Conferences related to Computer Science

Back to Top

2014 IEEE Frontiers in Education Conference (FIE)

The Frontiers in Education (FIE)Conference is the major international conference about educational innovations and research in engineering and computing. FIE 2014 continues a long tradition of disseminating results in these areas. It is an ideal forum for sharing ideas; learning about developments in computer science, engineering, and technology education; and interacting with colleagues in these fields.

  • 2013 IEEE Frontiers in Education Conference (FIE)

    The Frontiers in Education (FIE)Conference is the major international conference about educational innovations and research in engineering and computing. FIE 2013 continues a long tradition of disseminating results in these areas. It is an ideal forum for sharing ideas; learning about developments in computer science, engineering, and technology education; and interacting with colleagues in these fields.

  • 2012 IEEE Frontiers in Education Conference (FIE)

    The Frontiers in Education (FIE)Conference is the major international conference about educational innovations and research in engineering and computing. FIE 2012 continues a long tradition of disseminating results in these areas. It is an ideal forum for sharing ideas; learning about developments in computer science, engineering, and technology education; and interacting with colleagues in these fields.

  • 2011 Frontiers in Education Conference (FIE)

    The Frontiers in Education (FIE) Conference is the major international conference about educational innovations and research in engineering and computing. FIE 2011 continues a long tradition of disseminating results in these areas. It is an ideal forum for sharing ideas; learning about developments in computer science, engineering, and technology education; and interacting with colleagues in these fields.

  • 2010 IEEE Frontiers in Education Conference (FIE)

    (FIE) Conference is a major international conference devoted to improvements in computer science, engineering, and technology (CSET) education. FIE 2008 continues a long tradition of disseminating educational research results and innovative practices in CSET education. It is an ideal forum for sharing ideas, learning about developments in CSET education, and interacting with colleagues.

  • 2009 IEEE Frontiers in Education Conference (FIE)

    FIE is a major international conference devoted to improvements in computer science, engineering and technology (CSET) education. FIE continues a loong tradition of disseminating educational research results and innovative practices in CSET education. It is an ideal forum for sharing ideas, learning about developments in CSET education, and interacting with colleagues.

  • 2008 IEEE Frontiers in Education Conference (FIE)

  • 2007 IEEE Frontiers in Education Conference (FIE)

    Globalization has dramatically changed engineering. Global engineering teams design products for global markets. Knowledge has no borders in a world where information flow is digitalized and sent worldwide in seconds. A core requirement of engineering globalization is an understanding of how the different cultures of the global marketplace shape product development, mult-national engineering teams, and consumer expectations. Engineering education must address this issue.

  • 2006 IEEE Frontiers in Education Conference (FIE)


2013 ACS International Conference on Computer Systems and Applications (AICCSA)

This International Conference on Computer Systems and Applications (AICCSA) is the premier Computer Science and Engineering Conference in the Middle East and North Africa. It is held every other year in an Arab country and intends to enhance the participation and the contribution of the Arab world in Information Technologies and to maximize its benefits. In general, the scope of AICCSA includes all aspects of the theory and practice of computer science and information technology, but, depending on the needs, specific topics and/or issues might be prioritized.

  • 2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)

    An international conference that covers a broad range of information technology areas including Bioinformatics and Biomedical Engineering, Cloud and Grid Computing, Architecture and Systems, Databases, High Performance Computing, Reconfigurable and GPU Computing,Computer Networks and Security, Energy Efficient Computing, Wireless Systems and Sensor Networks.

  • 2010 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)

    AICCSA is the premier Computer Science and Engineering Conference in the Middle East and North Africa covering new advances in computer systems and their applications. Papers will cover the theoretical, conceptual, descriptive in nature, or a survey of the state of the art.

  • 2009 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)

    ICCSA is the premier Computer Science and Engineering Conference in the Middle East and North Africa


2011 3rd International Workshop on Education Technology and Computer Science (ETCS)

ETCS2011 will be held on 12-13 March, 2011 in Wuhan, China. ETCS2009 and ETCS2010 have been indexed by EI Compendex and ISTP. The ETCS2011 will bring together the top researchers from Asian Pacific nations, North America, Europe and around the world to exchange their research results and address open issues in Education Technology and Computer Science.

  • 2010 2nd International Workshop on Education Technology and Computer Science (ETCS)

    The 2nd International Workshop on Education Technology and Computer Science (ETCS2010) will be held on 6-7 March, 2010 in Wuhan, China. The workshop will bring together the top researchers from Asian Pacific nations, North America, Europe and around the world to exchange their research results and address open issues in Education Technology and Computer Science.

  • 2009 First International Workshop on Education Technology and Computer Science (ETCS)

    ETCS2009 is organized by Huazhong Universiy of Science and Technology, Harbin Institute of Technology,and supported by IEEE Harbin Section, Huazhong Normal University,Wuhan University. ETCS 2009 will be convened in the magnificent cultural city - Wuhan, China. ETCS 2009 will bring experts from several continents to give presentations, exchange information and learn about the latest developments in the field of education and computer science.


2011 3rd Symposium on Web Society (SWS)

(collocated with ICPCA6) The Web society is a new research field which attracts much attention of not only computer scientists, psychologists, but also social scientists, etc. The aim of this symposium is to bring scholars from different research areas together to explore and discuss the development of Web.

  • 2010 IEEE 2nd Symposium on Web Society (SWS)

    The aim of this symposium is to bring these scientists together across the disciplinary divide for perhaps the first time, exploring the development of the Web across different areas of everyday life and technological development, including computer science, economics, political science, sociology, health, psychology.

  • 2009 1st IEEE Symposium on Web Society (SWS2009)

    The aim of this symposium is to bring these scientists together across the disciplinary divide for perhaps the first time, exploring the development of the Web across different areas of everyday life and technological development, including computer science, economics, political science, sociology, health, psychology.


2010 IEEE 23rd Computer Security Foundations Symposium (CSF)

Theories of security, the formal models that provide a context for those theories, and techniques for verifying security.

  • 2009 IEEE 22nd Computer Security Foundations Symposium (CSF)

    The IEEE Computer Security Foundations (CSF) series brings together researchers in computer science to examine foundational issues in computer security. Over the past two decades, many seminal papers and techniques have been presented first at CSF.


More Conferences

Periodicals related to Computer Science

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Computing in Science & Engineering

Physics, medicine, astronomy—these and other hard sciences share a common need for efficient algorithms, system software, and computer architecture to address large computational problems. And yet, useful advances in computational techniques that could benefit many researchers are rarely shared. To meet that need, Computing in Science & Engineering (CiSE) presents scientific and computational contributions in a clear and accessible format. ...


Education, IEEE Transactions on

Educational methods, technology, and programs; history of technology; impact of evolving research on education.


Medical Imaging, IEEE Transactions on

Imaging methods applied to living organisms with emphasis on innovative approaches that use emerging technologies supported by rigorous physical and mathematical analysis and quantitative evaluation of performance.


More Periodicals

Most published Xplore authors for Computer Science

Back to Top

Xplore Articles related to Computer Science

Back to Top

Design and analysis of an outer-rotor parallel-hybrid-excited vernier machine

Wenlong Li; T. W. Ching; K. T. Chau Chinese Journal of Electrical Engineering, 2017

In this paper, an outer-rotor parallel-hybrid-excited vernier machine is proposed. In order to realize the parallel hybrid excitation, the homopolar configuration is adopted to artfully combine the permanent magnet (PM) flux path and the electromagnet flux path together. Firstly, the structure of the proposed machine is presented. Secondly, its operating principle is studied and discussed. Thirdly, its performance for flux ...


Revealing critical channels and frequency bands for emotion recognition from EEG with deep belief network

Wei-Long Zheng; Hao-Tian Guo; Bao-Liang Lu 2015 7th International IEEE/EMBS Conference on Neural Engineering (NER), 2015

For EEG-based emotion recognition tasks, there are many irrelevant channel signals contained in multichannel EEG data, which may cause noise and degrade the performance of emotion recognition systems. In order to tackle this problem, we propose a novel deep belief network (DBN) based method for examining critical channels and frequency bands in this paper. First, we design an emotion experiment ...


Real-time 3-D face tracking and modeling from awebcam

Jongmoo Choi; Yann Dumortier; Sang-Il Choi; Muhammad Bilal Ahmad; Gérard Medioni 2012 IEEE Workshop on the Applications of Computer Vision (WACV), 2012

We first infer a 3-D face model from a single frontal image using automatically extracted 2-D landmarks and deforming a generic 3-D model. Then, for any input image, we extract feature points and track them in 2-D. Given these correspondences, sometimes noisy and incorrect, we robustly estimate the 3-D head pose using PnP and a RANSAC process. As the head ...


Predicting Future High-Cost Patients: A Real-World Risk Modeling Application

Sai T. Moturu; William G. Johnson; Huan Liu 2007 IEEE International Conference on Bioinformatics and Biomedicine (BIBM 2007), 2007

Health care data from patients in the Arizona Health Care Cost Containment System, Arizona's Medicaid program, provides a unique opportunity to exploit state-of-the-art data processing and analysis algorithms to mine the data and provide actionable results that can aid cost containment. This work addresses specific challenges in this real-life health care application to build predictive risk models for forecasting future ...


Insecure programming: how culpable is a language's syntax?

R. Chinchani; A. Iyer; B. Jayaraman; S. Upadhyaya IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

Vulnerabilities in software stem from poorly written code. Inadvertent errors may creep in due to programmers not being aware of the security implications of their code. Writing secure code is largely a software engineering issue requiring the education of programmers about safe coding practices. Various projects and efforts such as memory usage profiling, meta-compilation and typing proofs that verify correctness ...


More Xplore Articles

Educational Resources on Computer Science

Back to Top

eLearning

Design and analysis of an outer-rotor parallel-hybrid-excited vernier machine

Wenlong Li; T. W. Ching; K. T. Chau Chinese Journal of Electrical Engineering, 2017

In this paper, an outer-rotor parallel-hybrid-excited vernier machine is proposed. In order to realize the parallel hybrid excitation, the homopolar configuration is adopted to artfully combine the permanent magnet (PM) flux path and the electromagnet flux path together. Firstly, the structure of the proposed machine is presented. Secondly, its operating principle is studied and discussed. Thirdly, its performance for flux ...


Revealing critical channels and frequency bands for emotion recognition from EEG with deep belief network

Wei-Long Zheng; Hao-Tian Guo; Bao-Liang Lu 2015 7th International IEEE/EMBS Conference on Neural Engineering (NER), 2015

For EEG-based emotion recognition tasks, there are many irrelevant channel signals contained in multichannel EEG data, which may cause noise and degrade the performance of emotion recognition systems. In order to tackle this problem, we propose a novel deep belief network (DBN) based method for examining critical channels and frequency bands in this paper. First, we design an emotion experiment ...


Real-time 3-D face tracking and modeling from awebcam

Jongmoo Choi; Yann Dumortier; Sang-Il Choi; Muhammad Bilal Ahmad; Gérard Medioni 2012 IEEE Workshop on the Applications of Computer Vision (WACV), 2012

We first infer a 3-D face model from a single frontal image using automatically extracted 2-D landmarks and deforming a generic 3-D model. Then, for any input image, we extract feature points and track them in 2-D. Given these correspondences, sometimes noisy and incorrect, we robustly estimate the 3-D head pose using PnP and a RANSAC process. As the head ...


Predicting Future High-Cost Patients: A Real-World Risk Modeling Application

Sai T. Moturu; William G. Johnson; Huan Liu 2007 IEEE International Conference on Bioinformatics and Biomedicine (BIBM 2007), 2007

Health care data from patients in the Arizona Health Care Cost Containment System, Arizona's Medicaid program, provides a unique opportunity to exploit state-of-the-art data processing and analysis algorithms to mine the data and provide actionable results that can aid cost containment. This work addresses specific challenges in this real-life health care application to build predictive risk models for forecasting future ...


Insecure programming: how culpable is a language's syntax?

R. Chinchani; A. Iyer; B. Jayaraman; S. Upadhyaya IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

Vulnerabilities in software stem from poorly written code. Inadvertent errors may creep in due to programmers not being aware of the security implications of their code. Writing secure code is largely a software engineering issue requiring the education of programmers about safe coding practices. Various projects and efforts such as memory usage profiling, meta-compilation and typing proofs that verify correctness ...


More eLearning Resources

IEEE-USA E-Books

  • Masters of Computer Science

    You don't have to have a degree in computer science to enjoy this unique collection of funny stories, parodies, laughable true-life incidents, comic song lyrics, and jokey poems from the world of computing. Humour the Computer brings together a selection of some of the best computer-related humorous material culled from a variety of sources: news groups and FTP sites on the Internet, The New Yorker, Punch, New Scientist, BYTE, Datamation, Communications of the ACM, The Journal of Irreproducible Results, and many more. Among other topics, the 70-odd assorted writings embrace the impact of computing on our lives, hilarious hardware, silly software, first encounters with computing, computer companies that we love, programming pains, and absurd academia.

  • Morcom

    Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a successful computer executive, Alexandros, a melancholy archaeologist, and Ian, a charismatic hacker. After Ethel (who shares her first name with Alan Turing's mother) abandons Alexandros following a sundrenched idyll on Corfu, Turing appears on Alexandros's computer screen to unfurl a tutorial on the history of ideas. He begins with the philosopher- mathematicians of ancient Greece -- "discourse, dialogue, argument, proof... can only thrive in an egalitarian society" -- and the Arab scholar in ninth- century Baghdad who invented algorithms; he moves on to many other topics, including cryptography and artificial intelligence, even economics and developmental biology. (These lessons are later critiqued amusingly and developed further in postings by a fictional newsgroup in the book's afterword.) As Turing's lectures progress, the lives of Alexandros, Ethel, and Ian converge in dramatic fashion, and the story takes us from Corfu to Hong Kong, from Athens to San Francisco -- and of course to the Internet, the disruptive technological and social force that emerges as the main locale and protagonist of the novel.Alternately pedagogical and romantic, Turing (A Novel about Computation) should appeal both to students and professionals who want a clear and entertaining account of the development of computation and to the general reader who enjoys novels of ideas.

  • Index

    The rise of the Indian information technology industry is a remarkable economic success story. Software and services exports from India amounted to less than $100 million in 1990, and today come close to $100 _billion_. But, as Dinesh Sharma explains in _The Outsourcer_, Indian IT's success has a long prehistory; it did not begin with software support, or with American firms' eager recruitment of cheap and plentiful programming labor, or with India's economic liberalization of the 1990s. The foundations of India's IT revolution were laid long ago, even before the country's independence from British rule in 1947, as leading Indian scientists established research institutes that became centers for the development of computer science and technology. The "miracle" of Indian IT is actually a story about the long work of converting skills and knowledge into capital and wealth. With _The Outsourcer_, Sharma offers the first comprehensive history of the forces that drov India's IT success. Sharma describes India's early development of computer technology, part of the country's efforts to achieve national self-sufficiency, and shows that excessive state control stifled IT industry growth before economic policy changed in 1991. He traces the rise and fall (and return) of IBM in India and the emergence of pioneering indigenous hardware and software firms. He describes the satellite communication links and state-sponsored, tax-free technology parks that made software-related outsourcing by foreign firms viable, and the tsunami of outsourcing operations at the beginning of the new millennium. It is the convergence of many factors, from the tradition of technical education to the rise of entrepreneurship to advances in communication technology, that have made the spectacular growth of India's IT industry possible.

  • Contributors

    This collection of original essays reflects the breadth of current research in computer science. Robin Milner, a major figure in the field, has made many fundamental contributions, particularly in theoretical computer science, the theory of programming languages, and functional programming languages.Following a brief biography of Milner, the book contains five sections: Semantic Foundations, Programming Logic, Programming Languages, Concurrency, and Mobility. Together the pieces convey a seamless whole, ranging from highly abstract concepts to systems of great utility.Contributors : Samson Abramsky, J. C. M. Baeten, Sergey Berezin, J. A. Bergstra, Gérard Berry, Lars Birkedal, Gérard Boudol, Edmund Clarke, Pierre Collette, Robert L. Constable, Pierre-Louis Curien, Jaco de Bakker, Uffe H. Engberg, William Ferreira, Fabio Gadducci, Mike Gordon, Robert Harper, Matthew Hennessy, Yoram Hirshfeld, C. A. R. Hoare, Gérard Huet, Paul B. Jackson, Alan S. A. Jeffrey, Somesh Jha, He Jifeng, Cliff B. Jones, Cosimo Laneve, Xinxin Liu, Will Marrero, Faron Moller, Ugo Montanari, Pavel Naumov, Mogens Nielsen, Joachim Parrow, Lawrence C. Paulson, Benjamin C. Pierce, Gordon Plotkin, M. A. Reniers, Amokrane Saïbi, Augusto Sampaio, Davide Sangiorgi, Scott A. Smolka, Eugene W. Stark, Christopher Stone, Mads Tofte, David N. Turner, Juan Uribe, Franck van Breugel, David Walker, Glynn Winskel.

  • No title

    Graphical models (e.g., Bayesian and constraint networks, influence diagrams, and Markov decision processes) have become a central paradigm for knowledge representation and reasoning in both artificial intelligence and computer science in general. These models are used to perform many reasoning tasks, such as scheduling, planning and learning, diagnosis and prediction, design, hardware and software verification, and bioinformatics. These problems can be stated as the formal tasks of constraint satisfaction and satisfiability, combinatorial optimization, and probabilistic inference. It is well known that the tasks are computationally hard, but research during the past three decades has yielded a variety of principles and techniques that significantly advanced the state of the art. In this book we provide comprehensive coverage of the primary exact algorithms for reasoning with such models. The main feature exploited by the algorithms is the model's graph. We present inference-based, m ssage-passing schemes (e.g., variable-elimination) and search-based, conditioning schemes (e.g., cycle-cutset conditioning and AND/OR search). Each class possesses distinguished characteristics and in particular has different time vs. space behavior. We emphasize the dependence of both schemes on few graph parameters such as the treewidth, cycle-cutset, and (the pseudo-tree) height. We believe the principles outlined here would serve well in moving forward to approximation and anytime-based schemes. The target audience of this book is researchers and students in the artificial intelligence and machine learning area, and beyond.

  • Author Index—Volume 49 (1991)

    Growing interest in symbolic representation and reasoning has pushed this backstage activity into the spotlight as a clearly identifiable and technically rich subfield in artificial intelligence. This collection of extended versions of 12 papers from the First International Conference on Principles of Knowledge Representation and Reasoning provides a snapshot of the best current work in AI on formal methods and principles of representation and reasoning. The topics range from temporal reasoning to default reasoning to representations for natural language.Ronald J. Brachman is Head of the Artificial Intelligence Principles Research Department at AT&T; Bell Laboratories. Hector J. Levesque and Raymond Reiter are Professors of Computer Science at the University of Toronto.Contents: Introduction. Nonmonotonic Reasoning in the Framework of Situation Calculus. The Computational Complexity of Abduction. Temporal Constraint Networks. Impediments to Universal Preference-Based Default Theories. Embedding Decision-Analytic Control in a Learning Architecture. The Substitutional Framework for Sorted Deduction: Fundamental Results on Hybrid Reasoning. Existence Assumptions in Knowledge Representation. Hard Problems for Simple Default Logics. The Effect of Knowledge on Belief: Conditioning, Specificity and the Lottery Paradox in Default Reasoning. Three-Valued Nonmonotonic Formalisms and Semantics of Logic Programs. On the Applicability of Nonmonotonic Logic to Formal Reasoning in Continuous Time. Principles of Metareasoning.

  • Schemata

    Genetic algorithms are playing an increasingly important role in studies of complex adaptive systems, ranging from adaptive agents in economic theory to the use of machine learning techniques in the design of complex devices such as aircraft turbines and integrated circuits. Adaptation in Natural and Artificial Systems is the book that initiated this field of study, presenting the theoretical foundations and exploring applications.In its most familiar form, adaptation is a biological process, whereby organisms evolve by rearranging genetic material to survive in environments confronting them. In this now classic work, Holland presents a mathematical model that allows for the nonlinearity of such complex interactions. He demonstrates the model's universality by applying it to economics, physiological psychology, game theory, and artificial intelligence and then outlines the way in which this approach modifies the traditional views of mathematical genetics.Initially applying his concepts to simply defined artificial systems with limited numbers of parameters, Holland goes on to explore their use in the study of a wide range of complex, naturally occuring processes, concentrating on systems having multiple factors that interact in nonlinear ways. Along the way he accounts for major effects of coadaptation and coevolution: the emergence of building blocks, or schemata, that are recombined and passed on to succeeding generations to provide, innovations and improvements.John H. Holland is Professor of Psychology and Professor of Electrical Engineering and Computer Science at the University of Michigan. He is also Maxwell Professor at the Santa Fe Institute and is Director of the University of Michigan/Santa Fe Institute Advanced Research Program.

  • You'd Better Love Your Blank Computer: The Generic Computer Book

    You don't have to have a degree in computer science to enjoy this unique collection of funny stories, parodies, laughable true-life incidents, comic song lyrics, and jokey poems from the world of computing. Humour the Computer brings together a selection of some of the best computer-related humorous material culled from a variety of sources: news groups and FTP sites on the Internet, The New Yorker, Punch, New Scientist, BYTE, Datamation, Communications of the ACM, The Journal of Irreproducible Results, and many more. Among other topics, the 70-odd assorted writings embrace the impact of computing on our lives, hilarious hardware, silly software, first encounters with computing, computer companies that we love, programming pains, and absurd academia.

  • Turing's Test

    Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a successful computer executive, Alexandros, a melancholy archaeologist, and Ian, a charismatic hacker. After Ethel (who shares her first name with Alan Turing's mother) abandons Alexandros following a sundrenched idyll on Corfu, Turing appears on Alexandros's computer screen to unfurl a tutorial on the history of ideas. He begins with the philosopher- mathematicians of ancient Greece -- "discourse, dialogue, argument, proof... can only thrive in an egalitarian society" -- and the Arab scholar in ninth- century Baghdad who invented algorithms; he moves on to many other topics, including cryptography and artificial intelligence, even economics and developmental biology. (These lessons are later critiqued amusingly and developed further in postings by a fictional newsgroup in the book's afterword.) As Turing's lectures progress, the lives of Alexandros, Ethel, and Ian converge in dramatic fashion, and the story takes us from Corfu to Hong Kong, from Athens to San Francisco -- and of course to the Internet, the disruptive technological and social force that emerges as the main locale and protagonist of the novel.Alternately pedagogical and romantic, Turing (A Novel about Computation) should appeal both to students and professionals who want a clear and entertaining account of the development of computation and to the general reader who enjoys novels of ideas.

  • X

    "This comprehensive book, which provides a succinct-as-possible glossary of the plethora of terms commonly used in communications, is destined to become an indispensable desk-side reference for engineers and others working in the area." - Curtis Siller, Lucent Technologies Are you sometimes overwhelmed by the overabundance of jargon encountered in technical books and articles? Hargrave's Communications Dictionary is a treasure of simplified communications terms, definitions, acronyms, charts, equations, and a wealth of related information amassed over the author's extensive engineering career. From ATM to Zone Paging, this volume includes over ten thousand definitions of key phrases that readers in industry, government, and academia need to understand. Many definitions incorporate basic tools for problem solving not found in other publications-such as drawings, graphs, charts, and references to IEEE standards. Real-world examples associated with voice and data communications are also included, as well as terminology from peripheral disciplines, including optics, computer science, data networks, and the Internet. Hargrave's Communications Dictionary is a fundamental resource for basic to intermediate-level students and practitioners, and is an essential quick reference for more experienced electronic technicians and engineers. This comprehensive dictionary is also an invaluable text for technical schools and universities. About the Author Frank Hargrave has more than 30 years experience in engineering and manufacturing at several major companies, including Multitech, Inc., ITT, and Yale Security, Inc. He is published in a variety of topics, including active filter design, residential telemetry systems, thermal compensation methods in electronic circuits, and telephone line interface methods. Mr. Hargrave currently runs his own consulting business in Charlotte, NC, where he also teaches classes at the Electronic Computer & Programming Institute. He has been issued 12 U.S. patents and has several others disclosed and in process.




Jobs related to Computer Science

Back to Top