16.01.2015 Views

CS2013-final-report

CS2013-final-report

CS2013-final-report

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Notation:<br />

< 25% of KU covered #<br />

25-75% of KU covered #<br />

> 75% of KU covered #<br />

151: Func. Prob.<br />

161: Imp. + DS<br />

207: OO + Alg.<br />

208: Discrete<br />

211: Architecture<br />

213: OS<br />

301: Algorithms<br />

341: Theory<br />

312: Prog. Lang.<br />

321: Prin. Soft. Dev.<br />

322: Comm. Proj.<br />

264: Security<br />

364: Networks<br />

% Tier 1<br />

% Tier 2<br />

Fund. Conc. in Security ½ ½ 1<br />

Princ. of Secure Design<br />

2½<br />

IAS<br />

Defensive Programming ½ 1 ½ 1½<br />

Threats and Attacks ½ 1<br />

Network Security ½ ½ ½<br />

Cryptography ½ 1<br />

Info. Manag. Concepts 1 ½ ½ ½<br />

100 70<br />

IM<br />

Database Systems<br />

2½<br />

88 62<br />

IS<br />

Data Modeling ½ 1½ ½<br />

Fundamental Issues<br />

Basic Search Strategies 1½ ½<br />

Basic Knowledge Rep. 1<br />

Basic Machine Learning<br />

n/a 25<br />

Introduction<br />

Networked Applications<br />

1½<br />

1½<br />

Reliable Data Delivery 2<br />

NC<br />

Routing and Forwarding<br />

1½<br />

100 100<br />

Local Area Networks<br />

1½<br />

Resource Allocation 1<br />

Mobility 1<br />

- 486 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!