, June 17. http:\/\/kk.org\/the technium\/one-dead-media\/ . Accessed December 27, 2016."},{"key":"4_CR19","doi-asserted-by":"crossref","DOI":"10.1353\/book.40478","volume-title":"The Cybernetics Moment","author":"R Kline","year":"2015","unstructured":"Kline, Ron. 2015. The Cybernetics Moment. Baltimore: Johns Hopkins University Press."},{"key":"4_CR20","unstructured":"Knuth, Donald. 1969. The Art of Computer Programming, vol. 2: Seminumerical Algorithms. Reading, MA: Addison Wesley."},{"key":"4_CR21","unstructured":"Knuth, Donald. 1973. The Art of Computer Programming, vol. 3: Sorting and Searching. Reading, MA: Addison Wesley."},{"key":"4_CR22","unstructured":"La Barre. 2002. \u201cWeaving Webs of Significance: The Classification Research Study Group in the United States and Canada.\u201d Proceedings of the Second Annual Conference on the History and Heritage of Scientific and Technical Information Systems: 246\u2013257."},{"key":"4_CR23","unstructured":"Library of Congress. 2018. http:\/\/www.loc.gov\/rr\/main\/inforeas\/card.html ."},{"key":"4_CR24","unstructured":"Mooers, Calvin. 1947. Proceedings of the American Chemical Society Meeting 112 (September)."},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1002\/asi.5090020107","volume":"2","author":"C Mooers","year":"1951","unstructured":"Mooers, Calvin. 1951. \u201cZatocoding Applied to Mechanical Organization of Knowledge,\u201d American Documentation, 2: 20\u201332.","journal-title":"American Documentation"},{"key":"4_CR26","volume-title":"Private communication with the author","author":"C Mooers","year":"1992","unstructured":"Mooers, Calvin. 1992. Private communication with the author."},{"key":"4_CR27","unstructured":"Mooers, Calvin. 2003. \u201cThe Computer Project at the Naval Ordnance Laboratory.\u201d IEEE Annals of the History of Computing 23, no. 2 (April\u2013June): 51\u201366."},{"key":"4_CR28","unstructured":"Nakamoto, Satoshi. 2017. \u201cBitcoin: a Peer-to-Peer Electronic Cash System,\u201d https:\/\/bitcoin.org\/bitcoin.pdf . accessed March 6, 2017."},{"key":"4_CR29","unstructured":"Ralston, Anthony, and Edwin D. Reilly. 1993. Encyclopedia of Computer Science, Third Edition. New York: Van Nostrand Reinhold, 1993: pp. 1185\u20131191."},{"key":"4_CR30","unstructured":"RAND Corporation. 1955. A Million Random Digits with 100,000 Normal Deviates. http:\/\/www.rand.org\/pubs\/monograph_reports\/MR1418.html . Accessed February 28, 2017"},{"key":"4_CR31","unstructured":"Rayward, W. Boyd, and Mary Ellen Bowden. 2004. The History and Heritage of Scientific and Technological Information Systems. Proceedings of the 2002 Conference. Medford, NJ: Information Today, Inc."},{"key":"4_CR32","volume-title":"Programming Languages: History and Fundamentals","author":"J Sammet","year":"1969","unstructured":"Sammet, Jean. 1969. Programming Languages: History and Fundamentals. Englewood Cliffs, NJ: Prentice-Hall."},{"key":"4_CR33","volume-title":"A Mathematical Theory of Communication","author":"C Shannon","year":"1949","unstructured":"Shannon, Claude, and Warren Weaver. 1949. A Mathematical Theory of Communication. Urbana, Ill: University of Illinois Press."},{"key":"4_CR34","unstructured":"Smithsonian Institution, National Museum of American History. 2017. \u201cHelp us transcribe Phyllis Diller's jokes\u2014and enjoy some laughs along the way!\u201d http:\/\/americanhistory.si.edu\/blog\/help-us-transcribe-phyllis-dillers-jokes . Accessed March 6, 2017."},{"key":"4_CR35","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/3828.001.0001","volume-title":"The Intellectual Foundation of Information Organization","author":"E Svenonius","year":"2000","unstructured":"Svenonius, Elaine. 2000. The Intellectual Foundation of Information Organization. Cambridge, MA: MIT Press."},{"issue":"February","key":"4_CR36","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MSPEC.1974.6366325","volume":"11","author":"H Tropp","year":"1974","unstructured":"Tropp, Henry. 1974. \u201cThe Effervescent Years: A Retrospective.\u201d IEEE Spectrum 11 (February): 70\u201381.","journal-title":"IEEE Spectrum"},{"key":"4_CR37","doi-asserted-by":"publisher","DOI":"10.1063\/1.3024514","volume-title":"Adventures of a Mathematician","author":"SM Ulam","year":"1976","unstructured":"Ulam, S. M. 1976. Adventures of a Mathematician. New York: Charles Scribner & Sons."},{"key":"4_CR38","unstructured":"Von Neumann, John. 1949. \u201cVarious Techniques Used in Connection with Random Digits,\u201d in Institute for Numerical Analysis, Monte Carlo Method: Proceedings of a Symposium Held June 29, 30 and July 1, 1949, in Los Angeles, California (Washington, DC: US Government Printing Office, 1951), pp. 36\u201338; quotation on p. 36."},{"key":"4_CR39","unstructured":"Weik, Martin H. 1955. A Survey of Domestic Electronic Digital Computing Systems. Aberdeen, MD: Ballistic Research Laboratories, Report No. 971 (December): 125\u2013126."},{"key":"4_CR40","unstructured":"Wiener, Norbert. 1948. Cybernetics. New York: John Wiley."}],"container-title":["History of Computing","Exploring the Early Digital"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02152-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T05:43:30Z","timestamp":1694843010000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-02152-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030021511","9783030021528"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02152-8_4","relation":{},"ISSN":["2190-6831","2190-684X"],"issn-type":[{"type":"print","value":"2190-6831"},{"type":"electronic","value":"2190-684X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"1 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}