# Findings:

- The Just Another Toy theory of computing
- hive computing
- Math & Computing (category)
- number theory
- Blonde Theory
- ring theory
- Key developments in management theory
- hidden variables theory
- Conspiracy Theory: Did we land on the Moon?
- Conspiracy Theory: Black Helicopters
- Valence shell electron pair repulsion theory
- How science undergoes changes of theory
- Difficulties on Theory
- Rape and Attribution Theory
- Principles and Parameters theory
- Germ theory
- The Dead Baby theory
- The Erosion Theory of Love
- Social disorganization theory
- Public Utility Computing
- information theory
- Cladistics
- T.A.Z.: Communique #8: Chaos Theory & the Nuclear Family
- Aggregate dimensional theory
- kinetic-molecular theory
- Aquatic Ape Theory
- example of perturbation theory
- sketch of a Set Theory proof that every Goodstein's sequence reaches 0
- Place Theory
- risk theory
- Information Theory Society
- Field Theory
- Rational choice theory
- Horserider Theory
- String Theory and M-Theory
- Crazy race theories of Adolf Hitler
- Perturbative Gauge TheoryAs A String Theory In Twistor Space
- Computing Machinery and Intelligence
- Arithmetic geometric mean algorithm for computing pi
- queueing theory
- compiler theory
- Theories as to what was inside the briefcase in Pulp Fiction
- Atomic Theory
- thoughts reflected in actions: one of my theories
- exigency theory
- Theories of Ethics
- Identity theory
- Modern Natural Law Theory
- The Theory of the Leisure Class
- Activation-synthesis theory
- The truth about pennies
- Stage theory of memory
- A Christmas Theory
- Theory and Practice
- Morse theory
- A Neo-Lukacsian Theory of the Nineteenth-Century Russian Novel: 3
- creation theory while smashed
- Computing Machinery and Intelligence : 2
- The End of the Beginning for Ubiquitous Computing
- Semantics and Set Theory
- Why women dye their hair blonde
- The theory that women prefer assholes
- Current Leadership Theory
- The Theory of Evolution is a valid theory
- optimality theory
- U.S. arms control theory
- Theory of surplus value
- sociocognitive theory
- Oparin's theory
- Developing World theories
- Government and Binding Theory
- The transformation of European political theory: the legacy of Machiavelli
- terror management theory
- Lubrication Theory
- Social control theory
- Power Computing
- concurrent computing
- The George Carlin Theory
- Five Element Theory
- category theory
- Theory Of Volition
- grand theory
- perturbation theory
- AP Music Theory
- Rotter's Expectancy Theory
- The Implications of Architecture for Scientific Theory and Discourse
- cognitive theory of emotions
- crystal field theory
- Single Gun Theory
- domain theory
- Hyperspace Theory
- sheaf theory
- Entanglement Theory
- parallel computing
- molecular computing
- Chaos theory
- graph theory
- Birth order theory
- theory about skepticism
- My town is boring
- opponent-process theory
- Theory of Mainstream Music Assimilation
- Intelligent Design Theory
- Watchmaker Theory
- The Theory of the Leisure Class: Chapter 1
- Twistor theory
- Philosophical implications of Spontaneous Localization theory
- Literary theory
- John Locke's theory of property
- The "Plus Plus" theory
- Hodge theory
- Herzberg's Two-Factor Theory
- Spoon theory
- A Brief History of Computing
- probability theory
- Landau Theory
- Criminology: Biosocial Theory
- The Computer Programmer One-Way Elastic Time Theory
- Theory of Gravity
- Mouse Button Evolutionary Theory
- Incorporation theory
- We exchange stories of almosts, of near deaths, theories on fate and algorithm, probability and God
- neodissociation theory
- Opponent Process Theory of Color Vision
- decision theory
- Critical race theory
- Analyzing spam: A journey into conspiracy theory and steganography
- The Theory of Demonstrated Competence
- The Surfer Theory
- Too Perfect Theory
- computing with Turing machines
- Everything Theory
- Hypertext Theory
- The theory of reality
- The difference between theory and practice
- The Theory of Evolution is not a valid theory
- NSA: some pseudo set theory
- Theory of Action
- Car accident theory
- Ewing Theory
- The Golden Arches theory of conflict prevention
- phi-four theory
- Problems with functionalism as an international relations theory
- Relevance Theory
- Fermentation theory
- Ekpyrotic Theory
- The Theory of the Novel
- network theory
- Cutting, copying, and pasting in different computing environments
- computing the inverse
- Superstring Theory
- Big Sky Theory Of Navigation
- quantum field theory
- catastrophe theory
- stimulus-response theory
- The heartbeat theory of exercise
- Darwin's Theory and how it affected Europe
- Theory of Mind
- Theories of hearing
- Personal Construct Theory
- The Prisoner's Dilemma and Social Contract Theory on a racquetball court
- recapitulation theory
- ratchet theory of government growth
- density function theory
- The Theory of Everything
- fundamental theorem of Galois theory
- MISC: minimal instruction set computing
- Optical computing
- Galois Theory
- Conspiracy theory of the use of atomic weapons as to intimidate Russia
- Criminology: Psychological Theory
- The Clock Theory
- Labor theory of value
- Time-Space Theory
- endosymbiotic theory

If you Log in you could create a "theory of computing" node. If you don't already have an account, you can register here.