電腦架構上嘅研究會對「CPU 應該要點樣攞記憶入面嘅數據」、「一粒 CPU 要有乜嘢部份」以及「一部電腦唔同子系統之間要有乜嘢資訊傳遞」等嘅課題進行概念化嘅思考,而電腦工程以及電子工程等硬件方面嘅領域跟住就會負責諗呢啲架構概念要點樣用物理方法實現,兩者合作嘗試設計出性能更好-行得更快、製作成本更低-嘅電腦[33]。
# 入嘅嘢:一列冧巴,叫佢做「L」。# 出嘅嘢:L 入面最大嘅冧巴。deffind_max(L):# 定義乜嘢係「去搵 L 嘅最大值」。max=0# 設最大值做 0。forxinL:# 為咗 x 喺 L 入面。ifx>max:# 如果 x 大過最大值。max=x# 設最大值做 x。returnmax# 俾返個最大值出嚟。
Tedre, Matti (2014).The Science of Computing: Shaping a Discipline. CRC Press, Taylor & Francis.
Tucker, Allen B. (2004).Computer Science Handbook (2nd ed.). Chapman and Hall/CRC.ISBN 978-1-58488-360-9.
Research evaluation for computer science, Informatics Europereport. Shorter journal version: Bertrand Meyer, Christine Choppy, Jan van Leeuwen and Jorgen Staunstrup, Research evaluation for computer science, in Communications of the ACM, vol. 52, no. 4, pp. 31–34, April 2009.
↑"Computer Science is the study of all aspects of computer systems, from the theoretical foundations to the very practical aspects of managing large software projects."Massey University互聯網檔案館嘅歸檔,歸檔日期2006年6月19號,.
↑5.05.1John E. Hopcroft, Rajeev Motwani, Jeffrey D. Ullman (2000).Introduction to Automata Theory, Languages, and Computation (2nd Edition). Pearson Education.
↑Anderson, James A. (2006).Automata theory with modern applications. With contributions by Tom Head. Cambridge: Cambridge University Press.
↑7.07.1James D. Foley, Andries Van Dam, Steven K. Feiner and John F. Hughes (1995).Computer Graphics: Principles and Practice. Addison-Wesley.
↑Bethke, Erik (2003).Game development and production. Texas: Wordware Publishing, Inc.
↑Denning, P.J.; Comer, D.E.; Gries, D.; Mulder, M.C.; Tucker, A.; Turner, A.J.; Young, P.R. (January 1989). "Computing as a discipline".Communications of the ACM. 32: 9–23.
↑Turner, Raymond, Angius, Nicola , Primiero, Giuseppe. (Spring 2019). "The Philosophy of Computer Science",The Stanford Encyclopedia of Philosophy, Edward N. Zalta (ed.),
↑Wegner, P. (October 13–15, 1976). Research paradigms in computer science.Proceedings of the 2nd international Conference on Software Engineering. San Francisco, California, United States: IEEE Computer Society Press, Los Alamitos, CA.
↑Church, Alonzo (1936). "An Unsolvable Problem of Elementary Number Theory".American Journal of Mathematics. 58 (58): 345–363.
↑16.016.1Committee on the Fundamentals of Computer Science: Challenges and Opportunities, National Research Council (2004).Computer Science: Reflections on the Field, Reflections from the Field. National Academies Press.
↑McShaffry, M. (2014).Game coding complete. Nelson Education.
↑Jenkins, H. (2004). Game design as narrative.Computer, 44(53), 118-130.
↑Sipser, M. (2006).Introduction to the Theory of Computation (Vol. 2). Boston: Thomson Course Technology.
↑Lewis, H. R., & Papadimitriou, C. H. (1997).Elements of the Theory of Computation. Prentice Hall PTR.
↑Church, Alonzo (1936). "An Unsolvable Problem of Elementary Number Theory".American Journal of Mathematics. 58 (58): 345–363.
↑23.023.123.2Alan Turing, On computable numbers, with an application to the Entscheidungsproblem,Proceedings of the London Mathematical Society, Series 2, Volume 42 (1937), pp 230–265.
↑Davis, Martin (1965). The Undecidable,Basic Papers on Undecidable Propositions, Unsolvable Problems And Computable Functions. New York: Raven Press.. Turing's paper is #3 in this volume. Papers include those by Godel, Church, Rosser, Kleene, and Post.
↑Black, Paul E. (15 December 2004). "Data structure". In Pieterse, Vreda; Black, Paul E. (eds.).Dictionary of Algorithms and Data Structures. National Institute of Standards and Technology.
↑Peter Brass,Advanced Data Structures, Cambridge University Press, (2008).
↑Delgado-Bonal, Alfonso; Martín-Torres, Javier (2016-11-03). "Human vision is determined based on information theory".Scientific Reports. 6 (1).
↑Huelsenbeck, J. P.; Ronquist, F.; Nielsen, R.; Bollback, J. P. (2001). "Bayesian inference of phylogeny and its impact on evolutionary biology".Science. 294 (5550): 2310–2314.
↑Phillip A. Laplante, 2010.Encyclopedia of Software Engineering Three-Volume Set (Print). CRC Press. p. 309.
↑Hall, A. (1990). Seven myths of formal methods.IEEE software, 7(5), 11-19.
↑Andersen, D. G., Balakrishnan, H., Kaashoek, M. F., & Morris, R. (2001, May). The case for resilient overlay networks. InProceedings Eighth Workshop on Hot Topics in Operating Systems (pp. 152-157). IEEE.
↑Alphand, O., Amoretti, M., Claeys, T., Dall'Asta, S., Duda, A., Ferrari, G., ... & Zanichelli, F. (2018, April). IoTChain: A blockchain security architecture for the Internet of Things. In2018 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1-6). IEEE.
↑Ferraiuolo, A., Xu, R., Zhang, D., Myers, A. C., & Suh, G. E. (2017, April). Verification of a practical hardware security architecture through static information flow analysis. InProceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems (pp. 555-568).
↑Agrawal, Monika (May 5, 2012). "A Comparative Survey on Symmetric Key Encryption Techniques".International Journal on Computer Science and Engineering. 4: 877–882.
↑Rivest, Ronald L. (1990). "Cryptography". In J. Van Leeuwen (ed.).Handbook of Theoretical Computer Science. 1. Elsevier.
↑Diffie, Whitfield; Hellman, Martin (November 1976). "New Directions in Cryptography" (PDF).IEEE Transactions on Information Theory. IT-22 (6): 644–654.
↑Knuth, D. E. (1997).The art of computer programming (Vol. 3). Pearson Education.
↑Hoare, C. A. R. (1969). An axiomatic basis for computer programming.Communications of the ACM, 12(10), 576-580.
↑66.066.1Michael J. C. Gordon.Programming Language Theory and Its Implementation. Prentice Hall.
↑Gunter, Carl and Mitchell, John C. (eds.).Theoretical Aspects of Object Oriented Programming Languages: Types, Semantics, and Language Design. MIT Press.
↑69.069.1Foley, J. D., & Van Dam, A. (1982).Fundamentals of interactive computer graphics (Vol. 2). Reading, MA: Addison-Wesley.
↑Marschner, S., & Shirley, P. (2015).Fundamentals of computer graphics. CRC Press.
↑ Noll, A. Michael (March 1971). "Scanned-Display Computer Graphics".Communications of the ACM. 14 (3): 143–150.
↑Goldberg, Adele and Robert Flegal. "ACM president's letter: Pixel Art".Communications of the ACM. Vol. 25. Issue 12. Dec. 1982.
↑Alldieck, T., Magnor, M., Xu, W., Theobalt, C., & Pons-Moll, G. (2018). Video based reconstruction of 3d people models. InProceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 8387-8397).
↑Schneider, P., & Eberly, D. H. (2002).Geometric tools for computer graphics. Elsevier.
↑G. Hager and G. Wellein,Introduction to High Performance Computing for Scientists and Engineers, Chapman and Hall (2010).
↑Steeb W.-H., Hardy Y., Hardy A. and Stoop R., (2004).Problems and Solutions in Scientific Computing with C++ and Java Simulations, World Scientific Publishing.
↑Dobzhansky, T. (1973). "Nothing in biology makes sense except in the light of evolution".The American Biology Teacher. 35 (3): 125–29.
↑Futuyma, DJ (2005).Evolution. Sinauer Associates.
↑De Duve, Christian (2002).Life Evolving: Molecules, Mind, and Meaning. New York: Oxford University Press. p. 44.
↑Definition of AI as the study of intelligent agents:
Poole, Mackworth & Goebel 1998, p. 1, which provides the version that is used in this article. Note that they use the term "computational intelligence" as a synonym for artificial intelligence.
Russell & Norvig (2003). (who prefer the term "rational agent") and write "The whole-agent view is now widely accepted in the field" (Russell & Norvig 2003, p. 55).
Nilsson 1998.
Legg & Hutter 2007.
↑Sun, Ron (ed.) (2008).The Cambridge Handbook of Computational Psychology. Cambridge University Press, New York.
↑89.089.1Albus, J. S. (1999). The engineering of mind.Information Sciences, 117(1-2), 1-18.
↑Chabert, Jean-Luc (2012).A History of Algorithms: From the Pebble to the Microchip. Springer Science & Business Media. pp. 7–8.
↑Dooley, John F. (2013).A Brief History of Cryptology and Cryptographic Algorithms. Springer Science & Business Media. pp. 12–3.
↑Keates, Fiona (June 25, 2012). "A Brief History of Computing".The Repository.