• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Analyzing the Facebook Friendship Graph
Analyzing the Facebook Friendship Graph

... acquired from OSN, trying to answer to these problems. In this work, we analyze connections among almost a million of Facebook users, data collected through some developed ad hoc Information Extraction techniques. This paper is organized as follows: in Section 2 we consider related works on social ...
10 Tips for Website Safety
10 Tips for Website Safety

... 4. Do not use your web space for generic file storage. Private network file shares are available at no cost to faculty for network storage and backups of files that should not be publicly accessible. Department/group shares are also available for files that need to be shared between members of a tea ...
Philosophical Aspects of Science
Philosophical Aspects of Science

... and laws as do physics and chemistry.  Some believe that all scientific disciplines can be reduced to physics, which is regarded as the most basic.  But can we use physical theories to explain biological phenomena?  The point is that even within science there are differences. ...
test 1, April 3, 2009 and solutions
test 1, April 3, 2009 and solutions

... that groups of 10 employees is acceptable. In this exercise we will try to check this assumption. Based on experience of the computer department we have:  N = “the number of present employees within an arbitrary group of 10, sharing one internet connection”. N is homogeneously distributed on {6, 7, ...
Artificial Intelligence: Introduction
Artificial Intelligence: Introduction

... Perceptrons and Neural networks ...
Wolfram, Ch 12
Wolfram, Ch 12

Mathematics 3321 – Statistics
Mathematics 3321 – Statistics

Software Engineering
Software Engineering

... others are used only for experimentation and may eventually be replaced by the production system. ...
DI4R-NBIS-Nanjiang
DI4R-NBIS-Nanjiang

Mathematical Research and Modeling for the Army
Mathematical Research and Modeling for the Army

... coverage of a broader range of parameters, operating conditions and design alternatives. ...
Query Processing, Resource Management and Approximate in a
Query Processing, Resource Management and Approximate in a

Intro
Intro

Efficient Approximation, Error Estimation, and Adaptive Computation for Randomly Perturbed Elliptic Problems
Efficient Approximation, Error Estimation, and Adaptive Computation for Randomly Perturbed Elliptic Problems

Using Smartwatches for Privacy Awareness in
Using Smartwatches for Privacy Awareness in

PMcoarse methods update and network design
PMcoarse methods update and network design

Guest Editorial: Physics-Based Simulation Games
Guest Editorial: Physics-Based Simulation Games

Unit_19__Standard_Deviation_1_of_2
Unit_19__Standard_Deviation_1_of_2

More Mathematics into Medicine!
More Mathematics into Medicine!

The Epistemology of Performance
The Epistemology of Performance

... such as the theory of knowledge itself. Some have done so because it interests them, others because they are in the process of developing ideas and theories which cannot but take into account these very basic issues. It has been pointed out that none of the three methods of thought given above, it ...
MyBio - Purdue University
MyBio - Purdue University

Query Processing, Resource Management and Approximate in a
Query Processing, Resource Management and Approximate in a

PDF
PDF

Oct 1982 WHAT DO MATHEMATICIANS DO? by George W. Mackey
Oct 1982 WHAT DO MATHEMATICIANS DO? by George W. Mackey

... around at random so have the mathematicians built a marvelously articulated body of abstract concepts by following their individual instincts with an eye to what their colleagues are doing. An interesting example occured during the first two decades of the twentieth century. While the physicists wer ...
Program Educational Objectives
Program Educational Objectives

star Power Movie analytics engages Bentley research team By
star Power Movie analytics engages Bentley research team By

< 1 ... 74 75 76 77 78 79 80 81 82 ... 98 >

Theoretical computer science



Theoretical computer science is a division or subset of general computer science and mathematics that focuses on more abstract or mathematical aspects of computing and includes the theory of computation.It is not easy to circumscribe the theory areas precisely and the ACM's Special Interest Group on Algorithms and Computation Theory (SIGACT) describes its mission as the promotion of theoretical computer science and notes:Template:""To this list, the ACM's journal Transactions on Computation Theory adds coding theory, computational learning theory and theoretical computer science aspects of areas such as databases, information retrieval, economic models and networks. Despite this broad scope, the ""theory people"" in computer science self-identify as different from the ""applied people."" Some characterize themselves as doing the ""(more fundamental) 'science(s)' underlying the field of computing."" Other ""theory-applied people"" suggest that it is impossible to separate theory and application. This means that the so-called ""theory people"" regularly use experimental science(s) done in less-theoretical areas such as software system research. It also means that there is more cooperation than mutually exclusive competition between theory and application.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report