04.01.2015 Views

2009-2010 Bulletin – PDF - SEAS Bulletin - Columbia University

2009-2010 Bulletin – PDF - SEAS Bulletin - Columbia University

2009-2010 Bulletin – PDF - SEAS Bulletin - Columbia University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

118<br />

and the course may be repeated for credit. Recent<br />

offerings have included appearance models in<br />

graphics and high-quality real-time rendering.<br />

COMS E6174y Interaction design: a perceptual<br />

approach<br />

Lect: 3. 3 pts. Professor Paley.<br />

Prerequisite: CS W4170 or the instructor’s permission.<br />

Design methology for special-purpose<br />

user interfaces. Emphasis on how psychology<br />

and perception inform good design. Interviewing<br />

and task modeling, participatory design, and lowfidelity<br />

prototyping. Applications of brain research,<br />

graphic design, and art to develop custom user<br />

interfaces components, screen layouts, and interaction<br />

techniques for application-specific systems.<br />

COMS E6176x or y User interfaces for mobile<br />

and wearable computing<br />

Lect: 2. 3 pts. Professor Feiner.<br />

Prerequisite: COMS W 4170 or the instructor’s<br />

permission. Introduction to research on user interfaces<br />

for mobile and wearable computing through<br />

lectures, invited talks, student-led discussions of<br />

important papers, and programming projects. Designing<br />

and authoring for mobility and wearability. Ubiquitous/<br />

pervasive computing. Collaboration with other<br />

users. Display, interaction, and communication<br />

technologies. Sensors for tracking position, orientation,<br />

motion, environmental context, and personal<br />

context. Applications and social consequences.<br />

CSEE E6180x or y Modeling and performance<br />

Lect: 2. 3 pts. x: instructor to be announced;<br />

y: Professor Misra.<br />

Prerequisites: COMS W4118 and SIEO W4150.<br />

Introduction to queueing analysis and simulation<br />

techniques. Evaluation of time-sharing and multiprocessor<br />

systems. Topics include priority queueing,<br />

buffer storage, disk access, interference and bus contention<br />

problems, and modeling of program behaviors.<br />

COMS E6181x or y Advanced Internet services<br />

Lect: 2. 3 pts. Professor Schulzrinne.<br />

In-depth survey of protocols and algorithms needed<br />

to transport multimedia information across the<br />

Internet, including audio and video encoding, multicast,<br />

quality-of-service, voice-over-IP, streaming<br />

media, and peer-to-peer multimedia systems.<br />

Includes a semester-long programming project.<br />

COMS E6183x Advanced topics in network<br />

security<br />

Lect: 3. 3 pts. Professor Keromytis.<br />

Prerequisites: COMS W4180, W4119, and W4261<br />

recommended. Review the fundamental aspects<br />

of security, including authentication, authorization,<br />

access control, confidentiality, privacy, integrity,<br />

and availability. Review security techniques and<br />

tools, and their applications in various problem<br />

areas. Study the state of the art in research.<br />

A programming project is required.<br />

COMS E6184y Seminar on anonymity and privacy<br />

Lect: 3. 3 pts. Professor Bellovin.<br />

Prerequisite: COMS W4261 or W4180 or CSEE<br />

W4119 or the instructor’s permission. This course<br />

will cover the following topics: legal and social<br />

framework for privacy; data mining and databases;<br />

anonymous commerce and internet usage;<br />

traffic analysis; policy and national security considerations.<br />

Classes are seminars, with students<br />

presenting papers and discussing them. Seminar<br />

focus changes frequently to remain timely.<br />

COMS E6185x or y Intrusion and anomaly<br />

detection systems<br />

Lect: 2. 2 pts. Professor Stolfo<br />

Prerequisite and corequisite: COMS W4180.<br />

Network security. The state of threats against<br />

computers, and networked systems. An overview<br />

of computer security solutions and why they fail,<br />

including vulnerability assessment, firewalls,<br />

vpn’s. Provides a detailed treatment for network<br />

and host-based intrusion detection and intrusion<br />

prevention systems and the classes of attacks<br />

each covers. Considerable depth is provided on<br />

anomaly detection systems to detect new, zeroday<br />

attacks. Covers issues and problems in<br />

e-mail (spam and viruses) and insider attacks<br />

(masquerading and impersonation). Science<br />

requirement: partial fulfillment.<br />

COMS E6204x or y Topics in graph theory<br />

Lect: 2. 3 pts. Professor Gross.<br />

Prerequisite: COMS W4203 or the instructor’s permission.<br />

Content varies from year to year. This course<br />

may be repeated for credit. Concentration on some<br />

aspect of graph theory, such as topological graph<br />

theory, algebraic graph theory, enumerative graph<br />

theory, graphical optimization problems, or matroids.<br />

COMS E6206x or y Topics in combinatorial theory<br />

Lect: 2. 3 pts. Professor Gross.<br />

Prerequisite: COMS W4203 or W4205, or the<br />

instructor’s permission. Concentration on some<br />

aspect of combinatorial theory. Content varies from<br />

year to year. This course may be repeated for credit.<br />

COMS E6232x or y Analysis of algorithms, II<br />

Lect: 2. 3 pts. Instructor to be announced.<br />

Prerequisite: COMS W4231. Continuation of<br />

COMS W4231.<br />

COMS E6253y Advanced topics in computational<br />

learning theory<br />

Lect: 3. 3 pts. Professor Servedio.<br />

Prerequisites: COMS W4231 or equivalent;<br />

COMS W4252 or W4236 helpful but not required.<br />

In-depth study of inherent abilities and limitations<br />

of computationally efficient learning algorithms.<br />

Algorithms for learning rich Boolean function<br />

classes in online, Probably Approximately Correct,<br />

and exact learning models. Connections with<br />

computational complexity theory emphasized.<br />

Substantial course project or term paper required.<br />

COMS E6261x or y Advanced cryptography<br />

Lect: 3. 3 pts. Professor Malkin.<br />

Prerequisite: COMS W4261. A study of advanced<br />

cryptographic research topics, such as secure<br />

computation, zero knowledge, privacy, anonymity,<br />

cryptographic protocols. Concentration on theoretical<br />

foundations, rigorous approach, and provable<br />

security. Contents varies between offerings.<br />

May be repeated for credit.<br />

COMS E6291x or y Theoretical topics in<br />

computer science<br />

Lect: 3. 3 pts. Instructor to be announced.<br />

Prerequisite: The instructor’s permission.<br />

Concentration on some theoretical aspect of computer<br />

science. Content varies from year to year.<br />

May be repeated for credit.<br />

COMS E6732x or y Computational imaging<br />

Lect: 3. 3 pts. Professor Nayar.<br />

Prerequisite: COMS W4731 or the instructor’s<br />

permission. Computational imaging uses a combination<br />

of novel imaging optics and a computational<br />

module to produce new forms of visual information.<br />

Survey of the state of the art in computational<br />

imaging. Review of recent papers on omni directional<br />

and panoramic imaging, catadioptric imaging,<br />

high dynamic range imaging, mosaicing and<br />

superresolution. Classes are seminars with the<br />

instructor, guest speakers, and students presenting<br />

papers and discussing them.<br />

COMS E6733x or y 3-D photography<br />

Lect: 2. 3pts. Professor Allen.<br />

Prerequisite: Experience with at least one of the<br />

following topics: computer graphics, computer<br />

vision, pixel processing, robotics, or computeraided<br />

design, or the instructor’s permission.<br />

Programming proficiency in C, C++, or Java. 3-D<br />

photography—the process of automatically creating<br />

3-D, texture-mapped models of objects in<br />

detail. Applications include robotics, medicine,<br />

graphics, virtual reality, entertainment, and digital<br />

movies, etc. Topics include 3-D data acquisition<br />

devices, 3-D modeling systems, and algorithms<br />

to acquire, create, augment, manipulate, render,<br />

animate, and physically build such models. The<br />

course is divided into three parts. The first third is<br />

devoted to lectures introducing the concept of 3-D<br />

photography and advanced modeling. The second<br />

part will be student presentations of related papers<br />

in the field. The third part will be a series of group<br />

projects centered around using 3-D photography<br />

to model objects (buildings, rooms, people, etc.).<br />

CSEE E6734y Computational photography<br />

Lect: 3. 3 pts. Professor Belhumeur.<br />

Prerequisite: COMS W4160, W4731, or a working<br />

knowledge of photography are recommended.<br />

Students should have knowledge in any of three<br />

core areas: computer vision, computer graphics, or<br />

photography. Computational techniques are used<br />

to produce a new level of images and visual representations.<br />

Topics include HDR imaging, feature<br />

matching using RANSAC, image mosaics, imagebased<br />

rendering, motion magnification, camera<br />

lens arrays, programmable lighting, face detection,<br />

single- and multiview geometry, and more.<br />

COMS E6735y Visual databases<br />

Lect: 3. 3 pts. Professor Kender.<br />

Prerequisites: COMS W3133, W3134, or W3137<br />

required; COMS W4731 or COMS W4735 helpful<br />

but not required. Contact instructor if uncertain.<br />

<strong>SEAS</strong> <strong>2009</strong>–<strong>2010</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!