Faculty
Laboratories
Contact
This course covers advanced topics on design and analysis of efficient algorithms. The topics covered are graph algorithms, algebraic algorithms, string matching algorithms, geometric algorithms, and approximation algorithms for NP-hard problems.
This is an introductory course to stochastic processes for students in engineering and computer
science.
Intuition, but not much of riegorosity is emphasized. Among the topics, random variables, conditional
probability and expectation, Markov chains, and Poisson process will be included.
This covers elements of computability theory and complexity theory. The topics covered in computability theory are Turing machines, decidable/undecidable problems, concepts of reductions, proofs of undecidability, Post correspondence problem, and Recursion theorem. The topics covered in complexity theory are P, NP, NP-completeness, PSPACE, PSPACE-completeness, and Hierarchy theorems.
Students will discuss each area covered in the related courses in depth including undergraduate computer organization. Recent issues in technological trends and theoretical backgrounds are also included in the course. The topics are : Fundamentals of Computer Design, Instruction Set Architecture, Scalability and Performance issues, Principles of Parallelism, Memory-Hierarchy, Interconnection Networks, Multiprocessors including Cache Coherence, and Multicore issues.
This course covers detail issues of design and implementation of Linux operating systems. Most of the course will be devoted to loader, shell programming, architecture of Linux, core data structures and source codes related to modules management, Virtual File Subsystem, networking protocol stacks, device drivers, and some well known system call routines.
Students will acquire basic knowledge about the performance evaluation systems consisting of CPU, I / O, O / S, Network, DBMS, such as systems analysis and modeling, benchmarking, and they will need to perform a computer simulation system modeling method, model design, implementation, and workings of an existing system, for example, and look at the design and performance evaluation methods, and the latest papers and case studies of topics associated with learning.
Based on the knowledge acquired during undergraduate school, the students are expected to have in-depth understanding of network layer protocols, transport layer protocols, and mobility-support protocols that are available and will be deployed in the Internet. This in-depth understanding will help the students to follow the advanced network course and to perform their research that utilizes the network infrastructure.
This course provides students with comprehensive introduction to the recent research topics in database areas. We will cover the object-oriented database models, object-relational database models, XML data model, multimedia database models, flash-aware databases, and so on. The goal of the course is to give the student a basic understanding of recent research topics in database systems and applications.
This course aims to understand the theory of advanced information security. In this lesson we first understand the meaning of information security, then the importance and goals, of information security, cryptography, security models and policies, operating systems, security, application security, malware, security assessment and management of advanced theories and research.
This course introduces information retrieval overall. In the first part, it covers Boolean retrieval and basic techniques for indexing and retrieving. In the second part, it covers advanced topics: relevance feedback, XML retrieval, vector model, probabistic model, and classification methods. At the end of class, the students present some data-mining research papers which will be given in class.
This course covers algorithms for solving computational problems in molecular biology. The topics covered are a molecular biology primer, motif finding, genome rearrangements, sequence alignment, gene prediction, fragment assembly, peptide sequencing, similarity search, gene expression analysis, and evolutionary trees.
In this course, we will study knowledge representation and reasoning in depth. More specifically, we cover Propositional logic, first-order logic, and frame-based knowledge reprsentation structures. We also cover ontology representation, description logic and OWL. In this class, as a final term project you are supposed to develop a knowldge-based system with Protege-OWL, an ontology engineering tool.
This course is an advanced software engineering (SE) course, first to evaluate and to analyze conventional software engineering concepts, methodologies, and technique. Then, this course deals with reuse software engineering areas such as object-oriented SE, system engineering-based SE, component-based SE, architecture-based SE, etc., in order to overcome the limitations or constraints of conventional development methodologies. The analysis covers various issues such as conceptual, methodological, technological, institutional and social issues. Attending students will be able to elevate their capability for trend estimation and total life-cycle engineering in the SE field.
This course covers the principles and concepts of service-oriented computing; architecture, theoretical background, techniques, and standards. First of all, we look over the concepts of Web services as the typical standard of service-oriented computing and its trends. And we deal with key elements of service-oriented computing technology that comprise the modeling and specification technique, service composition techniques and the execution model, service selection technique, and the service collaboration techniques.
In this course, we study the theories and practices of distributed object and component
systems.
The topics covered in this course are as follows.
This is an advanced graduate course for some selected topics related to information security. The topics to be covered can vary by instructor.
Mobile social networking services are becoming popular in this smart phone era. We survey popular services, compare their features and business models, and design new services using database systems.
This course will cover several topics for the key aspects of mobile computing systems: mobility, portability, and wireless connectivity. Some of those topics to be covered in class are wireless LAN/PAN/WAN systems, mobile ad hoc networks, mobility management, power management, and so on.
This course covers theory and application for real-time systems requiring time constraints. Hard / soft real-time systems, clock-driven scheduling, priority-driven scheduling, aperiodic and sporadic jobs, resource access control, real-time communication, real-time operating systems, and real-time data management will be discussed.
This course will cover some advanced and latest topics related to distributed networking systems and applications. The topics to be covered every semester can vary by instructor.
This course covers structure, components, functions, and design of distributed systems which consist of many independent systems and look like a single system image. Theory and applications of distributed systems related to synchronization issues, load balancing, remote procedure calls, file sharing, fault-tolerance, replication, and consistency are included.
Teletraffic theory and its related mathematical tools such as random process and queueing theory are given in this class.
The purpose of the course is for students to learn basic multimedia compression and communication system architectures, and to gain knowledge of multimedia network performance analysis by both mathematical and simulation methodologies. The course content is divided into the following three topics: 1) introduction to multimedia compression standards, services and network architectures. 2) mathematical and simulation approaches to analyzinge multimedia service performances in traditional and emerging convergence networks. 3) advanced issues on recent multimedia communication and service technologies.
Students in this course study network architectures of cellular networks, ad hoc networks, and mesh networks, access protocols, radio and network resource management, quality of service, mobility and location management, routing, mobile-IP, Wireless TCP, and current wireless technologies for personal, local and satellite networks.
This course is based on studying characteristics of wireless communication channels, wireless multiple access technologies, and cellular communications. We will focus on CDMA and OFDMA for cellular communications and CSMA for wireless LANs. The next focus will be on various multiple access strategies for multi-hop wireless communication environments.
In this course we will learn the essential concepts of communication security, such as identification, authentication, access control, confidentiality, integrity, non-repudiation and reuse prevention. Based on these studies, emerging issues In wireless ad-hoc and mobile communication network security are mainly researched. Related to the main topic and keywords are the following: IEEE802.11 WLAN, Bluetooth, HyperLAN, WMN (Wireless Mesh Network), Ubiquitous Sensor Network, and Security Mobility.
In this course, students learn key technologies for radio resource management in wireless mobile networks. This course covers random process, channel model, resource allocation, information theory, and other technologies in next-generation wireless mobile networks. The class will include several team projects and homework assignments.
IT security products have been installed and are operating in most agencies and companies to protect important information. This course covers how to evaluate IT Security products based on CC/CEM, which are ISO standards to ensure that the IT security products are safety and reliability.
Cloud Computing has been the hottest buzzword in the IT domain recently. Cloud Computing provides a computing paradigm where resources, software and information are shared on demand. In this course, we overview the computing paradigm, learn core enabling technologies and study practical cases. The main topics which will be covered during the class are as follows: