Computer Science (CSC) (CSC)
Problem-solving and pre-programming skills developed using hands-on activities in preparation for the introductory programming course.
An introduction to the design of algorithms and their implementation in a high-level programming language. Topics include: problem solving strategies, programming concepts, programming environment, control structures, methods, arrays, searching, sorting, object-oriented programming, and file input/output.
Continuation of CSC 120. Topics include: object-oriented programming concepts, abstract data types, graphical user interfaces and event-driven programming, exception handling, text and binary file I/O, and an overview of dynamic data structures.
Selected topics in computer science. Prerequisite: Permission of the CSC coordinator.
Topics include: Boolean algebra, minimization techniques, combinatorial and sequential circuit analysis, memory organization, microprocessor concepts, and CPU architecture.
The course will cover techniques to organize and access collections of data, definition, implementation, and use of Classes and Abstract Data Types(ADT). Topics include: stacks, queues, heaps, search trees, recursion, algorithmic complexity, advance searching and sorting algorithms, and graphs and their application to problems.
An introduction to computer networks. Topics include: data transmission, network architectures, file compression algorithms, communication devices and protocols, network routing and flow algorithms.
An introduction to computer organization using a top down approach from system component to the register level, internal representation of data, general assembly and linking concepts, addressing modes, and introduction to a specific processor, its architecture and operating system.
This course covers the development of operating systems that control computing systems. Topics include: file systems, process management, scheduling, memory management (real and virtual), security, and concurrency. Case studies of operating systems are examined.
Introduction to database design and implementation. Aspects of data modeling, database design theory, storage, indexing, and database application development. Entity-relationship model, relational data model, schema refinement, normal forms, file organizations, index structures, and embedded SQL application development.
Models, techniques, and tools used in project management. Topics include: software development process, task scheduling, estimation and progress measurement. Coordination of development teams. Standards, testing plans, configuration management, metrics and use of CASE tools, system delivery and maintenance strategies.
Techniques for the design and analysis of efficient algorithms, emphasizing methods useful in practice. Topics covered include: mathematical foundations; all five asymptotic notations; analytic, empirical, and qualitative evaluation techniques; sorting algorithms; balanced trees (2-3-4 trees and red-black trees); dynamic programming; and NP-completeness.
Formal examination of programming languages. Formal Language concepts including syntax and basic grammars are studied. Language features such as data types and structures, control structures, and data flow are examined. The run-time environment and the process of interpretation/compilation are covered. Interpreter and compilation techniques are introduced.
The objective of this course is to enhance the security of software by introducing sound security principles that should be incorporated into the software development process. Students will learn a risk management framework and best practices for software secuirty including code reviews, architectural risk analysis, penetration testing, risk-based security test, abuse cases, security requirements, and security operations.Students will also learn common flaws that lead to exploitation and be able to identify and mitigate such errors in practice. Out of class labs and exercises reinforce concepts presented in class. Prerequisite: CSC 331.
This course focuses on security issues in concurrent and distributed systems. Security features in the current advent of cloud computing are vital. Example topics include secure multi-threading, agent-based security, security policy composition, secure compartmentalization and more.
The students will learn knowledge service design based on Web technologies and will develop a knowledge service project during the course. The course will highlight the features of different Web Services Technologies and introduce various Scripting Languages, provide an up-to-date survey of developments in Web Services Technologies, and Knowledge Modeling.
Lexical analysis, syntactic analysis, intermediate code generation, object code generation, optimization, memory use, generators for scanners and parsers.
Data communications and computer networks. An in-depth treatment of network architectures and protocols for both WANS and LANS. Topics include: network routing and flow algorithms, internet working, and distributed systems.
Design and implementation of software for real-time computer systems. Survey of typical real-time systems; techniques for code-conversion, error checking, and transmission monitoring.
An in-depth study of hardware and software techniques used in computer graphics. Study of display and entry devices, including refresh, storage, and raster scan topics. Software techniques will include display files, windowing, clipping, two and three-dimensional transformations, and hidden-surface removal.
Analytic and simulation models developed using deterministic and stochastic techniques. Topics include: event-driven simulations, queuing theory, Markov processes, and dynamical systems. "Real World" project required.
Mathematical preliminaries, solving linear systems numerical solution of ordinary and partial differential equations.
Introduction to basic concepts, implementation techniques, and philosophies of artificial intelligence and intelligent systems. Introduction to expert systems, fuzzy logic systems, neural networks, and techniques for artificial intelligence programming. The fundamentals of an AI programming language (LISP or PROLOG) will be presented. The language will then be used to solve problems in typical AI applications.
Introduction to computer game development, including a variety of related topics. The course will be driven by research/technical paper discussions, student presentations and projects. The direction of the course will be guided to some extent by student interest.
This course will cover advance topics related to the development of game and simulation software. Topics include game physics, collision techniques, game mechanics, level design, artificial intelligence, and security. Students will design and implement a game or simulation program that includes elements of artificial intelligence.
This course provides an in-depth study of data mining. Course content includes data preparation, feature selection, pattern mining, classification, clustering, and sequence mining. New research areas in data mining will also be discussed.
Students in this course will study algorithms pertaining to bioinformatics (e.g. sequence alignment, biological database search, and phylogeny reconstruction); gain hands-on experience using bioinformatics tools; and understand the interaction of computer science and modern biology within the context of data-driven knowledge discovery.
A study of advanced AI theory and implementation. Topics include neural networks, probability learning, and a variety of related topics. A programming language (LISP or R) will be utilized to solve complex industry problems associated with AI applications.
Mathematical preliminaries, languages, context-free grammars, parsing, normal forms, finite automata, regular languages, pushdown automata, Turing machines.
The objective of this course is to enhance the security of software by introducing sound security principles that should be incorporated into the software development process. Students will learn a risk management framework and best practices for software security including code reviews, architectural risk analysis, penetration testing, risk-based security test, abuse cases, security requirements, and security operations. Students will also learn common flaws that lead to exploitation and be able to identify and mitigate such errors in practice. Out of class labs and exercises reinforce concepts presented in class.
Students in this course will learn about algorithms for software protection and learn how to use tools for program transformation. Specific topics include obfuscation, watermarking, tamperproofing, birthmarking, and hardware protection. Programming projects will be required in several different languages and course activities will involve preparing student-led lectures, working on programming projects, and writing reports.
This course focuses on the design, development and usage of data warehouses. Course content includes dimensional modeling, ETL processes, physical design, and analytical processing. New research areas related to data warehousing technology will also be discussed.
The objective of this course s for the student to build upon logic and architectural principles as applied to hardware designs. The key theme of the course is the security impacts of hardware design implementations.
This course focuses on the Security of Cyber-Physical Systems (CPS) and Internet of Things (IoT) that go beyond topics commonly considered in Computer and Network Security. This course aims to prepare participants for the cutting edge research undergoing in both areas. The successful participation in this course will require reading number of research papers, presenting learned material, active participation in in-class discussions, and successful accomplishment of a small research project.
Advanced selected topics in computer science. Prerequisite: Permission of the CSC Coordinator.
The students will learn knowledge service design based on Web technologies and will develop a knowledge service project during the course. The course will highlight the features of different Web Services Technologies and introduce various Scripting Languages, provide an up-to-date survey of developments in Web Services Technologies, and Knowledge Modeling.
Lexical analysis, syntactic analysis, intermediate code generation, object code generation, memory use, generators for scanners and parsers.
Data communications and computer networks. An in-depth treatment of network architectures and protocols for both WANs and LANs. Topics include: network routing and flow algorithms, internet working, and distributed systems.
Design and implementation of software for real-time computer systems. Survey of typical real time systems; techniques for code conversion, error checking, and transmission monitoring.
An in-depth study of hardware and software techniques used in computer graphics. Study of display and entry devices, including refresh, storage, and raster scan topics. Software techniques will include display files, windowing, clipping, two and three-dimensional transformation, and hidden-surface removal.
Analytic and simulation models developed using deterministic and stochastic techniques. Topics include: event-driven simulations, queueing theory, Markov processes, and dynamical systems. "Real World" project required.
Mathematical preliminaries, solving linear systems, numerical solution of ordinary and partial differential equations.
Introduction to basic concepts, implementation techniques, and philosophies of artificial intelligence and intelligent systems. Introduction to expert systems, fuzzy logic systems, neural networks, and techniques for artificial intelligence programming. The fundamentals of an AI programming language (LISP or PROLOG) will be presented. The language will then be used to solve problems in typical AI applications. Prerequisite: Graduate Professional Component Standing.
Introduction to computer game development, including a variety of related topics. The course will be driven be research/technical paper discussions, student presentations, and projects. The direction of the course will be guided to some extent by student interest.
Instruction set design, pipelining, instruction-level parallelism, memory hierarchy design, and multiprocessors.
Mathematical foundations; analytic, empirical, and qualitative evaluation techniques; dynamic programming, greedy algorithms, graph algorithms; and selected advanced topics.
A study of programming language design and specification, including the compiling process, parsing, BNF grammars, and models of semantics. Differences between interpreters, assemblers, and compilers will be studied.
Mathematical preliminaries, languages, finite automata, Turing machines, decidability, recursive function theory, complexity, tractability and NP-complete problems.
This course provides an in-depth study of data mining. Course content includes data preparation, feature selection, pattern mining, classification, clustering, and sequence mining. New research areas in data mining will also be discussed. Laboratory assignments will provide students with opportunities to interact with and develop data mining technologies.
Advanced concepts of software engineering will be discussed. Program testing techniques including: structured design and walk throughs, proving program correctness and verifiability, and system coding standardization and integration will be covered in depth. Software team formulation and management techniques will be discussed.
Bioinformatics is a highly interdisciplinary course between computer science and biology. It focuses on the analysis of proteins, genes, and genomes using computing technologies such as computer algorithms and computer databases. Students in this course will learn algorithms and databases pertaining to bioinformatics (e.g., sequence alignment, suffix tree and its biological/biomedical applications, genome alignment, biological/biomedical database search, and phylogeny reconstruction); gain knowledge and hands-on experience of bioinformatics tools; understand the interaction between computer science (in particular, semantic technologies) and modern biology within the context of data-driven knowledge discovery.
This course will further enhance the students understanding of the details of how an operating system functions. It will focus on the advanced concepts associated with distributed systems. The student will learn the underlying concepts of such systems and the algorithms needed to provide the required synchronization and communication.
This course provides a broad introduction to machine learning and statistical pattern recognition. Topics include: supervised learning (generative/discriminative learning, parametric/non-parametric learning, neural networks, and support vector machines); unsupervised learning (clustering, dimensionality reduction, kernel methods); learning theory (bias/variance tradeoffs, practical advice); reinforcement learning and adaptive control. The course will also discuss recent applications of machine learning, such as to robotic control, data mining, autonomous navigation, bioinformatics, speech recognition, and text and web data processing.
Students in this course will learn about Algorithms for software protection and learn how to use tools for program transformation. Specific topics include obfuscation, watermarking, tamperproofing, birthmarking and hardware protection. Programming projects will be required in several different languages and course activities will involve preparing student-led lectures, working on programming projects, and writing reports.
This course focuses on the design, development and usage of data warehouses. Course content includes dimensional modeling, ETL processes, physical design, and analytical processing. New research areas related to data warehousing technology will also be discussed.
The objective of this course is for the student to build upon logic and architectural principles as applies to hardware designs. The key theme of the course is the security impacts of hardware design implementations.
The objective of this course is to introduce the inherent strengths and limitations of cryptography in data security applications, focusing on the basic principles of message privacy, key negotiation, and key management. The course covers various aspects of symmetric and asymmetric ciphers and provides a broad coverage of the core areas for engineering cryptographic systems. Students will be expected to implement and analyze simple crytographic schemes and read supporting articles and papers for presentation. Prerequisite: CIS Graduate Professional Component.
The objective of this course is to provide students with the knowledge and skills to begin supporting network security within an organization. Students will gain an understanding of fundamental network security concepts and mechanisms, be able to identify security threats and vulnerabilities, and help respond to and recover from security incidents. The course will provide an understanding of how to design and build secure network algorithms and environments while gaining an in-depth knowledge of protocol security, intrusion detection, and principles of cyber defense.
This course focuses on the Security of Cyber-Physical Systems (CPS) and Internet of Things (IoT) that go beyond topics commonly considered in Computer and Network Security. This course aims to prepare participants for the cutting edge research undergoing in both areas. The successful participation in this course will require reading number of research papers, presenting learned material, active participation in in-class discussions, and successful accomplishment of a small research project.
Advanced selected topics in computer science. Prerequisite: Permission of the CSC coordinator.
Development of the project proposal for the Computer Science specialization master's project. Prerequisite: Graduate Professional Component and Permission of the Director of Graduate Studies.
This course may be repeated for a maximum of six (6) credits. A CIS project committee will provide direction during the project. Prerequisites: Approval of project proposal by student's project committee and permission of the Director of CIS Graduate Studies.
This course focuses on developing expertise and preparation for independent research in Cybersecurity through an in-depth review of the Cybersecurity literature. The student will be conversant in broad issues and trends in Cybersecurity as defined by skill sets and occupations.
This course focuses on developing expertise and preparation for independent research in big data through an in--depth review of the big data and data science literature. The student will be conversant in broad issues and trends in big data as defined by current tools and technologies.