Articles tagged Essay

On Problem Solving
Note on problem solving
61plus

Requirements for Evaluating Proposals
Student of Master of Science in Information Systems at Uganda Martyrs University
Abel Katongore

¿Como Funciona el LaTeX?
¿Como Funciona el LaTeX?
diana

Teaching and Research Statement
Teaching and Research Statement example written for 2015 faculty search season.
W. Ethan Eagle

Reseña del Autor del premio Nobel
Reseña del Autor del premio Nobel
Wendy Tamayo

How does computer science fit in the traditional view of science?
An essay
Linn Ivstam

Programming
The Art, Science, and Engineering of Programming is a new journal created with the goal of placing the wonderful art of programming in the map of scholarly works. Many academic journals and conferences exist that publish research related to programming, starting with programming languages, software engineering, and expanding to the whole Computer Science field. Yet, many of us feel that, as the field of Computer Science expanded, programming, in itself, has been neglected to a secondary role not worthy of scholarly attention. That is a serious gap, as much of the progress in Computer Science lies on the basis of computer programs, the people who write them, and the concepts and tools available to them to express computational tasks.
The Art, Science, and Engineering of Programming aims at closing this gap by focusing primarily on programming: the art itself (programming styles, pearls, models, languages), the emerging science of understanding what works and what doesn’t work in general and in specific contexts, as well as more established engineering and mathematical perspectives.
This is an example of and a guide to writing articles for The Art, Science, and Engineering of Programming.
Tobias Pape, Crista Lopes, Robert Hirschfeld

Difficulty Adjustment Algorithms in Cryptocurrency Protocols
As of this writing, the algorithm employed for difficulty adjustment in the CryptoNote reference code is known by the Monero Research Lab to be flawed. We describe and illustrate the nature of the flaw and recommend a solution. By dishonestly reporting timestamps, attackers can gain disproportionate control over network difficulty. We verify this route of attack by auditing the CryptoNote reference difficulty adjustment code, which, we reimplement in the Python programming language. We use a stochastic model of blockchain growth to test the CryptoNote reference difficulty formula against the more traditional Bitcoin difficulty formula. This allows us to test our difficulty formula against various hash rate scenarios. This research bulletin has not undergone peer review, and reflects only the results of internal investigation.
Surae Noether

Analysis Of Using Social Network On Higher Education
The Internet has become the broadest area in which to exchange information and communicate.Some use this function in a positive way, whilst others do so negatively. With the growth of the Internet, social networks have also grown. Social networks are used in different fields and for different proposes. They are used in higher education to enhance training and collaborative learning and exchange knowledge in an interaction environment.
This paper aims at finding the 10 best universities by measuring the use of social networks in education.Universities are selected for this experiment from the Academic Influence Ranking website for the domain of computer science overall (type A) (for more information about the selected universities please visit this link: http://pubstat.org/).
fatimah