03.09.2014 Views

Graduate Catalog 2011-2013 - SUNY Institute of Technology

Graduate Catalog 2011-2013 - SUNY Institute of Technology

Graduate Catalog 2011-2013 - SUNY Institute of Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Master <strong>of</strong> Science in Computer and Information Science<br />

• Students may transfer up to six credit hours, if applicable,<br />

from another graduate program.<br />

• Students may repeat at most two courses in which a “C”<br />

grade or less was received.<br />

• Students must maintain continuous registration, equal<br />

to or greater than one credit while working on their final<br />

thesis or project. MS Computer Science students completing<br />

a thesis can do this by registering for CS 599 - Thesis for one<br />

credit. Students completing a project can do this by registering<br />

for CMT 600 - Continuous Registration. This may be taken<br />

up to six semesters at which time it is expected that all<br />

program requirements will have been met.<br />

Faculty<br />

Bruno Andriamanalimanana<br />

Associate Pr<strong>of</strong>essor<br />

Ph.D. Lehigh University<br />

Combinatorics, coding theory, cryptography<br />

Roger Cavallo<br />

Pr<strong>of</strong>essor<br />

Ph.D. State University <strong>of</strong> New York at Binghamton<br />

Ernest W. Goodell Research and Creativity Award, 1990<br />

Systems theory, conceptual modeling, probabilistic database theory<br />

John A. Marsh<br />

Associate Pr<strong>of</strong>essor and Department Chair<br />

Ph.D. Carnegie Mellon University.<br />

Computer networks, wireless network security, complexity theory,<br />

integrated optics<br />

Rosemary Mullick<br />

Pr<strong>of</strong>essor<br />

Ph.D. Wayne State University<br />

Operating systems, computer networks, artificial intelligence,<br />

instructional computing<br />

Jorge Novillo<br />

Pr<strong>of</strong>essor<br />

Ph.D. Lehigh University<br />

Combinatorics, data security, bio-computing, artificial intelligence<br />

Michael Pittarelli<br />

Pr<strong>of</strong>essor<br />

Ph.D. State University <strong>of</strong> New York at Binghamton<br />

Ernest W. Goodell Research and Creativity Award, 1992<br />

Systems science, artificial intelligence, combinatorial search,<br />

database theory<br />

Ronald Sarner<br />

Distinguished Service Pr<strong>of</strong>essor<br />

Ph.D. State University <strong>of</strong> New York at Binghamton.<br />

Chancellor’s Award for Excellence in Teaching, 1992<br />

Data modeling, data mining, instructional computing<br />

Saumendra Sengupta<br />

Pr<strong>of</strong>essor<br />

Ph.D. University <strong>of</strong> Waterloo<br />

Systems modeling, computer networks, system forensics, distributed<br />

systems, operating systems<br />

Scott Spetka<br />

Pr<strong>of</strong>essor<br />

Ph.D. UCLA<br />

Distributed databases, operating systems, system administration<br />

Geethapriya Thamilarasu<br />

Assistant Pr<strong>of</strong>essor<br />

Ph.D. State University <strong>of</strong> New York at Buffalo<br />

Networking, wireless security, secure key distribution and<br />

management in wireless sensor networks, remote patient monitoring<br />

using body area sensor networks, security in vehicular networks<br />

Xiaojiang (Henry) Wu<br />

Assistant Pr<strong>of</strong>essor<br />

Ph.D. Oklahoma State University<br />

Video and multimedia networking, networking protocols, network<br />

security; communications network architecture, embedded system<br />

design, fuzzy logic application<br />

38 <strong>Graduate</strong> <strong>Catalog</strong> <strong>2011</strong>-<strong>2013</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!