Course Number Language

Size: px
Start display at page:

Download "Course Number Language"

Transcription

1 Name Automated code analysis for large software systems iv English /14 Cloud Security se English and /14 Cryptography, Privacy and Security se English and /14 Current Topics in Multicore Semantics se English /14 Database systems II iv English /14 Efficient Graph Algorithms iv English and /14 Formal Specification se English /14 Implementation of Programming Languages pr English /14 Lab Algorithms for Chip Design Tools pr English and /14 Middleware iv English /14 Modeling Lab pr English /14 Modern C++ Programming pr English /14 Multimedia Technology se English and /14 Natural Language Processing and the Web iv English /14 Operating Systems iv English /14 Peer-to-Peer Networks iv English /14 Performance and Scalability of E-Commerce-Systems vl English 5 winter term /14 Physical Layer Security in Wireless Systems iv English and /14 Programming parallel Computer Architectures iv English /14 Recommender Systems se English and /14 Research course tools for secure multi-party computation se English and /14 Robot Learning vl English and /14 /14 /14 Security and the Cloud - The Issues and Metrics se English and /14 Security of Software Defined Networking se English /14 Smart Cities se English and /14 TK: Security, Privacy and Trust se English /14 Serious Games Lab pr English and /14 Page 1/6

2 Name Serious Games Project pp English and /14 Serious Games se English and /14 Simulation and evaluation on computer networks iv English and /14 Smart Grid Informatics and Trustworthiness se English /14 Smartphone-Security for Android Applications pr English and /14 Software Architecture se English /14 Software Development Tools pr English and /14 Software Engineering - Design and Construction iv English /14 Software Engineering - Projectmanagement vl English 5 winter term /14 Software Engineering in industrial practice vl English /14 TK1: Distributed Systems iv English /14 Topics in Network Security se English and /14 Type Systems of Programming Languages iv English /14 Wireless Sensor Networks pr English /14 Advanced Topics in Mobile Networking se English Advanced Topics in Scientific Visualization se English and Automatic Theorem Proving iv English and Computer Vision iv English Concepts of Programming Languages iv English Constructive Side Channel Analysis pr English and Design and Implementation of Modern Programming Languages se English Discussion Metaprogramming se English Educational Computer Science se English and Enterprise Application Design iv English Formal Methods for Information Security iv English Game Technology pp English and GPU Cluster Computing iv English and HandsOn Training - Software Security for Mobile Devices pr English Human Centred Security iv English Page 2/6

3 Name Implementation of Programming Languages pr English Implementing Secure & Reliable Software se English IT Solutions with Software Engineering in Practice iv English Large-scale Information Processing iv English and Machine Learning: Statistical Approaches iv English Mechanizing mathematical theory of programming languages: Operational semantics of WHILE in COQ iv English 5 summer term Mobile Security se English and Network Security iv English Operating Systems II: Dependability and Trust iv English Peer-to-Peer-Middleware pr English Post-Quantum Cryptography se English Recommender Systems Project pr English and Robot Learning se English and Scale Space and PDE methods in image analysis and processing se English Secure Coding Lab pr English Secure Mobile Systems vl English Security and Privacy in Smart Grid Critical Infrastructures pr English and Security Metrics in Cloud Computing se English and Semantic Transformations vl English and Advanced Topics in Computer Vision and Machine Learning se English and on Multimedia Technology se English and P2P se English and Semantic Transformations se English and Smart Grid Informatics and Trustworthiness se English Software Engineering - Design and Construction iv English Software Security for Mobile Devices se English Symbolic Execution se English and Page 3/6

4 Name Wireless Sensor Networks se English 3D Video and Mobile Peer-to-Peer Systems se English and Advanced Machine Learning: Project Class pp English Computer Vision II iv English Constructive Side Channel Analysis pr English and Cryptographic Gems iv English and Cryptography, Privacy and Security se English and Current Topics in Information Flow Security se English Database systems II iv English Digital Signatures se English and Educational Computer Science se English and Efficient Graph Algorithms iv English and Formal Specification se English Game Technology pp English and Implementation of Programming Languages pr English Lab Algorithms for Chip Design Tools pr English and Machine Learning: Statistical Approaches iv English Malware se English and Middleware iv English Modeling Lab pr English Natural Language Processing and the Web iv English Operating Systems iv English Peer-to-Peer Networks iv English Performance and Scalability of E-Commerce-Systems vl English 5 winter term Persistent Storage - Data Structure and Algorithms vl English Post-Quantum Cryptography iv English Programming parallel Computer Architectures iv English Recommender Systems se English and Research-orientend Cryptography iv English and Page 4/6

5 Name Robot Learning vl English and Security and Privacy in Smart Grid Critical Infrastructures pr English and Security Metrics in Cloud Computing se English and Security, Usability and Society se English and Smart Cities se English and Smart Grid Informatics and Trustworthiness se English Software Development Tools pr English and Software Engineering - Projectmanagement vl English 5 winter term Statical and dynamical program analysis iv English Topics in Network Security se English and Wireless Sensor Networks pr English Advanced Topics in Mobile Networking se English Advanced Topics in Scientific Visualization se English and Automatic Theorem Proving iv English and Classical Results in Modern Cryptography se English Computer Vision iv English Concepts of Programming Languages iv English Current Topics in Usage Control se English Dependable/Secure Mobile Computing se English Design and Implementation of Modern Programming Languages se English Enterprise Application Design iv English Formal Methods for Information Security iv English Game Technology pp English and GPU Cluster Computing iv English and HandsOn Training - Software Security for Mobile Devices pr English Implementation of Programming Languages pr English Implementing Secure & Reliable Software se English Page 5/6

6 Name Machine Learning: Statistical Approaches iv English Mobile Security se English and Network Security iv English Operating Systems II: Dependability and Trust iv English Peer-to-Peer-Middleware pr English Post-Quantum Cryptography se English Robot Learning se English and Scale Space and PDE methods in image analysis and processing se English Secure Coding Lab pr English Secure Mobile Systems vl English Security Metrics in Cloud Computing se English and Semantic Transformations vl English and Advanced Topics in Computer Vision and Machine Learning se English and on Multimedia Technology se English and P2P se English and Semantic Transformations se English and Software Engineering - Design and Construction iv English Software Security for Mobile Devices se English Tele-cooperation se English Usable Security and Electronic Voting pr English and Wireless Sensor Networks se English Last changed: Please note that the availability as well as the number of ECTS are not binding. For current information please see TUCaN. Page 6/6

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

How To Get A Computer Engineering Degree

How To Get A Computer Engineering Degree COMPUTER ENGINEERING GRADUTE PROGRAM FOR MASTER S DEGREE (With Thesis) PREPARATORY PROGRAM* COME 27 Advanced Object Oriented Programming 5 COME 21 Data Structures and Algorithms COME 22 COME 1 COME 1 COME

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India 1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE SCHOOL OF COMPUTER SCIENCE, CIUDAD REAL Core Subjects (CS) Compulsory Subjects (CPS) Optional

More information

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services Network Evolution, Cloud & Future Services Opportunities & Challenges for Next-Decade Services Outline Trends: Data, Services & Networks Cloud What is Next? 2 Law of Telecom Complexity Telecom complexity,

More information

2014 Voluntary Page and Overlength Article Charges

2014 Voluntary Page and Overlength Article Charges 2014 and NOTE: page charges do not apply to open access articles. Title Aerospace & Electronic $200 10 4 Aerospace & Electronic Affective Computing Annals of the History of Computing Antennas & Propagation

More information

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008 Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report

More information

Draft dpt for MEng Electronics and Computer Science

Draft dpt for MEng Electronics and Computer Science Draft dpt for MEng Electronics and Computer Science Year 1 INFR08012 Informatics 1 - Computation and Logic INFR08013 Informatics 1 - Functional Programming INFR08014 Informatics 1 - Object- Oriented Programming

More information

Seed4C: A Cloud Security Infrastructure validated on Grid 5000

Seed4C: A Cloud Security Infrastructure validated on Grid 5000 Seed4C: A Cloud Security Infrastructure validated on Grid 5000 E. Caron 1, A. Lefray 1, B. Marquet 2, and J. Rouzaud-Cornabas 1 1 Université de Lyon. LIP Laboratory. UMR CNRS - ENS Lyon - INRIA - UCBL

More information

Appendices master s degree programme Artificial Intelligence 2014-2015

Appendices master s degree programme Artificial Intelligence 2014-2015 Appendices master s degree programme Artificial Intelligence 2014-2015 Appendix I Teaching outcomes of the degree programme (art. 1.3) 1. The master demonstrates knowledge, understanding and the ability

More information

Depth and Excluded Courses

Depth and Excluded Courses Depth and Excluded Courses Depth Courses for Communication, Control, and Signal Processing EECE 5576 Wireless Communication Systems 4 SH EECE 5580 Classical Control Systems 4 SH EECE 5610 Digital Control

More information

Stream Processing on GPUs Using Distributed Multimedia Middleware

Stream Processing on GPUs Using Distributed Multimedia Middleware Stream Processing on GPUs Using Distributed Multimedia Middleware Michael Repplinger 1,2, and Philipp Slusallek 1,2 1 Computer Graphics Lab, Saarland University, Saarbrücken, Germany 2 German Research

More information

NATIONAL SUN YAT-SEN UNIVERSITY

NATIONAL SUN YAT-SEN UNIVERSITY NATIONAL SUN YAT-SEN UNIVERSITY Department of Electrical Engineering (Master s Degree, Doctoral Program Course, International Master's Program in Electric Power Engineering) Course Structure Course Structures

More information

USTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area. CPSC 822 Case Study in Operating Systems

USTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area. CPSC 822 Case Study in Operating Systems USTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area 398 / SE05117 Advanced Cover software lifecycle: waterfall model, V model, spiral model, RUP and

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

Department of CSE. Jaypee University of Information Technology, Waknaghat. Course Curricula

Department of CSE. Jaypee University of Information Technology, Waknaghat. Course Curricula Department of CSE Jaypee University of Information Technology, Waknaghat Course Curricula This document contains the Course Curricula for the following courses offered in the Department of CSE : B.Tech.

More information

Dual Degree Integrated M.Tech 5 Year Program in Computer Science and Engineering

Dual Degree Integrated M.Tech 5 Year Program in Computer Science and Engineering Dual Degree Integrated M.Tech 5 Year Program in Computer Science and Engineering The program exposes various areas of computer science engineering such as algorithms, computer systems, software engineering,

More information

Embedded Systems at the CSC School

Embedded Systems at the CSC School Embedded Systems at the CSC School Prof. Mads Dam Theoretical Computer Science School of Computer Science and Communication mfd@kth.se, tel.08-790 6229 CSC Departments CB Computational Biology CVAP Computer

More information

Poznan University of Technology Faculty of Electrical Engineering

Poznan University of Technology Faculty of Electrical Engineering Poznan University of Technology Faculty of Electrical Engineering Contact Person: Pawel Kolwicz Vice-Dean Faculty of Electrical Engineering pawel.kolwicz@put.poznan.pl List of Modules Academic Year: 2015/16

More information

All modules are assessed through examination (0%-100%) and/or coursework assessment (0%- 100%).

All modules are assessed through examination (0%-100%) and/or coursework assessment (0%- 100%). MSc(CompSc)-1 SYLLABUS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE The curriculum extends over two to three academic years for the part-time mode of study or one to two academic years for the

More information

COURSE CATALOGUE 2013-2014

COURSE CATALOGUE 2013-2014 COURSE CATALOGUE 201-201 Field: COMPUTER SCIENCE Programme: Bachelor s Degree Programme in Computer Science (Informatics) Length of studies: years (6 semesters) Number of ECTS Credits: 180 +0 for the B.Sc.

More information

Computer Science Electives and Clusters

Computer Science Electives and Clusters Course Number CSCI- Computer Science Electives and Clusters Computer Science electives belong to one or more groupings called clusters. Undergraduate students with the proper prerequisites are permitted

More information

Industry 4.0 and Big Data

Industry 4.0 and Big Data Industry 4.0 and Big Data Marek Obitko, mobitko@ra.rockwell.com Senior Research Engineer 03/25/2015 PUBLIC PUBLIC - 5058-CO900H 2 Background Joint work with Czech Institute of Informatics, Robotics and

More information

EECS PhD Comprehensive Examination Guidelines

EECS PhD Comprehensive Examination Guidelines EECS PhD Comprehensive Examination Guidelines EECS Graduate and Research Committee Graduate students accepted in the EECS doctoral program may take comprehensive exam as early as the last semester of their

More information

MSc Computer Science with specialisation in either Distributed Systems & Multimedia or Software Engineering - E526

MSc Computer Science with specialisation in either Distributed Systems & Multimedia or Software Engineering - E526 MSc Computer Science with specialisation in either Distributed Systems & Multimedia or Software Engineering - E526 1. Introduction The field of Information Technology has been a continuously expanding

More information

EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations

EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations DSS EIT ICT Labs Master Programme Distributed System and Services (Cloud Computing) The programme in Distributed Systems and Services focuses on

More information

How To Get A Computer Science Degree

How To Get A Computer Science Degree MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

imtech Curriculum Presentation

imtech Curriculum Presentation imtech Curriculum Presentation Effective from Batch 2015 Onwards April, 2015 Course Structure Every course has a fixed number of credits associated with it (e.g., 4 credits) One has to earn 200 credits

More information

Revistas IEEE ANII 2009

Revistas IEEE ANII 2009 Revistas IEEE ANII 2009 Advanced Packaging, IEEE Transactions on Aerospace and Electronic Systems Magazine, IEEE Aerospace and Electronic Systems, IEEE Transactions on American Institute of Electrical

More information

BIG DATA Alignment of Supply & Demand Nuria de Lama Representative of Atos Research &

BIG DATA Alignment of Supply & Demand Nuria de Lama Representative of Atos Research & BIG DATA Alignment of Supply & Demand Nuria de Lama Representative of Atos Research & Innovation 04-08-2011 to the EC 8 th February, Luxembourg Your Atos business Research technologists. and Innovation

More information

The regulations below are subject to University s approval and are applicable to students admitted to the curriculum in 2014-2015 and thereafter.

The regulations below are subject to University s approval and are applicable to students admitted to the curriculum in 2014-2015 and thereafter. MSc(CompSc)-1 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) The regulations below are subject to University s approval and are applicable to students admitted to the

More information

Big Data R&D Initiative

Big Data R&D Initiative Big Data R&D Initiative Howard Wactlar CISE Directorate National Science Foundation NIST Big Data Meeting June, 2012 Image Credit: Exploratorium. The Landscape: Smart Sensing, Reasoning and Decision Environment

More information

The 5G Infrastructure Public-Private Partnership

The 5G Infrastructure Public-Private Partnership The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility

More information

Security and Privacy in IoT Challenges to be won

Security and Privacy in IoT Challenges to be won Security and Privacy in IoT Challenges to be won Enrico Del Re University of Florence and CNIT Italy June 16-18, 2015 CHIST-ERA Conference 2015 1 FROM WHERE WE START.. June 16-18, 2015 CHIST-ERA Conference

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference to

More information

Master s Programme in ICT Innovation

Master s Programme in ICT Innovation Master s Programme in ICT Innovation Degree Programme in Computer Science and Engineering Degree: Master of Science in Technology M.Sc. (Tech) 120 ECTS Majors: Digital Media Technology (xxxx) Distributed

More information

How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time

How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time SCALEOUT SOFTWARE How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time by Dr. William Bain and Dr. Mikhail Sobolev, ScaleOut Software, Inc. 2012 ScaleOut Software, Inc. 12/27/2012 T wenty-first

More information

Big Data Executive Survey

Big Data Executive Survey Big Data Executive Full Questionnaire Big Date Executive Full Questionnaire Appendix B Questionnaire Welcome The survey has been designed to provide a benchmark for enterprises seeking to understand the

More information

CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014)

CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014) CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014) CSTA Website Oracle Website Oracle Contact http://csta.acm.org/curriculum/sub/k12standards.html https://academy.oracle.com/oa-web-introcs-curriculum.html

More information

Security & Privacy Issues in Mobile Cloud Computing

Security & Privacy Issues in Mobile Cloud Computing Security & Privacy Issues in Mobile Cloud Computing Manmohan Chaturvedi,1, Sapna Malik, Preeti Aggarwal and Shilpa Bahl Ansal University, Gurgaon- 122011, India 1 mmchaturvedi@ansaluniversity.edu.in Indian

More information

SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter)

SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter) MSc(CompSc)-1 (SUBJECT TO UNIVERSITY S APPROVAL) SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter) The curriculum

More information

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT Page 1 of 5 A. Advanced Mathematics for CS A1. Line and surface integrals 2 2 A2. Scalar and vector potentials 2 2 A3. Orthogonal curvilinear coordinates 2 2 A4. Partial differential equations 2 2 4 A5.

More information

A Comparative Study of cloud and mcloud Computing

A Comparative Study of cloud and mcloud Computing A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu

More information

Predictive Analytics. Noam Zeigerson, CTO

Predictive Analytics. Noam Zeigerson, CTO Predictive Analytics Noam Zeigerson, CTO Agenda The Predictive Analytics Need Innovative Technologies Business Solutions The problem: Inconsistent stream of revenue Available Data Sources ERP data Web

More information

ss. Cyril and Methodius University Faculty of Computer Science and Engineering Skopje, Macedonia

ss. Cyril and Methodius University Faculty of Computer Science and Engineering Skopje, Macedonia ss. Cyril and Methodius University Faculty of Computer Science and Engineering Skopje, Macedonia Prof. Dimitar Trajanov, THE UNIVERSITY Ss. Cyril and Methodius University in Skopje is oldest and the biggest

More information

A Professional Big Data Master s Program to train Computational Specialists

A Professional Big Data Master s Program to train Computational Specialists A Professional Big Data Master s Program to train Computational Specialists Anoop Sarkar, Fred Popowich, Alexandra Fedorova! School of Computing Science! Education for Employable Graduates: Critical Questions

More information

Bachelor Degree in Informatics Engineering Master courses

Bachelor Degree in Informatics Engineering Master courses Bachelor Degree in Informatics Engineering Master courses Donostia School of Informatics The University of the Basque Country, UPV/EHU For more information: Universidad del País Vasco / Euskal Herriko

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 244 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

Health Informatics and Artificial Intelligence: the next big thing in health/aged care

Health Informatics and Artificial Intelligence: the next big thing in health/aged care Health Informatics and Artificial Intelligence: the next big thing in health/aged care Professor Michael Blumenstein Griffith University ACSA National Conference, Adelaide Tuesday, September 9 th 2014

More information

The Department of Electrical and Computer Engineering (ECE) offers the following graduate degree programs:

The Department of Electrical and Computer Engineering (ECE) offers the following graduate degree programs: Note that these pages are extracted from the full Graduate Catalog, please refer to it for complete details. College of 1 ELECTRICAL AND COMPUTER ENGINEERING www.ece.neu.edu SHEILA S. HEMAMI, PHD Professor

More information

M.Sc. Program in Informatics and Telecommunications

M.Sc. Program in Informatics and Telecommunications M.Sc. Program in Informatics and Telecommunications at UoA-DIT Prof. Ioannis Stavrakakis Deputy Dept Chair, Director of Graduate Studies 1 Overview of Graduate Studies Initiated in 1993 Modified in 2000

More information

SMARTPHONES & BIG DATA. Daniel Nelson Head of Enterprise Development, Braintree @DanielROINelson daniel.nelson@braintreepayments.

SMARTPHONES & BIG DATA. Daniel Nelson Head of Enterprise Development, Braintree @DanielROINelson daniel.nelson@braintreepayments. SMARTPHONES & BIG DATA Daniel Nelson Head of Enterprise Development, Braintree @DanielROINelson daniel.nelson@braintreepayments.com TODAY WE LL COVER 1. Why smartphones represent a significant enabler

More information

MIT M2M ZU INDUSTRIE 4.0

MIT M2M ZU INDUSTRIE 4.0 MIT M2M ZU INDUSTRIE 4.0 Jürgen Hase Juergen.Hase@telekom.de Darmstadt, May 23, 2014 M2M // IMPACT ALONG MANY INDUSTRIES M2M ECOSYSTEM 8 5 4 7 6 2 1 9 3 1. Transport & Logistics 2. Vehicle Telematics 3.

More information

Dr. Raju Namburu Computational Sciences Campaign U.S. Army Research Laboratory. The Nation s Premier Laboratory for Land Forces UNCLASSIFIED

Dr. Raju Namburu Computational Sciences Campaign U.S. Army Research Laboratory. The Nation s Premier Laboratory for Land Forces UNCLASSIFIED Dr. Raju Namburu Computational Sciences Campaign U.S. Army Research Laboratory 21 st Century Research Continuum Theory Theory embodied in computation Hypotheses tested through experiment SCIENTIFIC METHODS

More information

NFC & Biometrics. Christophe Rosenberger

NFC & Biometrics. Christophe Rosenberger NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,

More information

Is a Data Scientist the New Quant? Stuart Kozola MathWorks

Is a Data Scientist the New Quant? Stuart Kozola MathWorks Is a Data Scientist the New Quant? Stuart Kozola MathWorks 2015 The MathWorks, Inc. 1 Facts or information used usually to calculate, analyze, or plan something Information that is produced or stored by

More information

College of Science Department of Mathematics and Computer Science. Assessment Plan Computer Science and Computer Networks

College of Science Department of Mathematics and Computer Science. Assessment Plan Computer Science and Computer Networks College of Science Department of Mathematics and Computer Science Programs: Assessment Plan Computer Science and Computer Networks Computer Science offers the following instructional programs: 1. Bachelor

More information

Internet of Things at Work Plug-and-play for industrial Automation

Internet of Things at Work Plug-and-play for industrial Automation Plug-and-play for industrial Automation Forum Industrial IT Tuesday, 09.04.2013 Henning Trsek Institute Industrial IT (init) Hochschule Ostwestfalen-Lippe 32657 Lemgo henning.trsek@hs-owl.de Agenda 1.

More information

Computer Science MS Course Descriptions

Computer Science MS Course Descriptions Computer Science MS Course Descriptions CSc I0400: Operating Systems Underlying theoretical structure of operating systems; input-output and storage systems, data management and processing; assembly and

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference to

More information

Seed4C: A High-security project for Cloud Infrastructure

Seed4C: A High-security project for Cloud Infrastructure Seed4C: A High-security project for Cloud Infrastructure J. Rouzaud-Cornabas (LIP/CC-IN2P3 CNRS) & E. Caron (LIP ENS-Lyon) November 30, 2012 J. Rouzaud-Cornabas (LIP/CC-IN2P3 CNRS) & E. Seed4C: Caron (LIP

More information

2012 / 2013 I SEMESTER Mandatory courses CODE C O U R S E ECTS Classes Semester workload 2FI100112 Mathematics I 8 3+2+2 216 2FI100212

2012 / 2013 I SEMESTER Mandatory courses CODE C O U R S E ECTS Classes Semester workload 2FI100112 Mathematics I 8 3+2+2 216 2FI100212 UNDERGRADUATE STUDY PROGRAM BUSINESS INFORMATICS COMPUTER SCIENCE FACULTY UGD STIP 4 YEARS STUDY PROGRAM (240 ECTS) and 3 YEARS STUDY PROGRAM (180 ECTS) 2012 / 2013 2FI100112 Mathematics I 8 3+2+2 216

More information

Cluster, Grid, Cloud Concepts

Cluster, Grid, Cloud Concepts Cluster, Grid, Cloud Concepts Kalaiselvan.K Contents Section 1: Cluster Section 2: Grid Section 3: Cloud Cluster An Overview Need for a Cluster Cluster categorizations A computer cluster is a group of

More information

Write a technical report Present your results Write a workshop/conference paper (optional) Could be a real system, simulation and/or theoretical

Write a technical report Present your results Write a workshop/conference paper (optional) Could be a real system, simulation and/or theoretical Identify a problem Review approaches to the problem Propose a novel approach to the problem Define, design, prototype an implementation to evaluate your approach Could be a real system, simulation and/or

More information

MSc(CompSc)-1. REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations)

MSc(CompSc)-1. REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) MSc(CompSc)-1 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain

More information

Why big data? Lessons from a Decade+ Experiment in Big Data

Why big data? Lessons from a Decade+ Experiment in Big Data Why big data? Lessons from a Decade+ Experiment in Big Data David Belanger PhD Senior Research Fellow Stevens Institute of Technology dbelange@stevens.edu 1 What Does Big Look Like? 7 Image Source Page:

More information

Agreement on. Dual Degree Master Program in Computer Science KAIST. Technische Universität Berlin

Agreement on. Dual Degree Master Program in Computer Science KAIST. Technische Universität Berlin Agreement on Dual Degree Master Program in Computer Science between KAIST Department of Computer Science and Technische Universität Berlin Fakultät für Elektrotechnik und Informatik (Fakultät IV) 1 1 Subject

More information

ASSESSMENT PLAN: M.S. in Computer Science

ASSESSMENT PLAN: M.S. in Computer Science Department of Mathematics, CSCI ASSESSMENT PLAN: M.S. in Computer Science Updated Date: Winter 2015 by Matt Johnson PROGRAM MISSION CSUEB Missions, Commitments, and ILOs, 2012 CSUEB Computer Science Program

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

NTRA s Proposed Areas of Research

NTRA s Proposed Areas of Research R & D Department NTRA s Proposed Areas of Research CFP5 (May 2015) The NTRA supports research in the telecommunications field in addition to other relevant fields. If you are not sure whether the NTRA

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

ABET General Outcomes. Student Learning Outcomes for BS in Computing

ABET General Outcomes. Student Learning Outcomes for BS in Computing ABET General a. An ability to apply knowledge of computing and mathematics appropriate to the program s student outcomes and to the discipline b. An ability to analyze a problem, and identify and define

More information

Other Required Courses (14-18 hours)

Other Required Courses (14-18 hours) 1) IT Business Track Required Info Technology Courses (19 hours) 1,2&3 ITEC 2110 Digital Media 1,2&3 ITEC 3100 Intro to Networks 1,2&3 ITEC 3200 Intro to Databases 1 ITEC 3350 ECommerce 1,2&3 ITEC 3900

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 299 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission

Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission Photo courtesy of Justin Reuter Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission CDDA Mission Mission of our CDDA

More information

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer Research Institution

More information

What s Up at CISE. Jeannette M. Wing

What s Up at CISE. Jeannette M. Wing What s Up at CISE Assistant Director Computer and Information Science and Engineering Directorate and President s Professor of Computer Science Carnegie Mellon University BMSA 2 November 2007 Outline Looking

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges

More information

Operating System Support for Multiprocessor Systems-on-Chip

Operating System Support for Multiprocessor Systems-on-Chip Operating System Support for Multiprocessor Systems-on-Chip Dr. Gabriel marchesan almeida Agenda. Introduction. Adaptive System + Shop Architecture. Preliminary Results. Perspectives & Conclusions Dr.

More information

REGULATIONS 2015 (CBCS) B.TECH. INFORMATION TECHNOLOGY CURRICULUM - SYLLABUS SEMESTER I

REGULATIONS 2015 (CBCS) B.TECH. INFORMATION TECHNOLOGY CURRICULUM - SYLLABUS SEMESTER I REGULATIONS 2015 (CBCS) B.TECH. INFORMATION TECHNOLOGY CURRICULUM - SYLLABUS SEMESTER I Code No. Course Title L T P C BEN101 Technical English I 3 0 0 3 BMA101 Mathematics -I 3 0 0 3 BPH101 Engineering

More information

Applied and Integrated Security. C. Eckert

Applied and Integrated Security. C. Eckert Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass

More information

Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci

Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci 1 Artificial Intelligence and Robotics @ Politecnico di Milano Presented by Matteo Matteucci What is Artificial Intelligence «The field of theory & development of computer systems able to perform tasks

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 043 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad - 500 0 INFORMATION TECHNOLOGY TUTORIAL QUESTION BANK Name : Cloud computing Code : A60519 Class : III B. Tech II Semester Branch

More information

Teaching Computational Thinking using Cloud Computing: By A/P Tan Tin Wee

Teaching Computational Thinking using Cloud Computing: By A/P Tan Tin Wee Teaching Computational Thinking using Cloud Computing: By A/P Tan Tin Wee Technology in Pedagogy, No. 8, April 2012 Written by Kiruthika Ragupathi (kiruthika@nus.edu.sg) Computational thinking is an emerging

More information

Master of Science in Information Technology (MS-IT)

Master of Science in Information Technology (MS-IT) Master of Science in Information Technology (MS-IT) Program Objectives The primary aim of the program is to allow IT professionals an opportunity for professional upgrading or an extension of their qualifications

More information

COMP9321 Web Application Engineering

COMP9321 Web Application Engineering COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 11 (Part II) http://webapps.cse.unsw.edu.au/webcms2/course/index.php?cid=2411

More information

Teaching Scheme. Theory Practical Course Code L T P Credits Max. Min. Max. Min. ISE 10. -- -- 1MA201 Linear Algebra 3 1-4

Teaching Scheme. Theory Practical Course Code L T P Credits Max. Min. Max. Min. ISE 10. -- -- 1MA201 Linear Algebra 3 1-4 Teaching and for Second Year B.Tech Program in Information Technology I Semester With Effective from 201213 Theory Practical Scheme Marks Marks L T P Credits Max. Min. Max. Min. 1MA201 Linear Algebra 3

More information

Sharing Workspaces - A Brief Overview

Sharing Workspaces - A Brief Overview escience and Shared Workspaces: Enabler for a next generation research environment PrimeLife/IFIP Summer School 2010 Helsingborg, 2010-08-04 Christian Weber T-Mobile Chair of Mobile Business & Multilateral

More information

Search and Data Mining: Techniques. Introduction Anna Yarygina Boris Novikov

Search and Data Mining: Techniques. Introduction Anna Yarygina Boris Novikov Search and Data Mining: Techniques Introduction Anna Yarygina Boris Novikov Data Analytics: Conference Sections Fundamentals for data analytics Mechanisms and features Big Data Huge data Target analytics

More information

The Big Data methodology in computer vision systems

The Big Data methodology in computer vision systems The Big Data methodology in computer vision systems Popov S.B. Samara State Aerospace University, Image Processing Systems Institute, Russian Academy of Sciences Abstract. I consider the advantages of

More information

Technical Club: New Vision of Computing

Technical Club: New Vision of Computing 1 Technical Club: New Vision of Computing Core Discipline : Mentor : Computer Science Engineering Dr. Shripal Vijayvergia, Associate Professor, CSE Co-Mentor : 1. Mr. Subhash Gupta, Assistant Professor,

More information

Course Semester Language of Code InstructionDegree College Department Major/Elective Credit Course Type Evaluation College of System.

Course Semester Language of Code InstructionDegree College Department Major/Elective Credit Course Type Evaluation College of System. Course Semester of Code InstructionDegree College Department Major/Elective Credit Course Type Evaluation System Spring English CSE2003 Undergraduate Algorithms Spring English CSE3002 Undergraduate Algorithms

More information

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT

More information

Cloud DReAM - Dynamic resource allocation management for large-scale MMOGS

Cloud DReAM - Dynamic resource allocation management for large-scale MMOGS Cloud DReAM - Dynamic resource allocation management for large-scale MMOGS Miguel António Moreira de Sousa Adaixo 1 Instituto Superior Técnico (IST), Technical University of Lisbon, Portugal 2 Distributed

More information