Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,084,871 papers from all fields of science
Search
Sign In
Create Free Account
Computer science
Known as:
Computer scientists
, Diversity of computer science
, Computer Studies
Expand
Computer science is the study of the theory, experimentation, and engineering that form the basis for the design and use of computers. It is the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Actor model
Aho–Corasick algorithm
Biological database
CIDR
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Guest Editors’ Introduction: Computer Science in the Liberal Arts
Doug Baldwin
,
A. Brady
TOCE
2010
Corpus ID: 18021264
For many people, computer science is not closely associated with the liberal arts. Yet “liberal arts” can denote a philosophy of…
Expand
Highly Cited
2009
Highly Cited
2009
TREPPS: A Trust-based Recommender System for Peer Production Services
Yung-Ming Li
,
Chien-Pang Kao
Expert systems with applications
2009
Corpus ID: 16612416
Highly Cited
2004
Highly Cited
2004
Continuous-variable quantum-state sharing via quantum disentanglement
A. Lance
,
T. Symul
,
+4 authors
P. Lam
2004
Corpus ID: 14088536
Quantum-state sharing is a protocol where perfect reconstruction of quantum states is achieved with incomplete or partial…
Expand
Highly Cited
2004
Highly Cited
2004
Technology Learning Principles for Preservice and In-service Teacher Education
Joan E. Hughes
2004
Corpus ID: 154559329
This essay presents a vision for technology integration in teacher education that develops teachers into “technology…
Expand
Highly Cited
2003
Highly Cited
2003
Testing parallel random number generators
A. Srinivasan
,
M. Mascagni
,
D. Ceperley
Parallel Computing
2003
Corpus ID: 15627466
Highly Cited
2000
Highly Cited
2000
Practical Intrusion Detection Handbook
Paul Proctor
2000
Corpus ID: 109760243
From the Publisher: The definitive guide to understanding, selecting, and deploying intrusion detection in the enterprise…
Expand
Review
1996
Review
1996
Optical Character Recognition and Parsing of Typeset Mathematics1
R. Fateman
,
Taku A. Tokuyasu
,
Benjamin P. Berman
,
Nicholas Mitchell
Journal of Visual Communication and Image…
1996
Corpus ID: 8350531
Abstract There is a wealth of mathematical knowledge that could be potentially very useful in many computational applications…
Expand
Highly Cited
1995
Highly Cited
1995
Bayesian Learning for Neural Networks
Radford M. Neal
1995
Corpus ID: 60809283
Artificial "neural networks" are widely used as flexible models for classification and regression applications, but questions…
Expand
Highly Cited
1984
Highly Cited
1984
Quadriphase sequences for spread-spectrum multiple-access communication
Stephen M. Krone
,
D. Sarwate
IEEE Transactions on Information Theory
1984
Corpus ID: 1358937
This paper studies constructions for quadriphase sequences that are suitable for use as signature sequences in quadriphase spread…
Expand
Highly Cited
1980
Highly Cited
1980
Natural language production as a process of decision-making under constraints
David D. McDonald
1980
Corpus ID: 45464479
1,102,701. Locating conductors. TATEISI ELECTRONICS CO. June 16, 1965 [June 24, 1964], No. 25467/65. Heading G1N. To compensate…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE