Page: 1234567

Spring 2013: High Volume Automated Testing

8:50 AM on November 2, 2012


Many of the most maddening software errors cause intermittent failures. Do something—the program fails. Do what you think is the same thing again—no failure. These are hard to diagnose and almost impossible to provide customer support for, but they can be serious irritants or critically dangerous. For example, at least some of the flaws underlying



Spring 2013: CSE 4510/5400-E6: A Survey of Interdisciplinary CS ("CS in Action")

10:38 AM on October 31, 2012


This course provides a survey of how CS can help solve problems in other disciplines, such as Biology and Sociology. For each discipline, we first discuss a sample problem(s) and the associated background knowledge to understand the problem(s). We then discuss possible algorithmic solutions and compare them. Faculty members from other disciplines m



Spring 2013: CYB 5675: Data Mining for Cybersecurity

3:40 PM on October 25, 2012


This course explores data mining and machine learning in cybersecurity environments. The student will learn a variety of data mining and machine learning algorithms and their utility in cybersecurity tasks, such as signature, anomaly, scan, and intrusion detection. Network traffic profiling and privacy-preserving data mining will also be covered.



Cem Kaner - Software Test Luminary Award Winner

12:58 PM on October 17, 2012


This is an award voted on by practitioners (worldwide), given to a person who they think has made a strong, long-term impact on the field. Dr. Cem Kaner is the third award winner.

The two before him were

•Gerald Weinberg (you've probably studied his work on software quality, software measurement and software requirements) and

•Ross Collard



Spring 2013: CYB 5272: Computer and Information Security

3:26 PM on October 16, 2012


This course provides an introduction to computer and information security with an emphasis on a system-wide view of security issues. Students will review common threats to applications, operating systems, networks and databases and will be introduced to techniques for mitigating those threats. Other topics include privacy and information



Spring 2013: CSE5810 - Scientific Computing

7:43 AM on September 18, 2012


Modern science and engineering practices depend on computation. In a spiral fashion, the availability of faster computers is fueling a data explosion in all branches of these disciplines, and in turn demanding better computing resources. Developing efficient algorithms is a part of the equation. This course covers such mathematical algorithms. The



Fall 2012: CSE4510/5400: Social Network Analysis

3:48 PM on August 16, 2012


The course is very hands-on. Students will be required to work with a Social Network Dataset.
The coursework consists of: analysis assignments on specific social networks, presentations in class of your results,
research paper critiques.

The course is a good opportunity to students to gain some experience on research and writing about resear



Fall 2012: CYB 5665 Secure Web Services

10:14 AM on August 15, 2012


Machine-to-machine communications are essential to many enterprises. Web services enable automated, interoperable communications and function discovery. Semantic Web services allow machines to interpret content. This course explores these technologies through practical examples with an emphasis on security considerations. The course counts as a Com



Fall 2012: Graduate Courses in Human Centered Design

10:13 AM on August 15, 2012


There are 3 courses being offered this fall in Human Centered Design for Graduate students:

HCD6820/CSE5800 Advanced Interaction Media - provides advanced interaction media concepts, methods, and tools that support human-centered design of life-critical systems.

HCD6850/SWE5900 Organization Design and Management - the history and current thin



Fall 2012: CSE 5800-E6 Learning/Mining and the Internet

9:17 AM on August 14, 2012


This course explores machine learning and data mining algorithms with applications to the Internet, particularly in areas such as the web and security. One research paper is discussed in each class. Each student will implement existing algorithms in the research papers. The term project is a mini-research project that tries to improve an ex



Page: 1234567