CPSC 6107. Survey of Modeling and Simulation. (3-0-3) Prerequisite: Courses in Calculus and Statistics. This course introduces the discipline of Modeling and Simulation by surveying its paradigms and methodologies as well as important and related disciplines. The Monte Carlo, continuous, and discrete event simulations are introduced as a foundation. Topics such as humans in simulations, verification and validation, distributed simulations, and interoperability are among the methodologies. Probability and Statistics, Modeling and Visualization are also introduced with particular attention to their importance as related to Modeling and Simulation.
CPSC 6109. Advanced Algorithms (3-0-3) The need for efficient algorithms arises in nearly every area of computer science. This course covers the modern theory of algorithms, focusing on the themes of efficient algorithms and intractable problems. The course introduces many of the techniques that apply broadly in the design of efficient algorithms, and study their application in a wide range of application domains and computational models. Topics include Basic Data Structuring Problems, Recursion, Computational Complexity, Graph Algorithms, Greedy Algorithms, Dynamic Data Structures, Hashing, Approximation Algorithms, Linear programming, Parallel Algorithms and Novel Approaches to NP-Complete Problems. The course requires familiarity with Java Programming Language.
CPSC 6119. Object-Oriented Development (3-0-3) This course teaches object-oriented developing techniques and how to create advanced applications using classes, components, and objects. Fundamentals of developing client applications that include database access using server-level components. Topics include creating and managing objects, creating data services, testing, deploying and maintaining a component based solution.
CPSC 6126. Information Systems Assurance (3-0-3) Prerequisite: CPSC 5157 or equivalent. This course focuses on the protection of information systems against unauthorized access to or modification of information whether in storage, processing or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats. This course creates sensitivity to the threats and vulnerabilities of information systems, recognition of the need and means to protect data and information, and builds a working knowledge of principles and practices in information security.