This article mainly reads Douglas E. Comer
How To Criticize Computer Scientists or Avoiding Ineffective Deprecation And Making Insults More Pointed And 《
A cs Research Topic Generator
Or
How To pick A Worthy Topic In 10 Seconds
.
Here we will talk about theoretical computer science. When talking about this topic, we may not be too interested, except for graduate students who are working as doctoral degrees.
In fact, many engineers have the opportunity to enter the enterprise's Research Institute. The difference between research and engineering lies in innovation (I highly recommend Mr. Li Kaifu's point of view on useful innovation, the primary requirement is that people who do research must have the comprehensive qualities of scientists, engineers, and market personnel to make cool, practical, and innovative products available in the market ).
Next we will talk about the issue of scientists, that is, some research topics.
People engaged in research (computer science) can be divided into two types:
1. Theoretical Author: Researchers who follow the mathematical paradigm are called
Theorists
, And include anyone working in an area that
Has the terms ''analy'', ''evaluation '', ''algorithms'', or ''theory''
In the title.
2. Practitioner: Researchers who follow the engineering paradigm are called
Experimentalists
, And include most people working in areas that
Have the terms '''experimental '', ''systems'', ''compiler '', ''network '',
Or ''database' in the title.
Here we will mainly talk about the topic. Here we recommend two books covering the main fields of Theoretical Computer Science.
Handbook of Theoretical computer science, Volume A algorithms and complexity
Handbook of Theoretical Computer Science, Volume B Formal Models and Sematics
If you encounter problems during the big research, you can refer to the relevant chapters in the above book as the starting point. I believe that with theoretical support, the work will be more brilliant.
It should be said that all the work done by a theoretical person is generally "scientific", and the formulas and symbols used in the whole article published in the paper. Here we will talk about the concept that although it looks very elegant, however, it is not as difficult as it is to imagine. The commonly used cryptographic technology is a good example.
Finally, Mr. Comer mentioned how to choose a doctoral thesis. In fact, it is also a question of how to innovate. Mr. Comer gave the "fill-in method", that is, to select the entry point for the arrangement and combination of some topics, such as virtual mobile network.
Column 1 |
Column 2 |
Column 3 |
|
|
|
Integrated |
Mobile |
Network |
Parallel |
Functional |
Preprocessor |
Virtual |
Programmable |
Compiler |
Interactive |
Distributed |
System |
Responsive |
Logical |
Interface |
Synchronized |
Digital |
Protocol |
Balanced |
Concurrent |
Architecture |
Virtual |
Knowledge-based |
Database |
Meta-level |
Multimedia |
Algorithm |
Optimized |
Binary |
Toolkit |
Active |
Object-oriented |
Display |
Parameterized |
Secure |
Technology |
Conceptual |
High-speed |
Solution |
Scalable |
Real-time |
Language |
Dynamic |
Functional |
Agent |
High-level |
Parallelizing |
Theorem prover |
Collaborative |
Watermarking |
Work cluster |
Type-safe |
Proxy |
Cache |