Course Number Language

Similar documents
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Applied Computer Science

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

How To Get A Computer Engineering Degree

Master of Science in Computer Science

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

Doctor of Philosophy in Computer Science

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services

2014 Voluntary Page and Overlength Article Charges

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Draft dpt for MEng Electronics and Computer Science

Seed4C: A Cloud Security Infrastructure validated on Grid 5000

Appendices master s degree programme Artificial Intelligence

Depth and Excluded Courses

Stream Processing on GPUs Using Distributed Multimedia Middleware

NATIONAL SUN YAT-SEN UNIVERSITY

USTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area. CPSC 822 Case Study in Operating Systems

School of Computer Science

Department of CSE. Jaypee University of Information Technology, Waknaghat. Course Curricula

Dual Degree Integrated M.Tech 5 Year Program in Computer Science and Engineering

Embedded Systems at the CSC School

Poznan University of Technology Faculty of Electrical Engineering

All modules are assessed through examination (0%-100%) and/or coursework assessment (0%- 100%).

COURSE CATALOGUE

Computer Science Electives and Clusters

Industry 4.0 and Big Data

EECS PhD Comprehensive Examination Guidelines

MSc Computer Science with specialisation in either Distributed Systems & Multimedia or Software Engineering - E526

EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations

How To Get A Computer Science Degree

imtech Curriculum Presentation

Revistas IEEE ANII 2009

BIG DATA Alignment of Supply & Demand Nuria de Lama Representative of Atos Research &

The regulations below are subject to University s approval and are applicable to students admitted to the curriculum in and thereafter.

Big Data R&D Initiative

The 5G Infrastructure Public-Private Partnership

Security and Privacy in IoT Challenges to be won

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

Master s Programme in ICT Innovation

How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time

Big Data Executive Survey

CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014)

Security & Privacy Issues in Mobile Cloud Computing

SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year and thereafter)

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT

A Comparative Study of cloud and mcloud Computing

Predictive Analytics. Noam Zeigerson, CTO

ss. Cyril and Methodius University Faculty of Computer Science and Engineering Skopje, Macedonia

A Professional Big Data Master s Program to train Computational Specialists

Bachelor Degree in Informatics Engineering Master courses

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

Health Informatics and Artificial Intelligence: the next big thing in health/aged care

The Department of Electrical and Computer Engineering (ECE) offers the following graduate degree programs:

M.Sc. Program in Informatics and Telecommunications

SMARTPHONES & BIG DATA. Daniel Nelson Head of Enterprise Development, daniel.nelson@braintreepayments.

MIT M2M ZU INDUSTRIE 4.0

Dr. Raju Namburu Computational Sciences Campaign U.S. Army Research Laboratory. The Nation s Premier Laboratory for Land Forces UNCLASSIFIED

NFC & Biometrics. Christophe Rosenberger

Is a Data Scientist the New Quant? Stuart Kozola MathWorks

College of Science Department of Mathematics and Computer Science. Assessment Plan Computer Science and Computer Networks

Internet of Things at Work Plug-and-play for industrial Automation

Computer Science MS Course Descriptions

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

Seed4C: A High-security project for Cloud Infrastructure

2012 / 2013 I SEMESTER Mandatory courses CODE C O U R S E ECTS Classes Semester workload 2FI Mathematics I FI100212

Cluster, Grid, Cloud Concepts

Write a technical report Present your results Write a workshop/conference paper (optional) Could be a real system, simulation and/or theoretical

MSc(CompSc)-1. REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations)

Why big data? Lessons from a Decade+ Experiment in Big Data

Agreement on. Dual Degree Master Program in Computer Science KAIST. Technische Universität Berlin

ASSESSMENT PLAN: M.S. in Computer Science

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

NTRA s Proposed Areas of Research

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

ABET General Outcomes. Student Learning Outcomes for BS in Computing

Other Required Courses (14-18 hours)

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

What s Up at CISE. Jeannette M. Wing

Internet of Things (IoT): A vision, architectural elements, and future directions

Operating System Support for Multiprocessor Systems-on-Chip

REGULATIONS 2015 (CBCS) B.TECH. INFORMATION TECHNOLOGY CURRICULUM - SYLLABUS SEMESTER I

Applied and Integrated Security. C. Eckert

Artificial Intelligence and Politecnico di Milano. Presented by Matteo Matteucci

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Teaching Computational Thinking using Cloud Computing: By A/P Tan Tin Wee

Master of Science in Information Technology (MS-IT)

COMP9321 Web Application Engineering

Teaching Scheme. Theory Practical Course Code L T P Credits Max. Min. Max. Min. ISE MA201 Linear Algebra 3 1-4

Sharing Workspaces - A Brief Overview

Search and Data Mining: Techniques. Introduction Anna Yarygina Boris Novikov

The Big Data methodology in computer vision systems

Technical Club: New Vision of Computing

Course Semester Language of Code InstructionDegree College Department Major/Elective Credit Course Type Evaluation College of System.

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

Cloud DReAM - Dynamic resource allocation management for large-scale MMOGS

Transcription:

Name Automated code analysis for large software systems 20-00-0732-iv English /14 Cloud Security 20-00-0729-se English and /14 Cryptography, Privacy and Security 20-00-0672-se English and /14 Current Topics in Multicore Semantics 20-00-0738-se English /14 Database systems II 20-00-0048-iv English /14 Efficient Graph Algorithms 20-00-0110-iv English and /14 Formal Specification 20-00-0382-se English /14 Implementation of Programming Languages 20-00-0306-pr English /14 Lab Algorithms for Chip Design Tools 20-00-0571-pr English and /14 Middleware 20-00-0153-iv English /14 Modeling Lab 20-00-0383-pr English /14 Modern C++ Programming 20-00-0747-pr English /14 Multimedia Technology 20-00-0624-se English and /14 Natural Language Processing and the Web 20-00-0433-iv English /14 Operating Systems 20-00-0175-iv English /14 Peer-to-Peer Networks 20-00-0117-iv English /14 Performance and Scalability of E-Commerce-Systems 20-00-0075-vl English 5 winter term /14 Physical Layer Security in Wireless Systems 20-00-0745-iv English and /14 Programming parallel Computer Architectures 20-00-0626-iv English /14 Recommender Systems 20-00-0686-se English and /14 Research course tools for secure multi-party computation 20-00-0741-se English and /14 Robot Learning 20-00-0629-vl English and /14 /14 /14 Security and the Cloud - The Issues and Metrics 20-00-0577-se English and /14 Security of Software Defined Networking 20-00-0740-se English /14 Smart Cities 20-00-0619-se English and /14 TK: Security, Privacy and Trust 20-00-0620-se English /14 Serious Games Lab 20-00-0236-pr English and /14 Page 1/6

Name Serious Games Project 20-00-0649-pp English and /14 Serious Games 20-00-0328-se English and /14 Simulation and evaluation on computer networks 20-00-0736-iv English and /14 Smart Grid Informatics and Trustworthiness 20-00-0684-se English /14 Smartphone-Security for Android Applications 20-00-0739-pr English and /14 Software Architecture 20-00-0730-se English /14 Software Development Tools 20-00-0673-pr English and /14 Software Engineering - Design and Construction 20-00-0341-iv English /14 Software Engineering - Projectmanagement 20-00-0178-vl English 5 winter term /14 Software Engineering in industrial practice 20-00-0317-vl English /14 TK1: Distributed Systems 20-00-0065-iv English /14 Topics in Network Security 20-00-0549-se English and /14 Type Systems of Programming Languages 20-00-0727-iv English /14 Wireless Sensor Networks 20-00-0354-pr English /14 Advanced Topics in Mobile Networking 20-00-0510-se English Advanced Topics in Scientific Visualization 20-00-0607-se English and Automatic Theorem Proving 20-00-0660-iv English and Computer Vision 20-00-0157-iv English Concepts of Programming Languages 20-00-0072-iv English Constructive Side Channel Analysis 20-00-0671-pr English and Design and Implementation of Modern Programming Languages 20-00-0182-se English Discussion Metaprogramming 20-00-0708-se English Educational Computer Science 20-00-0666-se English and Enterprise Application Design 20-00-0071-iv English Formal Methods for Information Security 20-00-0362-iv English Game Technology 20-00-0649-pp English and GPU Cluster Computing 20-00-0657-iv English and HandsOn Training - Software Security for Mobile Devices 20-00-0640-pr English Human Centred Security 20-00-0698-iv English Page 2/6

Name Implementation of Programming Languages 20-00-0306-pr English Implementing Secure & Reliable Software 20-00-0551-se English IT Solutions with Software Engineering in Practice 20-00-0635-iv English Large-scale Information Processing 20-00-0706-iv English and Machine Learning: Statistical Approaches 20-00-0358-iv English Mechanizing mathematical theory of programming languages: Operational semantics of WHILE in COQ 20-00-0703-iv English 5 summer term Mobile Security 20-00-0652-se English and Network Security 20-00-0512-iv English Operating Systems II: Dependability and Trust 20-00-0378-iv English Peer-to-Peer-Middleware 20-00-0269-pr English Post-Quantum Cryptography 20-00-0651-se English Recommender Systems Project 20-00-0707-pr English and Robot Learning 20-00-0636-se English and Scale Space and PDE methods in image analysis and processing 20-00-0469-se English Secure Coding Lab 20-00-0656-pr English Secure Mobile Systems 20-00-0583-vl English Security and Privacy in Smart Grid Critical Infrastructures 20-00-0668-pr English and Security Metrics in Cloud Computing 20-00-0577-se English and Semantic Transformations 20-00-0643-vl English and Advanced Topics in Computer Vision and Machine Learning 20-00-0645-se English and on Multimedia Technology 20-00-0648-se English and P2P 20-00-0475-se English and Semantic Transformations 20-00-0644-se English and Smart Grid Informatics and Trustworthiness 20-00-0684-se English Software Engineering - Design and Construction 20-00-0341-iv English Software Security for Mobile Devices - 20-00-0641-se English Symbolic Execution 20-00-0702-se English and Page 3/6

Name Wireless Sensor Networks 20-00-0313-se English 3D Video and Mobile Peer-to-Peer Systems 20-00-0624-se English and Advanced Machine Learning: Project Class 20-00-0669-pp English Computer Vision II 20-00-0401-iv English Constructive Side Channel Analysis 20-00-0671-pr English and Cryptographic Gems 20-00-0685-iv English and Cryptography, Privacy and Security 20-00-0672-se English and Current Topics in Information Flow Security 20-00-0612-se English Database systems II 20-00-0048-iv English Digital Signatures 20-00-0679-se English and Educational Computer Science 20-00-0666-se English and Efficient Graph Algorithms 20-00-0110-iv English and Formal Specification 20-00-0382-se English Game Technology 20-00-0649-pp English and Implementation of Programming Languages 20-00-0306-pr English Lab Algorithms for Chip Design Tools 20-00-0571-pr English and Machine Learning: Statistical Approaches 2 20-00-0449-iv English Malware 20-00-0681-se English and Middleware 20-00-0153-iv English Modeling Lab 20-00-0383-pr English Natural Language Processing and the Web 20-00-0433-iv English Operating Systems 20-00-0175-iv English Peer-to-Peer Networks 20-00-0117-iv English Performance and Scalability of E-Commerce-Systems 20-00-0075-vl English 5 winter term Persistent Storage - Data Structure and Algorithms 20-00-0496-vl English Post-Quantum Cryptography 20-00-0632-iv English Programming parallel Computer Architectures 20-00-0626-iv English Recommender Systems 20-00-0686-se English and Research-orientend Cryptography 20-00-0680-iv English and Page 4/6

Name Robot Learning 20-00-0629-vl English and Security and Privacy in Smart Grid Critical Infrastructures 20-00-0668-pr English and Security Metrics in Cloud Computing 20-00-0577-se English and Security, Usability and Society 20-00-0665-se English and Smart Cities 20-00-0619-se English and Smart Grid Informatics and Trustworthiness 20-00-0684-se English Software Development Tools 20-00-0673-pr English and Software Engineering - Projectmanagement 20-00-0178-vl English 5 winter term Statical and dynamical program analysis 20-00-0580-iv English Topics in Network Security 20-00-0549-se English and Wireless Sensor Networks 20-00-0354-pr English Advanced Topics in Mobile Networking 20-00-0510-se English Advanced Topics in Scientific Visualization 20-00-0607-se English and Automatic Theorem Proving 20-00-0660-iv English and Classical Results in Modern Cryptography 20-00-0661-se English Computer Vision 20-00-0157-iv English Concepts of Programming Languages 20-00-0072-iv English Current Topics in Usage Control 20-00-0584-se English Dependable/Secure Mobile Computing 20-00-0547-se English Design and Implementation of Modern Programming Languages 20-00-0182-se English Enterprise Application Design 20-00-0071-iv English Formal Methods for Information Security 20-00-0362-iv English Game Technology 20-00-0649-pp English and GPU Cluster Computing 20-00-0657-iv English and HandsOn Training - Software Security for Mobile Devices 20-00-0640-pr English Implementation of Programming Languages 20-00-0306-pr English Implementing Secure & Reliable Software 20-00-0551-se English Page 5/6

Name Machine Learning: Statistical Approaches 20-00-0358-iv English Mobile Security 20-00-0652-se English and Network Security 20-00-0512-iv English Operating Systems II: Dependability and Trust 20-00-0378-iv English Peer-to-Peer-Middleware 20-00-0269-pr English Post-Quantum Cryptography 20-00-0651-se English Robot Learning 20-00-0636-se English and Scale Space and PDE methods in image analysis and processing 20-00-0469-se English Secure Coding Lab 20-00-0656-pr English Secure Mobile Systems 20-00-0583-vl English Security Metrics in Cloud Computing 20-00-0577-se English and Semantic Transformations 20-00-0643-vl English and Advanced Topics in Computer Vision and Machine Learning 20-00-0645-se English and on Multimedia Technology 20-00-0648-se English and P2P 20-00-0475-se English and Semantic Transformations 20-00-0644-se English and Software Engineering - Design and Construction 20-00-0341-iv English Software Security for Mobile Devices - 20-00-0641-se English Tele-cooperation 20-00-0130-se English Usable Security and Electronic Voting 20-00-0650-pr English and Wireless Sensor Networks 20-00-0313-se English Last changed: 18.11. Please note that the availability as well as the number of ECTS are not binding. For current information please see TUCaN. Page 6/6