2009-2010 Bulletin â PDF - SEAS Bulletin - Columbia University
2009-2010 Bulletin â PDF - SEAS Bulletin - Columbia University
2009-2010 Bulletin â PDF - SEAS Bulletin - Columbia University
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
118<br />
and the course may be repeated for credit. Recent<br />
offerings have included appearance models in<br />
graphics and high-quality real-time rendering.<br />
COMS E6174y Interaction design: a perceptual<br />
approach<br />
Lect: 3. 3 pts. Professor Paley.<br />
Prerequisite: CS W4170 or the instructor’s permission.<br />
Design methology for special-purpose<br />
user interfaces. Emphasis on how psychology<br />
and perception inform good design. Interviewing<br />
and task modeling, participatory design, and lowfidelity<br />
prototyping. Applications of brain research,<br />
graphic design, and art to develop custom user<br />
interfaces components, screen layouts, and interaction<br />
techniques for application-specific systems.<br />
COMS E6176x or y User interfaces for mobile<br />
and wearable computing<br />
Lect: 2. 3 pts. Professor Feiner.<br />
Prerequisite: COMS W 4170 or the instructor’s<br />
permission. Introduction to research on user interfaces<br />
for mobile and wearable computing through<br />
lectures, invited talks, student-led discussions of<br />
important papers, and programming projects. Designing<br />
and authoring for mobility and wearability. Ubiquitous/<br />
pervasive computing. Collaboration with other<br />
users. Display, interaction, and communication<br />
technologies. Sensors for tracking position, orientation,<br />
motion, environmental context, and personal<br />
context. Applications and social consequences.<br />
CSEE E6180x or y Modeling and performance<br />
Lect: 2. 3 pts. x: instructor to be announced;<br />
y: Professor Misra.<br />
Prerequisites: COMS W4118 and SIEO W4150.<br />
Introduction to queueing analysis and simulation<br />
techniques. Evaluation of time-sharing and multiprocessor<br />
systems. Topics include priority queueing,<br />
buffer storage, disk access, interference and bus contention<br />
problems, and modeling of program behaviors.<br />
COMS E6181x or y Advanced Internet services<br />
Lect: 2. 3 pts. Professor Schulzrinne.<br />
In-depth survey of protocols and algorithms needed<br />
to transport multimedia information across the<br />
Internet, including audio and video encoding, multicast,<br />
quality-of-service, voice-over-IP, streaming<br />
media, and peer-to-peer multimedia systems.<br />
Includes a semester-long programming project.<br />
COMS E6183x Advanced topics in network<br />
security<br />
Lect: 3. 3 pts. Professor Keromytis.<br />
Prerequisites: COMS W4180, W4119, and W4261<br />
recommended. Review the fundamental aspects<br />
of security, including authentication, authorization,<br />
access control, confidentiality, privacy, integrity,<br />
and availability. Review security techniques and<br />
tools, and their applications in various problem<br />
areas. Study the state of the art in research.<br />
A programming project is required.<br />
COMS E6184y Seminar on anonymity and privacy<br />
Lect: 3. 3 pts. Professor Bellovin.<br />
Prerequisite: COMS W4261 or W4180 or CSEE<br />
W4119 or the instructor’s permission. This course<br />
will cover the following topics: legal and social<br />
framework for privacy; data mining and databases;<br />
anonymous commerce and internet usage;<br />
traffic analysis; policy and national security considerations.<br />
Classes are seminars, with students<br />
presenting papers and discussing them. Seminar<br />
focus changes frequently to remain timely.<br />
COMS E6185x or y Intrusion and anomaly<br />
detection systems<br />
Lect: 2. 2 pts. Professor Stolfo<br />
Prerequisite and corequisite: COMS W4180.<br />
Network security. The state of threats against<br />
computers, and networked systems. An overview<br />
of computer security solutions and why they fail,<br />
including vulnerability assessment, firewalls,<br />
vpn’s. Provides a detailed treatment for network<br />
and host-based intrusion detection and intrusion<br />
prevention systems and the classes of attacks<br />
each covers. Considerable depth is provided on<br />
anomaly detection systems to detect new, zeroday<br />
attacks. Covers issues and problems in<br />
e-mail (spam and viruses) and insider attacks<br />
(masquerading and impersonation). Science<br />
requirement: partial fulfillment.<br />
COMS E6204x or y Topics in graph theory<br />
Lect: 2. 3 pts. Professor Gross.<br />
Prerequisite: COMS W4203 or the instructor’s permission.<br />
Content varies from year to year. This course<br />
may be repeated for credit. Concentration on some<br />
aspect of graph theory, such as topological graph<br />
theory, algebraic graph theory, enumerative graph<br />
theory, graphical optimization problems, or matroids.<br />
COMS E6206x or y Topics in combinatorial theory<br />
Lect: 2. 3 pts. Professor Gross.<br />
Prerequisite: COMS W4203 or W4205, or the<br />
instructor’s permission. Concentration on some<br />
aspect of combinatorial theory. Content varies from<br />
year to year. This course may be repeated for credit.<br />
COMS E6232x or y Analysis of algorithms, II<br />
Lect: 2. 3 pts. Instructor to be announced.<br />
Prerequisite: COMS W4231. Continuation of<br />
COMS W4231.<br />
COMS E6253y Advanced topics in computational<br />
learning theory<br />
Lect: 3. 3 pts. Professor Servedio.<br />
Prerequisites: COMS W4231 or equivalent;<br />
COMS W4252 or W4236 helpful but not required.<br />
In-depth study of inherent abilities and limitations<br />
of computationally efficient learning algorithms.<br />
Algorithms for learning rich Boolean function<br />
classes in online, Probably Approximately Correct,<br />
and exact learning models. Connections with<br />
computational complexity theory emphasized.<br />
Substantial course project or term paper required.<br />
COMS E6261x or y Advanced cryptography<br />
Lect: 3. 3 pts. Professor Malkin.<br />
Prerequisite: COMS W4261. A study of advanced<br />
cryptographic research topics, such as secure<br />
computation, zero knowledge, privacy, anonymity,<br />
cryptographic protocols. Concentration on theoretical<br />
foundations, rigorous approach, and provable<br />
security. Contents varies between offerings.<br />
May be repeated for credit.<br />
COMS E6291x or y Theoretical topics in<br />
computer science<br />
Lect: 3. 3 pts. Instructor to be announced.<br />
Prerequisite: The instructor’s permission.<br />
Concentration on some theoretical aspect of computer<br />
science. Content varies from year to year.<br />
May be repeated for credit.<br />
COMS E6732x or y Computational imaging<br />
Lect: 3. 3 pts. Professor Nayar.<br />
Prerequisite: COMS W4731 or the instructor’s<br />
permission. Computational imaging uses a combination<br />
of novel imaging optics and a computational<br />
module to produce new forms of visual information.<br />
Survey of the state of the art in computational<br />
imaging. Review of recent papers on omni directional<br />
and panoramic imaging, catadioptric imaging,<br />
high dynamic range imaging, mosaicing and<br />
superresolution. Classes are seminars with the<br />
instructor, guest speakers, and students presenting<br />
papers and discussing them.<br />
COMS E6733x or y 3-D photography<br />
Lect: 2. 3pts. Professor Allen.<br />
Prerequisite: Experience with at least one of the<br />
following topics: computer graphics, computer<br />
vision, pixel processing, robotics, or computeraided<br />
design, or the instructor’s permission.<br />
Programming proficiency in C, C++, or Java. 3-D<br />
photography—the process of automatically creating<br />
3-D, texture-mapped models of objects in<br />
detail. Applications include robotics, medicine,<br />
graphics, virtual reality, entertainment, and digital<br />
movies, etc. Topics include 3-D data acquisition<br />
devices, 3-D modeling systems, and algorithms<br />
to acquire, create, augment, manipulate, render,<br />
animate, and physically build such models. The<br />
course is divided into three parts. The first third is<br />
devoted to lectures introducing the concept of 3-D<br />
photography and advanced modeling. The second<br />
part will be student presentations of related papers<br />
in the field. The third part will be a series of group<br />
projects centered around using 3-D photography<br />
to model objects (buildings, rooms, people, etc.).<br />
CSEE E6734y Computational photography<br />
Lect: 3. 3 pts. Professor Belhumeur.<br />
Prerequisite: COMS W4160, W4731, or a working<br />
knowledge of photography are recommended.<br />
Students should have knowledge in any of three<br />
core areas: computer vision, computer graphics, or<br />
photography. Computational techniques are used<br />
to produce a new level of images and visual representations.<br />
Topics include HDR imaging, feature<br />
matching using RANSAC, image mosaics, imagebased<br />
rendering, motion magnification, camera<br />
lens arrays, programmable lighting, face detection,<br />
single- and multiview geometry, and more.<br />
COMS E6735y Visual databases<br />
Lect: 3. 3 pts. Professor Kender.<br />
Prerequisites: COMS W3133, W3134, or W3137<br />
required; COMS W4731 or COMS W4735 helpful<br />
but not required. Contact instructor if uncertain.<br />
<strong>SEAS</strong> <strong>2009</strong>–<strong>2010</strong>