Results 11 to 20 of about 1,948,017 (269)
Formal Methods Unifying Computing Science and Systems Theory [PDF]
Computing Science and Systems Theory can gain much from unified mathematical models and methodology, in particular formal reasoning ("letting the symbols do the work"). This is achieved by a wide-spectrum formalism. The language uses just four constructs, yet suffices to synthesize familiar notations (minus the defects) as well as new ones. It supports
Boute, Raymond
openaire +6 more sources
Application of Quantum Process Calculus to Higher Dimensional Quantum Protocols [PDF]
We describe the use of quantum process calculus to describe and analyze quantum communication protocols, following the successful field of formal methods from classical computer science.
Simon J. Gay, Ittoop Vergheese Puthoor
doaj +1 more source
Average Redundancy for Known Sources: Ubiquitous Trees in Source Coding [PDF]
Analytic information theory aims at studying problems of information theory using analytic techniques of computer science and combinatorics. Following Hadamard's precept, these problems are tackled by complex analysis methods such as generating functions,
Wojciech Szpankowski
doaj +1 more source
Impact factor (Web of Science, Clarivate Analytics) and CiteScore (Scopus, Elsevier) are the two leading metrics for journal evaluation, assessment and ranking. The relationship between the two is now established, using their respective percentile in this paper for 105 journal in the Computer science, theory and methods (CSTM ...
Emmanuela C.M. Obasi +4 more
openaire +1 more source
Integrating computational thinking into mathematics education through an unplugged computer science activity [PDF]
Integrating computational thinking (CT) into various disciplines via computer science (CS) methods such as unplugged, block-based, text-based, and physical programming is a trending topic in educational sciences.
Filiz Mumcu +2 more
doaj +1 more source
Design and development of elective course on cryptography using webinar technology
Problem and purpose. The article deals with studies of the effectiveness of the use of an elective course in teaching cryptography based on webinar technology.
Natalia V. Ignatenko
doaj +1 more source
Introduction: the article describes the application of fuzzy logic in the teaching of mathematics. This theory has a great creative ability to solve various pedagogical tasks for the implementation of the developing and applied functions of school ...
Mikhail A. Rodionov +2 more
doaj +1 more source
Formal Model of IDS Based on BDI Logic
Computer network security is an important aspect of computer science. Many researchers are trying to increase security using different methods, technologies, or tools.
Ján Perháč +3 more
doaj +1 more source
Cloud technologies in teaching computer science of future economists
Research goals: to analyze the main features use cloud technology in the training of computer science specialists economy and future develop recommendations for their use in the educational process of the university.
O. M. Yatsko
doaj +1 more source
Algebraic School of V.M. Glushkov and Insertion Modeling
The Algebraic School of Viktor Mykhailovych Glushkov already has several generations of scientists, most of whom have already identified and are developing their own scientific directions.
Oleksandr Letychevskyi
doaj +1 more source

