default search action
Caroline M. Eastman
Person information
- affiliation: University of South Carolina, Columbia, SC, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [c24]Holly A. Taylor, Ayanna K. Thomas, Caterina Artuso, Caroline M. Eastman:
Effects of Global and Local Processing on Visuospatial Working Memory. Spatial Cognition 2014: 14-29 - 2012
- [c23]RoxAnn H. Stalvey, Csilla Farkas, Caroline M. Eastman:
First use: Introducing information security in high school oracle academy courses. IRI 2012: 653-658 - 2010
- [j29]Tyrone S. Toland, Csilla Farkas, Caroline M. Eastman:
The inference problem: Maintaining maximal availability in the presence of database updates. Comput. Secur. 29(1): 88-103 (2010)
2000 – 2009
- 2008
- [c22]Clint Fuchs, Caroline M. Eastman:
Work in progress: effects of multiple words on ambiguity in information retrieval. ACM Southeast Regional Conference 2008: 136-139 - [c21]Jonas Boustedt, Robert McCartney, Josh Tenenberg, Scott D. Anderson, Caroline M. Eastman, Daniel D. Garcia, Paul V. Gestwicki, Margaret S. Menzin:
It seemed like a good idea at the time. SIGCSE 2008: 528-529 - 2006
- [c20]John B. Bowles, Caroline M. Eastman, Csilla Farkas:
Engaging undergraduates in computer security research. InfoSecCD 2006: 184-190 - 2005
- [c19]Susan G. Doran, Samuel de Ycaza, Caroline M. Eastman, Bernard J. Jansen:
Finding nutrition information on the Web: Coverage vs. authority. ASIST 2005 - [c18]Marcus Wassmer, Caroline M. Eastman:
Automatic evaluation of credibility on the Web. ASIST 2005 - [c17]Tyrone S. Toland, Csilla Farkas, Caroline M. Eastman:
Dynamic Disclosure Monitor (D2Mon): An Improved Query Processing Solution. Secure Data Management 2005: 124-142 - 2004
- [c16]Caroline M. Eastman, Bernard J. Jansen:
The appropriate (and inappropriate) use of query operators and their effect on web search results. ASIST 2004: 274-279 - 2003
- [j28]Caroline M. Eastman, Bernard J. Jansen:
Coverage, relevance, and ranking: The impact of query operators on Web search engine results. ACM Trans. Inf. Syst. 21(4): 383-411 (2003) - [c15]Bernard J. Jansen, Caroline M. Eastman:
The Effects of Search Engines and Query Operators on Top Ranked Results. ITCC 2003: 135-139 - 2002
- [j27]Caroline M. Eastman:
30, 000 hits may be better than 300: Precision anomalies in Internet searches. J. Assoc. Inf. Sci. Technol. 53(11): 879-882 (2002) - [j26]Nancy J. Lightner, Caroline M. Eastman:
User Preference for Product Information in Remote Purchase Environments. J. Electron. Commer. Res. 3(3): 174-186 (2002) - 2001
- [c14]Csilla Farkas, Tyrone S. Toland, Caroline M. Eastman:
The Inference Problem and Updates in Relational Databases. DBSec 2001: 181-194
1990 – 1999
- 1999
- [j25]Su Hee Kim, Caroline M. Eastman:
An Experiment on Node Size in a Hypermedia System. J. Am. Soc. Inf. Sci. 50(6): 530-536 (1999) - [c13]Fiona C. Coutinho, Caroline M. Eastman, Christopher B. Hare, Robert F. Skinder:
Integrating Digital Resources into a Traditional University Research Library. ADL 1999: 88 - [c12]Caroline M. Eastman:
30, 000 Hits may be Better than 300: Precision Anomalies in Internet Searches (poster abstract). SIGIR 1999: 313-314 - 1998
- [j24]April R. McQuire, Caroline M. Eastman:
The Ambiguity of Negation in Natural Language Queries to Information Retrieval Systems. J. Am. Soc. Inf. Sci. 49(8): 686-692 (1998) - 1997
- [j23]Royce Rose, Caroline M. Eastman:
Hierarchical Classification as an Aid to Browsing. Informatica (Slovenia) 21(1) (1997) - 1993
- [j22]Yuk Fung Chang, Caroline M. Eastman:
An Information Retrieval System for Reusable Software. Inf. Process. Manag. 29(5): 601-614 (1993) - 1992
- [j21]Caroline M. Eastman, Robert P. Trueblood:
Occupancy Models for the Estimation of Block Accesses. Comput. J. 35(6): 654-658 (1992) - [c11]Anamika Saxena, Su Hee Kim, Caroline M. Eastman:
Node conversion in hypermedia systems. ACM Southeast Regional Conference 1992: 442-444 - 1991
- [j20]Charlene W. Young, Caroline M. Eastman, Robert L. Oakman:
An analysis of ill-formed input in natural language queries to document retrieval systems. Inf. Process. Manag. 27(6): 615-622 (1991) - [j19]Caroline M. Eastman:
Formatted and unformatted character data types. J. Am. Soc. Inf. Sci. 42(2): 110-111 (1991) - 1990
- [j18]William F. Storer, Caroline M. Eastman:
Some experiments in the use of clustering for data validation. Inf. Syst. 15(5): 537-542 (1990) - [j17]Ziad S. Nakkouzi, Caroline M. Eastman:
Query formulation for handling negation in information retrieval systems. J. Am. Soc. Inf. Sci. 41(3): 171-182 (1990) - [c10]Charlene W. Young, Caroline M. Eastman, Robert L. Oakman:
An analysis of Ill-formed input in natural language queries. ACM Southeast Regional Conference 1990: 200
1980 – 1989
- 1989
- [j16]Caroline M. Eastman:
Approximate Retrieval: A Comparison of Information Retrieval and Database Management Systems. IEEE Data Eng. Bull. 12(2): 41-45 (1989) - [j15]Walter D. Potter, Robert P. Trueblood, Caroline M. Eastman:
Hyper-Semantic Data Modeling. Data Knowl. Eng. 4(1): 69-90 (1989) - [j14]Caroline M. Eastman:
Handling incrementally specified boolean queries: A comparison of inverted and signature file organizations. Inf. Process. Manag. 25(1): 27-38 (1989) - [j13]Caroline M. Eastman:
Research productivity and breadth of interest revisited. JASIS 40(5): 359-360 (1989) - 1988
- [j12]Caroline M. Eastman:
An approach to the evaluation of catalog selection systems. Inf. Process. Manag. 24(1): 23-30 (1988) - [j11]Elizabeth B. McClelland, Robert P. Trueblood, Caroline M. Eastman:
Two approximate operators for a data base query language: sounds-like and close-to. IEEE Trans. Syst. Man Cybern. 18(6): 873-884 (1988) - [c9]Irene Yang, Caroline M. Eastman:
Human autobiographic memory simulation. ACM Conference on Computer Science 1988: 738 - 1987
- [j10]Caroline M. Eastman:
Review: Introduction to fuzzy arithmetic: Theory and applications : Arnold Kaufmann and Madan M. Gupta, Van Nostrand Reinhold, New York, 1985. Int. J. Approx. Reason. 1(1): 141-143 (1987) - [j9]Caroline M. Eastman:
Response: Introduction to fuzzy arithmetic: Theory and applications : Arnold Kaufmann and Madan M. Gupta, Van Nostrand Reinhold, New York, 1985. Int. J. Approx. Reason. 1(1): 145-146 (1987) - [j8]Caroline M. Eastman:
Optimal bucket size for multiattribute retrieval in partitioned files. Inf. Syst. 12(4): 375-383 (1987) - [j7]Caroline M. Eastman:
The First International Conference on Expert Database Systems: A Summary. SIGIR Forum 21(1-2): 6-10 (1987) - [c8]Caroline M. Eastman:
File Organizations and Incrementally Specified Queries. SIGIR 1987: 217-222 - 1985
- [j6]Caroline M. Eastman:
News from NSF. SIGIR Forum 18(2-4): 18-19 (1985) - 1983
- [j5]Caroline M. Eastman:
A Lexical Analysis of Keywords in High Level Programming Languages. Int. J. Man Mach. Stud. 19(6): 595-607 (1983) - [c7]Virginia C. Walker, Mary Charles Blakebrough, Caroline M. Eastman:
Session M4: Women in the workplace. ACM Annual Conference 1983: 12 - [c6]Caroline M. Eastman:
Current Practice in The Evaluation of Multikey Search Algorithms. SIGIR 1983: 197-204 - 1982
- [j4]Caroline M. Eastman:
A Comment on English Neologisms and Programming Language Keywords. Commun. ACM 25(12): 938-940 (1982) - [j3]Caroline M. Eastman, Maria Zemankova:
Partially Specified Nearest Neighbor Searches Using k-d Trees. Inf. Process. Lett. 15(2): 53-56 (1982) - [j2]Caroline M. Eastman, Stephen F. Weiss:
Tree structures for high dimensionality nearest neighbor searching. Inf. Syst. 7(2): 115-122 (1982) - 1981
- [j1]Caroline M. Eastman:
Optimal Bucket Size for Nearest Neighbor Searching in k-d Trees. Inf. Process. Lett. 12(4): 165-167 (1981) - [c5]William F. Storer, Caroline M. Eastman:
Experiments on the Application of Clustering Techniques to Data Validation (Abstract). SIGIR 1981: 88-89 - 1980
- [c4]Maria Zemankova, Caroline M. Eastman:
Comparative lexical analysis of FORTRAN code, code comments and English text. ACM Southeast Regional Conference 1980: 193-197
1970 – 1979
- 1979
- [c3]Caroline M. Eastman:
Lexical characteristics of keywords in COBOL, FORTRAN, Pascal, and PL/I. ACM Southeast Regional Conference 1979: 147 - [c2]Caroline M. Eastman, Steven L. Blumsack:
Repackaging the introductory course to separate the control language. SIGCSE 1979: 155-157 - 1978
- [c1]Caroline M. Eastman, Stephen F. Weiss:
A Tree Algorithm For Nearest Neighbor Searching In Document Retrieval Systems. SIGIR 1978: 131-149
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint