›› 2011, Vol. 26 ›› Issue (4): 616-624.doi: 10.1007/s11390-011-1161-4

• Special Section on Perspectives on Future Computer Science • Previous Articles     Next Articles

Three New Concepts of Future Computer Science

Zhi-Wei Xu (徐志伟) and Dan-Dan Tu (涂丹丹)   

  1. Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China
  • Received:2010-12-15 Revised:2011-05-09 Online:2011-07-05 Published:2011-07-05
  • Supported by:

    The author's work is supported in part by the Frontier Research Project of Chinese Academy of Sciences and the National Basic Research 973 Program of China under Grant Nos. 2011CB302500, 2011CB302800.

This article presents an observation resulted from the six-year Sino-USA computer science leadership exchanges: the trend towards the emergence of a new computer science that is more universal and fundamental than that in the past. In the 21st century, the field of computer science is experiencing fundamental transformations, from its scope, objects of study, basic metrics, main abstractions, fundamental principles, to its relationship to other sciences and to the human society, while inheriting the basic way of thinking and time-tested body of knowledge accumulated through the past 50 years. We discuss three new concepts related to this trend. They are computational lens and computational thinking articulated by US scientists, and ternary computing for the masses proposed by Chinese scientists. We review the salient features of these concepts, discuss their impact, and summarize future research directions.

[1] Karp R. Understanding science through the computational lens. Journal of Computer Science and Technology, 2011, 26(4): 569-577.



[2] Li S C, Bu D, Xu J, Li M. Fragment-HMM: A new approach to proteinstructure prediction. Protein Science, 2008, 17(11): 1925-1934.



[3] Wing J. Computational thinking. Communications of theACM, 2006, 49(3): 33-35.



[4] Wing J. Computational thinking and thinking about computing. Philosophical Transactions of the Royal Society, 2008, 366(1881):3717-3725.



[5] Xu Z, Li G. Computing for the masses. Communications of the ACM. (To appear)



[6] National Research Council, Committee on Fundamentals of ComputerScience Reflections: Challenges and Opportunities. {Computer Science: Reflections on the Field,Reflections from the Field, NationalAcademies Press, 2004.



[7] Li G (editor). Information Science and Technology in China: ARoadmap to 2050. Science Press Beijing and Springer-Verlag Berlin,2010.



[8] Information Science Strategic Study Group of the National NaturalScience Foundation of China. Strategic Study Report on the Developmentof Information Science: 2011-2020, August 2010.



[9] Nisan N, Roughgarden T, Tardos E, Vazirani V V (eds.).Algorithmic Game Theory: Cambridge University Press, 2007.



[10] Valiant L. Evolvability. Journal of the ACM, 2009,56(1): 1-21.



[11] Li D, Zhang H. Cloud computing beyond Turing machine. Communications of the China Computer Federation, 2009,5(12): 8-16.



[12] DARPA. DARPA network challenge final standings.http://en.wikipedia.org/wiki/DARPA_Network_Challenge.



[13] Licklider J. Man-computer symbiosis. IRE Transaction on HumanFactors in Electronics, 1960, HFE-1 (1): 4-11.



[14] Hurwicz L, Reiter S. Designing Economic Mechanisms. CambridgeUniversity Press, 2008.



[15] Berners-Lee T, Hall W, Hendler J, Shadbolt N, Weitzner D J.Creating a science of the Web. Science, 2006, 313(5788): 769-771.



[16] Ma P C H, Chan K C C, Yao X, Chiu D K Y. An evolutionaryclustering algorithm for gene expression microarray data analysis. IEEE Transactions on Evolutionary Computation, 2006, 10(3): 296-314.



[17] Lampson B. The uses of computers: The best is yet to come.In Nobel Laureates Beijing Forum, Beijing, China, November,2008, Speech.



[18] Panel at the Princeton Workshop on the Computational Worldview andthe Sciences, December 11, 2006.



[19] Vazirani U. Computational constraints on scientific theories:Insights from quantum computation. In the Caltech Workshop onthe Computational Worldview and the Sciences, Pasadena, USA, Mar.15-16,2007, Speech.



[20] Papadimitriou C H. The complexity of finding Nash equilibria.Algorithmic Game Theory: Cambridge University Press, 2007, 29-51.



[21] Snir M. Computer & information science & engineering --- What'sall This?. In the 2nd NSF-NSFC Sino-USA Computer ScienceSummit, Washington, DC, USA, July 2008, Keynote Speech.
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Zhou Jianqiang; Xie Li; Dai Fei; Sun Zhongxiu;. Adaptive Memory Coherence Algorithms in DSVM[J]. , 1994, 9(4): 365 -372 .
[2] Yao Shu; Zhang Bo;. Situated Learning of a Behavior-Based Mobile Robot Path Planner[J]. , 1995, 10(4): 375 -379 .
[3] Xu Dianxiang; Zheng Guoliang;. Towards a Declarative Semantics of Inheritance with Exceptions[J]. , 1996, 11(1): 61 -71 .
[4] Hu Weiwu; Shi Weisong; Tang Zhimin; Li Ming;. A Lock-Based Cache Coherence Protocol for Scope Consistency[J]. , 1998, 13(2): 97 -109 .
[5] ZHANG Wensong; JIN Shiyao; WU Quanyuan;. LinuxDirector: A Connection Director for Scalable Internet Services[J]. , 2000, 15(6): 560 -571 .
[6] Xin-Fu Wang and De-Bin Zhao. Performance Comparison of AVS and H.264/AVC Video Coding Standards[J]. , 2006, 21(3): 310 -314 .
[7] Zhi-Wei Xu, Hao-Jie Zhou, and Guo-Jie Li. Usability Issues of Grid System Software[J]. , 2006, 21(5): 641 -647 .
[8] Jie Liang and Xue-Jia Lai. Improved Collision Attack on Hash Function MD5[J]. , 2007, 22(1): 79 -87 .
[9] Duo Liu, Ping Luo, and Yi-Qi Dai. Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem[J]. , 2007, 22(1): 92 -94 .
[10] Xi-Shun Zhao and Yu-Ping Shen. Comparison of Semantics of Disjunctive Logic Programs Based on Model-Equivalent Reduction[J]. , 2007, 22(4): 562 -568 .

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved