Skip to main content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Arkansas State University

Computer Science 2020: Home

COMPUTER SCIENCE GUIDE

This guide is intended to help you find both print and online computer science resources. This guide is only a starting point for your research, it is not meant to be a comprehensive list of resources. If you need further assistance, please visit the Service Desk in the library or contact your librarian, Dominique Hallett at dhallett@astate.edu

SEARCH ONESEARCH

 
         Search for articles, ebooks, journals, books, media and more with OneSearch:
 

SEARCH OUR CATALOG

       
     Book Icon   Search for books, dvds, journals and more with our Library Catalog Search:
 

 
Enter your search:



 
   

SCHOLARLY OR NOT?

SCHOLARLY OR NOT?

Scholarly and peer reviewed are your "academic" articles. These are the ones that deal directly with research, history, or theory. Most likely, your professor wants you to use these types of articles. These types of articles are written by scholars, experts in the field often associated with a university or an organization. Peer reviewed articles must also be approved by a group of scholars before being published to ensure that the research presented is factual and relevant. Not everyone can get peer reviewed.

Popular magazine articles are usually ones that you read for entertainment. These are usually the type of publications that you find at the grocery store checkout. Chances are if there's a celebrity on the cover, it's a popular magazine.

For a more in-depth look at the differences, please visit our Scholarly Journals guide.

BOOKS IN THE DEAN B. ELLIS LIBRARY

All books in the library are arranged by subject using the Library of Congress classification system for call numbers and subject headings. The call number for computer science begins with "QA". The basic breakdown is as follows:

QA75 – QA76.95 Calculating Machines
QA75.6 – QA76.95 Electronic Computers, Computer Science
QA76.75 – QA76.765 Computer Software
TK5101 – TK6720 Telecommunications; including Telegraphy, Telephone, Radio, Radar, Television
TK7885 – TK7895 Computer Engineering, Computer Hardware


The numbers that follow the beginning letters relate to a narrower focus of the subject. For example, TK7885 – TK7895 represent books about computer engineering and hardware. Within these subjects is Microelectronic Design of Fuzzy Logic-Based Systems with a call number of TK7888.3 .M535 2000.

Occasionally a totally different call number will appear. This means the item is about more than computer science and higher importance was given to the other subject when the call number was assigned.

DOUBLE LINES

DATABASES

Databases with green All Full Text or partially green Partial Full Text icons offer some level of free, full-text articles. In most cases, you must be affiliated with ASU to view the article or on the ASU campus. Some database offer a "pay-per-view" service where you can buy an article not available for free and have immediate access. If you do not need immediate access to the article, you may also request it through Interlibrary Loan for free. Articles requested through Interlibrary Loan can take 2-5 business days to come in, depending on the lending library. You can also digital scans from our physical collection through Document Delivery.

To view the full list of Computer Science and related databases, click here.

To view all our databases, click here.

CONTACT US

CONTACT US

Email Icon  refdesk@astate.edu

   (870) 972-3077

24 HOUR CHAT

chat loading...

WORDS TO USE

WORDS TO USE

Computer Science covers a wide range of topics. If you're having trouble coming up with a topic, here are some keywords you can use that might help you get started:

  • "artificial intelligence"
  • bandwidth
  • "big data"
  • C++
  • "cloud computing"
  • "computer architecture"
  • cryptography
  • "cyber currency"
  • "dark web"
  • "data mining"
  • "data structures"
  • "e-commerce"
  • "e-portal"
  • encryption
  • "intellectual property rights"
  • "knowledge management"
  • parallelism
  • "privacy policy
  • recursion
  • rootkit
  • "security exploit"
  • "social engineering"
  • "structured query language"
  • "technical documentation"
  • "voice over internet protocol"
  • VoIP​

 
If you want to combine keywords, use the connector AND between terms:

encryption AND "voice over internet protocol"

You can learn more about connectors in our Boolean Searching guide.