16.01.2015 Views

CS2013-final-report

CS2013-final-report

CS2013-final-report

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Notation:<br />

< 25% of KU covered #<br />

25-75% of KU covered #<br />

> 75% of KU covered #<br />

103: Math. Found.<br />

106A: Prog. Meth.<br />

106B: Prog. Abst.<br />

107: Comp. Org.<br />

109: Probability<br />

110: Comp. Sys.<br />

161: Algorithms<br />

140: Oper. Sys.<br />

144: Networking<br />

145: Databases<br />

EE108B: Dig. Des.<br />

108: Obj. Orient.<br />

147: Intro. HCI<br />

155: Security<br />

194: SW Project<br />

181: Comp. Ethics<br />

% Tier 1<br />

% Tier 2<br />

Fund. Concepts in Security 1<br />

Principles of Secure Design 2<br />

IAS<br />

Defensive Programming 2<br />

Threats and Attacks 1<br />

100 100<br />

Network Security 2<br />

Cryptography 1<br />

IM<br />

Info. Management Concepts 2.4<br />

Database Systems 3<br />

Data Modeling 4<br />

100 94<br />

Fundamental Issues 0.7<br />

IS<br />

Basic Search Strategies 0.5 1<br />

Basic Knowledge Rep. 0.8 0.8<br />

n/a 53<br />

Basic Machine Learning 1.6<br />

Introduction 1.5<br />

Networked Applications 1.5<br />

NC<br />

Reliable Data Delivery 2<br />

Routing and Forwarding 1.5<br />

Local Area Networks 1.5<br />

100 100<br />

Resource Allocation 1<br />

Mobility 1<br />

- 496 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!