Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,350,569 papers from all fields of science
Search
Sign In
Create Free Account
Computer science
Known as:
Computer scientists
, Diversity of computer science
, Computer Studies
Expand
Computer science is the study of the theory, experimentation, and engineering that form the basis for the design and use of computers. It is the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Actor model
Aho–Corasick algorithm
Biological database
CIDR
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Guest Editors’ Introduction: Computer Science in the Liberal Arts
Doug Baldwin
,
A. Brady
TOCE
2010
Corpus ID: 18021264
For many people, computer science is not closely associated with the liberal arts. Yet “liberal arts” can denote a philosophy of…
Expand
Highly Cited
2004
Highly Cited
2004
Continuous-variable quantum-state sharing via quantum disentanglement
A. Lance
,
T. Symul
,
+4 authors
P. Lam
2004
Corpus ID: 14088536
Quantum-state sharing is a protocol where perfect reconstruction of quantum states is achieved with incomplete or partial…
Expand
Highly Cited
2004
Highly Cited
2004
Technology Learning Principles for Preservice and In-service Teacher Education
Joan E. Hughes
2004
Corpus ID: 154559329
This essay presents a vision for technology integration in teacher education that develops teachers into “technology…
Expand
Highly Cited
2004
Highly Cited
2004
Understanding the implementation of software process improvement innovations in software organizations
K. Kautz
,
P. Nielsen
Information Systems Journal
2004
Corpus ID: 30403280
Abstract. The development of software is a complex task frequently resulting in unfinished projects, project overruns and system…
Expand
Highly Cited
2003
Highly Cited
2003
Simulation of nonequilibrium thermal effects in power LDMOS transistors
A. Raman
,
D. G. Walker
,
T. Fisher
2003
Corpus ID: 1916049
Highly Cited
2000
Highly Cited
2000
Practical Intrusion Detection Handbook
Paul Proctor
2000
Corpus ID: 109760243
From the Publisher: The definitive guide to understanding, selecting, and deploying intrusion detection in the enterprise…
Expand
Highly Cited
1996
Highly Cited
1996
Developing a Testing Maturity Model, Part II
I. Burnstein
,
T. Suwannasart
1996
Corpus ID: 107544838
Testing is a critical component of a mature software development process. It is one of the most challenging and costly process…
Expand
Highly Cited
1995
Highly Cited
1995
Bayesian Learning for Neural Networks
Radford M. Neal
1995
Corpus ID: 60809283
Artificial "neural networks" are widely used as flexible models for classification and regression applications, but questions…
Expand
Highly Cited
1990
Highly Cited
1990
A hierarchical approach to designing approximate reasoning-based controllers for dynamic physical systems
H. Berenji
,
Yung-Yaw Chen
,
Chuen-Chien Lee
,
J. Jang
,
S. Murugesan
Conference on Uncertainty in Artificial…
1990
Corpus ID: 15599923
This paper presents a new technique for the design of approximate reasoning based controllers for dynamic physical systems with…
Expand
Highly Cited
1984
Highly Cited
1984
On Area and Yield Considerations for Fault-Tolerant VLSI Processor Arrays
I. Koren
,
M. Breuer
IEEE transactions on computers
1984
Corpus ID: 3490006
Fault-tolerance is undoubtedly a desirable property of any processor array. However, increased design and implementation costs…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE