|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
Codes with algebraic structure for error control are examined. Block codes including Hamming codes and Reed-Muller codes, BCH codes, and other cyclic codes with algebraic structure and other cyclic codes and their implementation are treated. Other topics may include: convolutional codes, effciency considerations, and Shannon's fundamental theorem of information theory.
-
3.00 Credits
Prerequisite: COMP 272. Students learn real-world theory and techniques organizations use to create high-quality software on time. Students work on a large programming team to create plans, review progress, measure quality, and make written and oral analyses of their project. Outcome: Students will experience process based development, understand the dynamics of a professional software organization, and develop skills for implementing software with others.
-
3.00 Credits
Prerequisite: COMP 363 or MATH 313 or 322. This course introduces the formal foundations of cryptography and also investigates some well-known standards and protocols, including private and public key cryptosystems, hashing, digital signatures, RSA, DSS, PGP, and related topics. Outcome: Students will gain an understanding of cryptosystems widely used to protect data security on the internet, and be able to apply the ideas in new situations as needed.
-
3.00 Credits
No course description available.
-
3.00 Credits
Prerequisite: Comp 313 As embedded and networked systems are becoming ever more ubiquitous, we depend increasingly on the correctness of the software that controls such systems. This course studies the formal specification, verification, and synthesis of software. Outcomes: An understanding of the role of formal methods in the construction of software systems; proficiency in representative methods and tools, such as UML and ESC.
-
3.00 Credits
Pre-requisite: COMP 313. This course is concerned with XML and its various component frameworks. The core frameworks to be covered include Document Object Model (DOM), Simple API for XML processing (SAX), the XML Path language (XPath), and XSLT. Outcome: After taking this course, students will have working knowledge of XML and its connections to other ideas such as HTML, object models, relational databases, and network services.
-
3.00 Credits
Prerequisite: Comp 313. Many real-world software systems rely on concurrency for performance and modularity. This programming-intensive course covers analysis, design, implementation, and testing of concurrent software systems. Outcome: An in-depth understanding of event-based and thread-based views of concurrency; the ability to develop concurrent software components using suitable languages, frameworks, and design patterns; familiarity with object-oriented modeling and development tools and test-driven development.
-
3.00 Credits
Prerequisite: COMP 313 Server-based web applications and services have become part of everyday life. This programming-intensive course covers analysis, design, implementation, and testing of multi-tiered server-based software systems along with typical tier-specific technologies. Outcome: An understanding of software architecture and integration in the development of multi-tiered server-based software; familiarity with object-oriented modeling and development tools and test-driven development.
-
3.00 Credits
Prerequisite: Comp 313. This course covers topics in modern distributed systems. This course places special emphasis on scalability (performance), reliability/fault tolerance, and security. Outcome: After taking this course, students should understand the essential ingredients of distributed systems and how to build distributed systems that are resilient to transient network failures and other potential anomalies.
-
3.00 Credits
The course introduces the fundamentals of computer/network/internet forensics, analysis and investigations. Outcome: The student will learn computer software and hardware relevant for analysis, and investigative and evidence-gathering protocols.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Cookies Policy |
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2025 AcademyOne, Inc.
|
|
|