Spring 2013: Adv Topics in CS: Steganography and Applications CSE 5800-01
Digital content surrounds us, providing opportunity to store or hide information within it. Becoming aware of these opportunities can help make applications more flexible, as well as help secure content, particularly multimedia. This course explores various ways in which information can be hidden, including encryption, watermarking, and steganog...
Spring 2013: Robotics and AI CSE 4510-E14/5694
Robotics is where the computer starts to act not only on the human mind, but also on the physical world. In this course you will be introduced to the concept of robot, the basic components of robotics, and some algorithms used in robotics. We will concentrate on the Artificial Intelligence side of robotics, with modelling and planning algorithms. W
Spring 2013: CYB 5660 Secure Software Development
Software vulnerabilities are far too common, but a security-oriented development process can help. This course explores the components of secure software development, including the characteristics of resilient software, best practices for development, and other topics spanning the software lifecycle. This course is acceptable as an Advanced Electiv
BioComplex Lab: Journal Paper Accepted
Congratulations to Srividhya Venugopal (PhD student) and Evan Stoner (BSc student) for for having their paper entitled "Understanding Organ Transplantation in the USA using Geographical Social Networks" has been accepted for publication at the Journal of Social Network Analysis and Mining (SNAM) published by Springer Verlag.
Spring 2013: High Volume Automated Testing
Many of the most maddening software errors cause intermittent failures. Do something—the program fails. Do what you think is the same thing again—no failure. These are hard to diagnose and almost impossible to provide customer support for, but they can be serious irritants or critically dangerous. For example, at least some of the flaws underlying
Spring 2013: CSE 4510/5400-E6: A Survey of Interdisciplinary CS ("CS in Action")
This course provides a survey of how CS can help solve problems in other disciplines, such as Biology and Sociology. For each discipline, we first discuss a sample problem(s) and the associated background knowledge to understand the problem(s). We then discuss possible algorithmic solutions and compare them. Faculty members from other disciplines m
Spring 2013: CYB 5675: Data Mining for Cybersecurity
This course explores data mining and machine learning in cybersecurity environments. The student will learn a variety of data mining and machine learning algorithms and their utility in cybersecurity tasks, such as signature, anomaly, scan, and intrusion detection. Network traffic profiling and privacy-preserving data mining will also be covered.
Cem Kaner - Software Test Luminary Award Winner
This is an award voted on by practitioners (worldwide), given to a person who they think has made a strong, long-term impact on the field. Dr. Cem Kaner is the third award winner.
The two before him were
•Gerald Weinberg (you've probably studied his work on software quality, software measurement and software requirements) and
Spring 2013: CYB 5272: Computer and Information Security
This course provides an introduction to computer and information security with an emphasis on a system-wide view of security issues. Students will review common threats to applications, operating systems, networks and databases and will be introduced to techniques for mitigating those threats. Other topics include privacy and information
Spring 2013: CSE5810 - Scientific Computing
Modern science and engineering practices depend on computation. In a spiral fashion, the availability of faster computers is fueling a data explosion in all branches of these disciplines, and in turn demanding better computing resources. Developing efficient algorithms is a part of the equation. This course covers such mathematical algorithms. The