Click here to load reader

cs.njust.edu.cncs.njust.edu.cn/.../8dd84693-2382-4e08-ba0a-50e420d0…  · Web view21 UMTS协议体系结构( 2 ... a brief guide to the emerging world of ... and laboratory exercises

Embed Size (px)

Citation preview

B106B001

Multi-scale Geometrical Analysis and Sparse Representation

1 48 3

2

,

ridgelet Curvelet,

*#

1 (3)

1.1

1.2

1.3

1.4

2 (8)

* 2.1

* 2.2

* 2.3

* 2.4

# 2.5

2.6

3 (8)

* 3.1

3.2

# 3.3

3.4

* 3.5

3.6

4 (6)

* 4.1

* 4.2

4.3

4.4

5 (6)

* 5.1

# 5.2

5.3

5.4

6 (4)

* 6.1

# 6.2

6.3

7 8

7.1

7.2

7.3

7.4

7.5 -

7.6

8 (5)

8.1

8.2

8.3

8.4

Jean-Luc Stark, . , , 2014.

CodeB106B002

Advanced System Software Theory and Technologies

1 Class Hours () 32 Credits 2

2Majors Concerned ()

Computer Science and Technology, Software Engineering

3Preparatory Courses

Introduction of Compilers, Software Engineering, Operating System

4Teaching Purpose ()

The goal of this course is to (1) design and implement of various types of system software, and (2) apply program analyses and optimizations in compiler and evaluate them. Students will learn about compilation techniques for obtaining high performance on modern computer architectures. The relationship between machine architecture and systems software will be our focus. Shared/distributed memory and client/server systems as well as several important analysis and optimization techniques will be presented in class lectures.

5Teaching Method()

In-class lecture, assignment and lab

6Main Contents and Requirement for Students ()

Topics include: CISC and RISC architectures, machine-dependent and machine-independent assembler, loaders and linkers, compiler-related techniques (control-flow analysis, data-flow analysis, program optimization, code generation, optimizations for OOL, JIT, garbage collection, data dependence analysis, type systems and so on), operating systems features, software engineering related system design.

Students are required to implement a compiler with optimization capabilities in the COOL framework.

7Referencing Textbooks and Required References for Students ()

Textbooks

Alfred V.Aho, Monica S.Lam, Ravi Sethi, and Jeffrey D.Ullman. Compilers: Principles, Techniques, and Tools, second edition (photocopy edition), Beijing: China Machine Press, 2011.

References

Keith D Cooper and Linda Torczon, Engineering a Compiler, Second Edition, Morgan Kaufmann, 2011.

Leland L. Beck. System Software: An Introduction to Systems Programming (3rd Edition), Addison-Wesley, 1996.

Required References for Students

Efficiently computing static single assignment form and the control dependence graph

http://dl.acm.org/citation.cfm?id=115320

Load-reuse analysis: design and implementation

http://www.cs.cmu.edu/afs/cs/academic/class/15745-s06/web/handouts/bodik-pldi99.pdf

Efficient representations and abstractions for quantifying and exploiting data reference locality

http://www.cs.cmu.edu/afs/cs/academic/class/15745-s06/web/handouts/chilimbi-pldi01.pdf

Optimal spilling for CISC machines with few registers

http://www.cs.cmu.edu/afs/cs/academic/class/15745-s06/web/handouts/appel-pldi00.pdf

A Graph-Free Approach to Data-Flow Analysis

http://dl.acm.org/citation.cfm?id=727795

Efcient Flow-Sensitive Interprocedural Data-Flow Analysis in the Presence of Pointers

http://www.cs.utexas.edu/users/lin/papers/cc06.pdf

A practical framework for demand-driven interprocedural data flow analysis

http://dl.acm.org/citation.cfm?id=267959.269970&coll=DL&dl=GUIDE&CFID=422404330&CFTOKEN=37999885

Iterative Data-ow Analysis, Revisited

http://pdf.aminer.org/000/279/837/iteration_revisited_examples_from_a_general_theory.pdf

Ownership Types for Safe Programming:Preventing Data Races and Deadlocks

http://web.eecs.umich.edu/~bchandra/publications/oopsla02.pdf

Ownership, encapsulation and the disjointness of type and effect

http://dl.acm.org/citation.cfm?id=582447

Generic ownership for generic Java

http://dl.acm.org/citation.cfm?id=1167473.1167500&coll=DL&dl=GUIDE&CFID=310024962&CFTOKEN=41327017

Ownership and immutability in generic Java

http://dl.acm.org/citation.cfm?id=1869459.1869509&coll=DL&dl=GUIDE&CFID=310024962&CFTOKEN=41327017

Refactoring android Java code for on-demand computation offloading

http://dl.acm.org/citation.cfm?doid=2384616.2384634

8Author () Zhao, Yang

9Teacher () Zhao, Yang

B106B003

Advanced System Software Theory and Technologies

32 2

:

/

1

1.1

1.2 CISC

1.3 RISC

2

2.1

2.2

2.3

2.4

3

3.1

3.2

3.3

3.4

3.5

3.6

3.7

3.8 COOL

4

4.1

4.2

4.3

4.4

5

6

COOLCOOL

Alfred V.Aho, Monica S.Lam, Ravi Sethi, and Jeffrey D.Ullman. Compilers: Principles, Techniques, and Tools, 2, , 2011.

Keith D Cooper and Linda Torczon, Engineering a Compiler, Second Edition, Morgan Kaufmann, 2011.

Leland L. Beck. System Software: An Introduction to Systems Programming (3rd Edition), Addison-Wesley, 1996.

Efficiently computing static single assignment form and the control dependence graph

http://dl.acm.org/citation.cfm?id=115320

Load-reuse analysis: design and implementation

http://www.cs.cmu.edu/afs/cs/academic/class/15745-s06/web/handouts/bodik-pldi99.pdf

Efficient representations and abstractions for quantifying and exploiting data reference locality

http://www.cs.cmu.edu/afs/cs/academic/class/15745-s06/web/handouts/chilimbi-pldi01.pdf

Optimal spilling for CISC machines with few registers

http://www.cs.cmu.edu/afs/cs/academic/class/15745-s06/web/handouts/appel-pldi00.pdf

A Graph-Free Approach to Data-Flow Analysis

http://dl.acm.org/citation.cfm?id=727795

Efcient Flow-Sensitive Interprocedural Data-Flow Analysis in the Presence of Pointers

http://www.cs.utexas.edu/users/lin/papers/cc06.pdf

A practical framework for demand-driven interprocedural data flow analysis

http://dl.acm.org/citation.cfm?id=267959.269970&coll=DL&dl=GUIDE&CFID=422404330&CFTOKEN=37999885

Iterative Data-ow Analysis, Revisited

http://pdf.aminer.org/000/279/837/iteration_revisited_examples_from_a_general_theory.pdf

Ownership Types for Safe Programming:Preventing Data Races and Deadlocks

http://web.eecs.umich.edu/~bchandra/publications/oopsla02.pdf

Ownership, encapsulation and the disjointness of type and effect

http://dl.acm.org/citation.cfm?id=582447

Generic ownership for generic Java

http://dl.acm.org/citation.cfm?id=1167473.1167500&coll=DL&dl=GUIDE&CFID=310024962&CFTOKEN=41327017

Ownership and immutability in generic Java

http://dl.acm.org/citation.cfm?id=1869459.1869509&coll=DL&dl=GUIDE&CFID=310024962&CFTOKEN=41327017

Refactoring android Java code for on-demand computation offloading

http://dl.acm.org/citation.cfm?doid=2384616.2384634

B106B004

Computing Theory and Computational Intelligence

32 2

:

*#

1 (2)

1.1

1.2

1.3

2 (2)

2.1 *#

2.2

2.3

3 (6)

3.1

3.2

3.3 *

3.4

3.5

3.6

3.7 #

3.8

3.9 #

3.10 *#

4 (6)

4.1

4.2 *

4.3 *

4.4 *

4.5 *#

4.6 *#

5 (6)

5.1 *

5.2

5.3 * #

5.4

5.5

5.6

5.7

5.8

5.9

5.10

5.11

6 (2)

6.1

6.2 *#

,,..,2008

B106C001

Advanced Autonomous Mobile Robot

322

/

2

1

2 ROS

10

3

4

5

6

10

7

8

9

10

10

11

12

1

2 ,

1. SebstianThrun, Wolfram Burgard, Dieter Fox.Probabilistic Robotics. The MIT Press.

2. Ronald Siegwart et al. Introduction to Autonomous Mobile Robot. The MIT Press.

3. Gregory Dudek et al.Computational Principles of Mobile Robotics. Cambridge University Press.

1. http://www.sciencedirect.com

2. http://www.Ieeexplore.com

CodeB106C002

Services Computing and Business Process Management (II)

1 Class Hours () 32 Credits 2

2Majors Concerned ()

Computer Science and Technology, Software Engineering

3Preparatory Courses

Software Engineering, Database

4Teaching Purpose ()

This course aims to let students gain an understanding of the paradigm of services computing, and related techniques and approaches, like SOA and loosely-couple, Web services, service composition, business process management, workflow, Petri nets, BPEL, process mining. Besides, students are expected to understand the mergence of services computing and business process management (BPM), and state-of-the-art techniques and future research directions.

5Teaching Method()

In-class lecture

6Introduction to the course ():

This course is an advanced course of software engineering. Topics include: the paradigm of services computing, SOA and loosely-couple, Web services, service composition, business process management, workflow, Petri nets, BPEL, formal verification for services and business processes, program analysis techniques for Web services and business processes, process mining, and so on.

7Main Contents and Requirement for Students ()

1 INTRODUCTION (2 HRS)

1.1 PARADIGM OF SERVICES COMPUTING

1.2 BUSINESS PROCESS MANAGEMENT

1.3 RELEVANT CONFERENCES AND JOURNALS

2 SERVICES COMPUTING AND BUSINESS PROCESS MANAGEMENT (4 HRS)

2.1 CLOUD COMPUTING AND SAAS

2.2 SERVICE-ORIENTED ARCHITECTURE (SOA)

2.3 WEB SERVICES

2.4 WORKFLOW AND BUSINESS PROCESS

2.5 WHERE SERVICES COMPUTING AND BUSINESS PROCESS MEET

2.6 ABSTRACT AND EXECUTABLE PROCESSES

3 SERVICE COMPOSITION (4 HRS)

3.1 PROGRAMMING-IN-THE-LARGE

3.2 SERVICE COMPOSITION

3.3 SERVICE ORCHESTRATION AND SERVICE CHOREOGRAPH

3.4 BPEL and WS-CDL

4 FORMAL VERIFICATION(5 HRS)

4.1 FORMAL METHODS

4.2 PETRI NETS

4.3 ANALYSIS TECHNIQUES OF PETRI NETS

4.4 WORKFLOW NETS

4.5 WORKFLOW VERIFICATION AND ANALYSIS

5 PROGRAM ANALYSIS (5 HRS)

5.1 CONTROL FLOW GRAPH

5.2 CONTROL DEPENDENCE AND DATA DEPENDENCE

5.3 PROGRAM DEPENDENCE GRAPH (PDG)

5.4 PROCESS CONSISTENCY

5.5 PROCESS REFACTORING

6 PROCESS MINING (6 HRS)

6.1 DATA MINING AND PROCESS MINING

6.2 PROCESS DISCOVERY

6.3 CONFORMANCE CHECKING

6.4 LOG RECOVERY& REPAIR

7 DISCUSSION (6 HRS)

7.1 HOT TOPICS

7.2 FURTHER STUDY

7.3 HOW TO DO RESEARCH IN THIS FIELD

7.4 DISCUSSION ON SOME TOPICS

8Referencing Textbooks and Required References for Students ()

Textbooks

Thomas Erl. Service-Oriented Architecture: Concepts, Technology, and Design, Beijing: Science Press, 2012.

Dumas, Marlon, et al. Fundamentals of business process management. Berlin: Springer, 2013.

Required References for Students

Service-Oriented Computing: State-of-the-Art and Open Research Issues

https://doc.freeband.nl/dsweb/Get/Rendition-19063/UvT%20SOC%20research%20agenda.pdf

Service-oriented computing

http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1607964

Petri nets: Properties, analysis and applications

http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=24143&tag=1

The application of Petri nets to workflow management

http://www.worldscientific.com/doi/abs/10.1142/S0218126698000043

The Program Dependence Graph and Its Use in Optimization

http://dl.acm.org/citation.cfm?id=24039.24041&coll=DL&dl=ACM&CFID=445873799&CFTOKEN=50827646

Process Mining: Discovery, Conformance and Enhancement of Business Processes

http://www.processmining.org/book/start

9Author () Song, Wei

10Teacher () Song, Wei

B106C003

Advanced Software Engineering

32 2

3 :

*#

1 (3)

1.1

1.2

1.3

1.4

2 * (6)

2.1

2.2

2.3 *

2.4

3 *(8)

3.1

3.2

3.3

3.4

3.5

3.6

3.7

4 *# (9)

4.1

4.2

4.3

4.4

4.5

4.6

4.7

4.8

5 *#(6)

5.1

5.2

5.3

1 :Pressman,Roger S.7, :,2010.

2 Penny GrubbArmstrong A Takang2004.

B106C004

Multidimensional Signal Processing

32 2

:

1.

2.

1

1.1

1.2

1.3

2

2.1

2.2

2.3

3 Z

3.1

3.2 Z

3.3

3.4 Z

3.5 2D

4

4.1

4.2

4.3 2D

4.4

4.5

4.6

5

5.1 FIR

5.2 IIR

5.3

6

6.1

6.2

6.3

6.4

: 20+ 20%+ 60

John W. Woods, Multidimensional Signal Image and Video Processing and Coding

Second Edition. Elsevier, 2012.

Dudgeon D., Mersereau R., Merser R. Multidimensional Digital Signal Processing

Second Edition. Prentice Hall, 1995.

B106C005

Big Data Analysis

32 2

:

Map-reduce

1 2

2 Map/Reduce 4

3 2

4 4

5 2

6 4

7 4

Map/ReduceUCI(10)

7

: 2013101

- ~(),Micheline Kamber(),(),(),() 201281

:.(),(),(). ; 1 (201361)

http://infolab.stanford.edu/~ullman/mmds.html

Effective Data Mining Technology. http://www.enablesoft.com/;

UCI. http://www.ics.uci.edu/~mlearn/MLRepository.html

B106C006

II

Machine Learning (II)

322

:

EM

1 1

1.1

1.2

2 2

2.1

2.2

2.3

2.3

2.4

3 2

3.1

3.2

3.3

3.4

4. 2

4.1

4.2

4.3

4.4

52

5.1

5.2

5.3

5.4

6. 3

6.1

6.2

6.3

6.4

6.5

7. 3

7.1

7.2

7.3

7.4

7.5

8. 2

8.1

8.2 EM

8.3 EM

8.4 EM

9. K-3

9.1

9.2

9.3 EM

9.4 K-

10. 2

10.1 EM

10.2

10.3

10.4

11. 2

11.1

11.2

11.3 Bagging

11.4 Boosting

11.5

12. 4

12.1

12.2

12.3

12.4

12.5

12.6L-BFGS

12.7

12.8

13. 4

13.1

13.2

13.3

13.4

13.5

. . 2012.

Bishop C. M. Pattern recognition and machine learning. New York: springer, 2006.

Tom M. Mitchell, Machine Learning, McGraw Hill, 1997

1.http://cs229.stanford.edu/notes/cs229-notes1.pdf

2. Bishop Pattern recognition and machine learning4.1

3.

http://cs229.stanford.edu/notes/cs229-notes3.pdf

http://blog.pluskid.org/?page_id=683

http://ntu.csie.org/~piaip/svm/svm_tutorial.html

4.

http://cs229.stanford.edu/notes/cs229-notes2.pdf

5. EM

http://cs229.stanford.edu/notes/cs229-notes8.pdf

http://www.cs.columbia.edu/~mcollins/em.pdf

6.

http://cs229.stanford.edu/notes/cs229-notes7a.pdf

http://cs229.stanford.edu/notes/cs229-notes7b.pdf

http://home.in.tum.de/~xiaoh/pub/em.pdf

Bishop Pattern recognition and machine learning9

B106C007

Advanced Software Testing Theory and Technology

32 2

3 :

*#

1 (3)

1.1

1.2

1.3

1.4

1.5

2 *(6)

2.1

2.2

2.3 #

2.4 #

2.5 #

3 *(3)

3.1

3.2

3.3

3.3

4 *(6)

4.1

4.2

4.3

5 *#(6)

5.1

5.2

5.3

5.4

5.5

6 (2)

6.1

6.2

7 *#(3)

7.1

7.2

7.3

8 (3)

8.1

8.2

8.3

1 Glenford J. Myers, Tom Badgett, Corey Sandler, The Art of Software Testing, Wiley, 2011. (ISBN-10:1118031962/ ISBN-13:978-1118031964, Edition 3)

2 Aditya P. Mathur , Foundations of Software Testing, Prentice Hall India, 2008. (ISBN: 8131716600)

/() William E. Perry. , , . :,2008.

B106C008

Theory of Pattern Recognition

32 2

:

/

*#

1 (6)

1.1

1.2 *#

1.3 *

1.4 #

1.5

1.6

2 (8)

2.1

2.2 *

2.3 #

2.4 *

2.5 #

2.6 #

2.7 #

2.8

3 (10)

3.1

3.2 *

3.3 #

3.4 *

3.5 (SVC) *#

3.6 *#

3.7 *#

3.8 -*#

3.9 *#

3.10 #

3.11 -SVCC SVC-SVR/-SVR #

3.12

3.13 SMO

4 (4)

4.1 #

4.2 /*#

4.3

4.4 *

4.5 *

4.6 /bootstrap*

4.7 Bagging/Boosting*

4.8

5 (4)

5.1 *

5.2 C-

5.3 C-#

5.4 C-

5.5 *

C.M.Bishop, Pattern Recognition and Machine Learning, Springer Press, 2007

R.O.Duda 2003

2010

N.Cristianini2004

-2009

John Shawe-Tayor, , , , 2006.

B. Scholkopf and A. J. Smola, Learning with Kernels, MIT Press, 2001

B106C009

New Generation Network Technology

32 2

TCP/IP

1)

2)

3)

*#

1

1 0.5

1.1

1.2 INTERNET*

1.3 IP

1.4

2 IPv6 0.52.1 IPv62.2 IPv62.3 ICMPv6#

3 IPv6 13.1 IPv63.2 IPv63.3 IPv63.4 IPv6 DNS

4 IPv6 1

4.1 IPv6*4.2 4.3

5 IPv6 25.1 IPv65.2 IPv6

5.3 IPv6*

5.4 IPv6

5.5 IPv6IPv4

5.6 IPv6

6 IP 2

6.1

6.2 IP

6.3 IP*

6.4 IP

6.5 IP

7 ATMIP 2

7.1

7.2 ATMIPARP

7.3 #

7.4 ATMIPv6

8 IP 1

8.1

8.2 IP

9 MPLS2

9.1 MPLS

9.2 IMPLS*

9.3 MPLS

9.4 MPLS

10 MPLS2

10.1 VPN

10.2 MPLSVPN

10.3 MPLSVPN

11 Ad Hoc 211.1 Ad Hoc11.2 Ad Hoc*11.3 Ad HocQoS#11.4 Ad HocTCP11.5 Ad Hoc

12 Ad Hoc 212.1 Ad Hoc

12.2 *

12.3

12.4

12.5

12.6

13 Ad HocIP 2 13.1 IP

13.2 IP

13.3 DDHCP#

13.4

14 1

14.1

14.2

15 2

15.1

15.2 MAC*

15.3

15.4

15.5

16 1

16.1

16.2 #

16.3

17 2

17.1

17.2

17.3 #

18 1

18.1

18.2

19 1

19.1 *

19.2

20 UWB 220.1 UWB

20.2 UWBMAC#20.3 UWB20.4

21 UMTS 221.1 3GPP R99 21.2 UMTS*21.3 21.4 21.5

2.

1

2

1.INTERNET2001

2. , , ,2005. , 4., , Ad Hoc --, ,2006

5.,IP,,1999.

6.Edgar H. Callaway, Jr. , Wireless Sensor Networks: Architectures and Protocols ,CRC Press LLC, 2004

7.Edited by C. S. Raghavendra, Wireless Sensor Networks, Kluwer Acamedic Press, 2004

B106C010

Image Analysis and Image Understanding

32 2

:

C,

;

1. (4)

1.1 HoughHough

1.2 *

1.2.1

1.2.2

1.2.3

1.3

2. (2)

2.1 Harris*

2.2Harris

2.3Harris

2.4 SUSAN*

3. (2)

3.1

3.2.H.S*3.3

3.4

4. (4)

4.1 *

4.2 *

4.3 *

4.3.1 Gabor

4.3.2 LBP

4.4 *

4.5

4.6

5. HOG (2)

5.1 HOG

5.2 HOG*

5.3 HOG

5.4

6. SIFTSURF (4)

6.1SIFT

6.1.1 SIFT*

6.1.2 PCA-SIFT

6.1.3 Affine SIFT

6.1.4 SIFT

6.2 SURF

7. (2)

7.1 GIST*

7.2

7.3

8. (4)

8.1*

8.2

8.3PDE

9. 4

9.1

9.2

9.3

10. 4

10.1 *

10.2

10.3

*

1. , ,

2. Milan Sonka, Vaclav Hlavac, Roger Boyle(Image Processing, Analysis, and Machine Vision)2006ISBN7-115-11496-X/TP.3544

3. . 2008

4. 2010

1. . .

2. . .

3. . .

4. . .

5. . .

6. . , , 2012

7. Rafael C. Gonzalez, Richard E. Woods, Steven L. Digital image processing using MATLAB:MATLAB/().

8. 2003

9. Jean-Luc Stark, . , , 2014.

B106Z001

The Frontier of Intelligent Science & Technology

32 2

,

:

CVPRICCVECCVACPR35

3~5

6

3~5

8

3~5

6

3~5

6

3~5

6

CVPRAAAIICCVECCVACPR

B106Z002

Analysis of Mass Data

32 2

NoSQL

1. 2

2. 2

2.1

2.2

3. 4

3.12

3.22

4.4

4.1 Deep Learning 2

4.2 2

5. 8

5.1 2

5.2 2

5.3 2

5.4HadoopMapReduce 2

6. 4

6.1 2

6.2 SAP HANA 2

7. NoSQL 4

7.1 Key-Value 2

7.2 2

8. 2

[1] Ian H. Witten H., Alistair Moffat.,Timothy C. Bell (Author) C.. (2)., 2014-1-1

[2] Frank J. Ohlhorst...2013-9-1

[3]. ..2013-10-1

[4] Pramod J. SadalageMartin Fowler. NoSQL Distilled : a brief guide to the emerging world of polyglot persistence Addison-Wesley, 2013

B106Z003

The Novel Technology of Software Engineering

32 2

,

1.

2.

3.

123

B106Z004

The development of trusted software

32 2

,

4.

5.

Trusted

Trustworthy

High Confidence

Dependability

6.

a)

b)

c)

d)

123

B106Z005

The Forefront of Information Security Technology

32 2

,

7.

8.

9.

123

B106Z006

New Remote Sensing Information Processing Technology

322

:

,

1.

1.1

1.2

1.3

1.4

1.5

2.

2.1

2.1.1

2.1.2

2.2

2.2.1

2.2.2

2.2.3

2.2.4

2.2.5

2.2.6

2.2.7

2.2.8

2.3

2.3.1

2.3.2

2.4

2.4.1

2.4.2

2.4.3

2.4.4

2.4.5

2.4.6

3

3.1

3.1.1

3.1.2

3.1.3

3.1.4

3.2

3.2.1

3.2.2

3.2.3

3.2.4

3.3

3.3.1

3.3.2

[1] , , , 2003.

[2] , , , 2004

[3] 2012

[4] 2014

CodeL106B001

Principles and Methods of Artificial Intelligence

1 Class Hours () 32 Credits 2

2Majors Concerned ()

Pattern Recognition and Intelligence System, Computer Science and Engineering, Automatic Control

3Preparatory Courses

Discrete mathematics, Probability theory, Linear algebra, Algorithm design and analysis

4Teaching Purpose ()

The objective of this class is to teach students modern AI. Students will learn about the basic techniques and tricks of the trade. We also aspire to excite students about the field of AI.

5Teaching Method()

Narrating the main contents of the textbook with aid of computer multimedia and having discussions on class. Assigning home works and final project and providing additional readings.

6Introduction to the course ()

This course introduces students to the basics of Artificial Intelligence, which includes machine learning, probabilistic reasoning, and robotics.

7Main Contents and Requirement for Students ()

(1) Overview of AI

(2) Statistics, Uncertainty, and Bayes networks

(3) Machine Learning

(4) Logic and Planning

(5) Markov Decision Processes and Reinforcement Learning

(6) Hidden Markov Models and Filters

(7) Adversarial and Advanced Planning

(8) Image Processing and Computer Vision

(9) Robotics and robot motion planning

(10) Natural Language Processing and Information Retrieval

8Referencing Textbooks and Required References for Students ()

[1] Russell and Norvig. Artificial Intelligence: A Modern Approach. A comprehensive reference for all the AI topics that we will cover.

[2] Koller and Friedman. Probabilistic Graphical Models. Covers factor graphs and Bayesian networks.

[3] Sutton and Barto. Reinforcement Learning: An Introduction. Covers Markov decision processes and reinforcement learning.

[4] Hastie, Tibshirani, and Friedman. The elements of statistical learning. Covers machine learning.

[5] Tsang. Foundations of constraint satisfaction. Covers constraint satisfaction problems.

9Author () HU, Xuelei

10Teacher () HU, Xuelei

CodeL106C001

Data Mining and Big Data Analysis

1. Class Hours () 32 Credits 2

2. Applicable professional():

Software Engineering, Computer Science and Technology, Pattern Recognition and Artificial Intelligence

3. Preparatory courses:

Probability and Statistics, Linear Algebra, Distributed Computing

4. Purpose of teaching():

This course introduces data mining methods and basic algorithms, such as descriptive data mining, predictive data mining algorithms, calculate the classification, clustering algorithms, time series analysis, association rule mining, big data analysis system introduced key technologies, such as large data storage technology, big data preprocessing techniques, in-memory computing, distributed and parallel computing technologies. Allows students to master basic data mining methods and big data analysis methods to enhance the ability in practice.

5. Teaching methods():

This course is in the classroom-based, Hands combining manner.

6. The main content and teaching requirements for students():

Teaching content of classroom teaching and practice of teaching composition, in which the content of classroom instruction and 20 hours; practice teaching content, 12 hours:

Chapter 1, data mining and analysis of large data overview (2 hours)

1.1 Overview of Data Mining

1.2 Overview of big data analytics

Chapter 2 Concept Description: Characterization and Comparison (2 hours)

2.1 What is the concept description?

2.2 attribute-oriented induction

2.3 Mining class comparison: distinguish between different classes

Chapter 3 mining (2 hours) association rules

3.1 Meaning of mining association rules

3.2 Association Rule Mining Algorithm

Chapter 4 Classification and Prediction (3 hours)

4.1 classification, prediction

4.2 decision (judgment) tree induction

4.3 Bayesian classifier

4.4 Some other classification methods

4.5 forecast

4.6 assess the accuracy of classification

Chapter 5, cluster analysis (3 hours)

5.1 means clustering analysis

5.2 Cluster analysis of data types and conversion

5.3 division method

Chapter 6, large data storage and pretreatment technology (3 hours)

6.1 row and column storage

Distributed File System 6.2

6.3 ETL

Chapter 7 Memory Computing technology (2 hours)

7.1 Memory Computing Overview

7.2 Memory Computing Architecture

7.3 Memory Data Management

Chapter 8 of distributed parallel computing technology (3 hours)

8.1 Map Reduce computing paradigm

Teaching content:

Experiment using the UCI machine learning databases http://www.ics.uci.edu/ ~ 5 sets of data sources used learn / MLRepository.html provided for specific data sets, designed and implemented classification or clustering algorithm , to accomplish the task. (4 hours)

The second experiment, choose a typical data mining algorithms, computing paradigm based on Map Reduce parallel computing. (4 hours)

7. Textbooks, reference books and student reading references()

Textbooks:

1, Data Mining - Concepts and Techniques (plus) (third edition) - Han Wei (Author), Micheline Kamber (Author), Pei Jian (Author), Fan (translator), X. Meng (translator) Machinery Industry Publishing Press, August 1, 2012

2, application and practice of data mining: the era of big data analysis scenarios Tao Xiamen University Press, October 1, 2013

Reference:

1, Li Hang. Statistical learning methods. Tsinghua University Press, 2012.

2, Big Data: Technology Strategy Practice Zhoubao Yao (editors), Liu Wei (Editor), Fan Cheng workers (Editor) Electronic Industry Press; 1st edition (June 1, 2013)

References:

1, Data Mining: What Is Data Mining? http://www.anderson.ucla.edu/fac ... lace / datamining.htm;

2, Effective Data Mining Technology http://www.enablesoft.com/.;

3, UCI datasets. Http://www.ics.uci.edu/ ~ mlearn / MLRepository.html

8. Outline written by: Li, Tao

9. Instructor: Li, Tao

CodeL106C003

Formal Specification and Testing of Software

1Class Hours () 32 Credits2

2Majors Concerned ()

Computer Science and Technology, Software Engineering

3Preparatory Courses

Software Engineering, Discrete Mathematics, Program Design Formal Semantics

4Teaching Purpose ()

With the growing significance of computer systems within industry and wider society, techniques that assist in the production of reliable software are becoming increasingly important. The complexity of many computer systems requires the application of a battery of such techniques. Two of the most promising approaches are formal specification methods and software testing. While traditionally they have been seen as rivals, in recent years a new consensus has developed in which they are seen as complementary. This course introduces the state of the art regarding ways in which the presence of a formal specification can be used to assist testing.

5Teaching Method()

Lecture, Seminar

6Introduction to the course ()

Software testing is an important and, traditionally, extremely expensive part of the software development process, with the importance and cost depending on the nature and criticality of the system. Studies have suggested that testing often forms more than 50% of the total development cost, and hence dominates the overall production cost. Where formal specifications exist, these may be used as the basis for automating parts of the testing process and this can lead to more efficient and effective testing. The formal specifications may also be used as the basis for generating a test oracle. For those systems having a persistent internal state, the formal specifications can provide support for finding appropriate testing paths through a finite state structure. This course explores the ways in which the presence of a formal specification can support testing.

7Main Contents and Requirement for Students ()

This course will

introduce the basic concept of software testing;

survey a range of formal specification methods;

discuss the relationship between formal specification methods and software testing;

focus on using the following formal specification methods to support software testing:

Model-based formal specifications

Finite State-based Specifications

Process Algebra Specifications

Algebraic Specifications

A student who has mastered the material of this course can be expected to

understand the basic concept of software testing;

be able to apply appropriate specification methods to specify software systems;

understand how to generate tests from a specification written using a model based notation such as Z, VDM, or B; a finite state machine; a process algebra; or an algebraic specification language, respectively.

8Referencing Textbooks and Required References for Students ()

(1) Introduction to Software Testing[M], Paul Ammann

(2) Using Formal Specifications to Support Testing[J], Robert M. Hierons and some of its references

9Author () Liu, Dongmei

10Teacher () Liu, Dongmei

CodeL106C004

Pattern Recognition Technology

1Class Hours () 32 Credits 2

2Majors Concerned ()

Control science and engineering, computer science and technology

3Preparatory Courses

probability theory, mathematical statistics, linear algebra, matrix analysis

4Teaching Purpose ()

Pattern recognition is an important professional course for computer science, automatic control, and systems engineering majors. In this course, students can not only master some basic methods for pattern recognition, but also know recent developments in this research field.

5Teaching Method()

Class teaching, large coursework

6Introduction to the course ():

This course deals with the fundamentals of characterizing and recognizing patterns and features of interest. Pattern recognition techniques are concerned with the theory and algorithms of putting abstract objects, e.g., measurements made on physical objects, into categories. Typically the categories are assumed to be known in advance, although there are techniques to learn the categories (clustering). Methods of pattern recognition are useful in many applications such as information retrieval, data mining, document image analysis and recognition, computational linguistics, forensics, biometrics and bioinformatics.

7Main Contents and Requirement for Students ()

1 Introduction

1.1 Basic concept in pattern recognition

1.2 Pattern recognition theory and methods

1.3 Pattern recognition system

1.4 Applications in pattern recognition

2 Bayes decision theory

2.1 Introduction

2.2 Minimum error rate based Bayes decision

2.3 Minimum risk based Bayes decision

2.4 Classifier design

2.5 Normal distribution based Bayes classifier

2.6 Parameter estimation and non-parametric estimation

3 Linear discriminant function and linear classifier

3.1 Introduction

3.2 Linear discriminant function

3.3 Generalized linear discriminant function

3.4 Linear classifier design

3.5 Other classifiers

4 Feature selection and feature extraction

4.1 Introduction

4.2 Feature selection

4.3 Feature extraction

4.4 Applications

5 Cluster analysis

5.1 Introduction

5.2 Similarity criteria (similarity measurement)

5.3 Cluster criterion function

5.4 Classical clustering algorithms

5.5 Fuzzy cluster

6 Fisher discriminant analysis

6.1 Introduction

6.2 Traditional Fisher discriminant analysis

6.3 Discriminant analysis for multiple classes

6.4 Discriminant analysis for small sample size

6.5 Two-dimensional discriminant analysis

7 Support vector machine

7.1 Statistical learning theory

7.2 Linear support vector machine

7.3 Nonlinear support vector machine

7.4 Applications

8 Nonlinear discriminant analysis

8.1 Introduction

8.2 Kernel principal component analysis

8.3 Kernel discriminant analysis

9 Applications and advances in pattern recognition

9.1 Applications in pattern recognition

9.2 Advances in pattern recognition

8Referencing Textbooks and Required References for Students ()

Pattern Classification (second edition)

Richard O.Duda,etc

Statistical Pattern Recognition (second edition) Andrew R.Webb

Pattern Recognition(3rd Edition)

S. Theodoridis,etc

9Author () Sun, Quansen

10Teacher () Ji,Zexuan; Liu,Yazhou

CodeL106C005

Software Evaluation and Copyright Protection

1Class Hours () 32 Credits 2

2Majors Concerned ()

Software Engineering, Computer Science and Technology, Control Science and Engineering, Pattern Recognition and Intelligent Systems, and other related disciplines

3Preparatory Courses

Probability Theory and Mathematical Statistics, Program Design

4Teaching Purpose ()

This course is a professional course on assessment and learning software copyright protection of basic principles and methods of assessment and understanding of the latest developments of software copyright protection at home and abroad. In introducing the development of advanced assessment techniques and typical cases on copyright protection, copyright protection to enable students to master the concept, design ideas, methods and key technologies, training students to analyze and problem-solving skills in software evaluation and copyright protection, improve complex systems to protect students' practical ability.

5Teaching Method()

Classroom teaching, laboratory

6Main Contents and Requirement for Students () (Note: "*" indicates the focus, "#" indicates the difficulty, "" indicates involving frontier):

(1) Software copyright and methods class design and organization (12 hours)

1.1 systems, models and simulation *

1.2 Continuous systems and discrete event systems

1.3 Software Patent Organization and methods of the class

1.4 Experimental and Case

(2) Categories of copyright integrated system design and organization (12 hours)

2.1 principles, methods and testing

2.2 System Modeling Method *

2.3 system classes Patent Organization *

2.4 Experimental and Case

(3) Software copyright design and organization (8 hours)

3.1 Development Overview

3.2 The concept and meaning

3.3 Basic Principles

3.4 The main method #

3.5 IT typical system

3.6 Typical industrial automation systems

3.7 Communication systems and applications in the field of electronic information

In curricular teaching activities focus on the students understand the problem context, the theoretical foundation and technical means. In order to develop students' ability to research, this course requires every students who elective the course write a patent application document.

Lesson to teach and experiment-based, self-study, supplemented by measures to discuss membership, etc., thereby ensuring the quality of teaching

7Referencing Textbooks and Required References for Students ()

(1) Wu Yue concept: the invention and utility model patent application documents: written case analysis (third edition), Intellectual Property Press, 2011

8Author () Tao, Li

9Teacher () Tao, Li

CodeL106C006

The Architectures and Protocols of the Next-Generation Internet

1. Class Hours 32 Credits 2

2. Majors Concerned

Computer Science and Technology, Software Engineering

3. Preparatory Courses

Computer Network

4. Teaching Purpose

This course is designed to help graduate students in computer science and networking related programs to look into today's Internet architecture and protocol limitations. With the realistic usage context of current network application and service, we help the students identify and analyze the major disadvantages and threats the current Internet is exposed to, and understand its underlying systematic and architectural causes. The course also surveys and introduces the state-of-the-art technology and projects in future Internet design. Students after this course are expected to be motivated and inspired by the new Internet design discussed in class, and apply the behind reform motivation and design philosophy into their research work and exploration procedure.

5. Teaching Method

This is a graduate-level course with a proper combination of in-class lectures, seminars and out-of-class readings. The instructor uses lectures to explain the design and architecture of the current Internet, analyze and emphasize its limitations as inefficiency, unreliability, vulnerability. Then the students are grouped to explore in each limitation aspect for proposed or possible solutions. Publications from the NSF FIND and FIA projects are carefully selected and assigned to students as out-of-class readings. Typical and signification new Internet architecture designs will be brought to class for discussion.

6. Introduction to the Course

The current Internet system has been continuously reviewed, renovated and patched to address the increasing demands on capacity, quality of service, speed, and reliability. However, its fundamental host-to-host level TCP/IP based architecture is born vulnerable to security attacks, and lack of performance reliability of Internet services. Pioneer researchers have proposed a lot of new and innovative designs, architectures, protocols and mechanisms to build the next-generation Internet. This course is designed to help graduate PhD students with related research interests to quickly explore and understand the current research work and achievements on the new Internet innovation procedure. The course contents covers for future Internet the technology evolution at the physical/link layers in media transmission, the new switching and routing paradigms at the device and system layers, the proposed alternatives to TCP/IP at the transport layer, and the revolutionary new approaches for providing and managing network services and resources.

7. Main Contents and Requirements

a) Internet architecture overview

b) Internet switching and routing

c) TCP/IP protocol suite

d) Internet applications and services

e) Internet attacks and defenses

f) Named Data Networking

g) Cloud-computing-centric architecture

h) Expressive Internet Architecture

i) Choice Network

j) Network with Extreme Mobility

8. Textbooks, References

Next-Generation Internet: Architectures and Protocols, by Byrav Ramamurthy, George N. Rouskas, and Krishna Moorthy Sivalingam, Cambridge University Press, ISBN: 0521113687

TCP/IP Protocol Suite, by Behrouz Forouzan, McGraw-Hill Science/Engineering/Math, ISBN: 0073376043

http://www.nets-fia.net/

http://www.nets-find.net/

9. AuthorWei, Songjie,

10.TeacherWei, Songjie,

CodeL106C007

Computer Vision

1Class Hours () 32 Credits2

2Majors Concerned () CSE, EE

3Preparatory Courses

A strong programming background is assumed, as well as familiarity with linear algebra (vector and matrix operations), and knowledge of basic probability theory and statistics. Matlab will be the primary programming language/environment used in the programming assignments. All students are expected to have passedArtificial Intelligence, orData Modeling and Analysis, or an equivalent, before attending this course.

4Teaching Purpose ()

Introduce the student to the concepts of computer vision: what is meant, how it is done, and its current limitations. In-depth exercises will help the student to become familiar with the algorithms that are being used.

5Teaching Method()

Course study, project and homework.

6Introduction to the course ()

This course introduces students to basic concepts and techniques in computer vision. Students successfully completing this course will be able to apply a variety of computer techniques for the design of efficient algorithms for real-world applications, such as optical character recognition, face detection and recognition, motion estimation, human tracking, and gesture recognition. The topics covered include image filters, edge detection, feature extraction, object detection, object recognition, tracking, gesture recognition, image formation and camera models, and stereo vision. The course will be graded based on programming assignments, and a final programming project.

7Main Contents and Requirement for Students ()

1) Hardware

a. cameras: still, motion, stereo

b. lenses: pinhole, simple, compound, panoramic

c. sensors: film, CCD, CMOS, image intensifiers

d. exposure control: mechanical & electronic shutters

e. analog-to-digital conversion, communication, computer video cards

2) Light

a. radiometry

b. luminance, illumination

c. tendue, brightness theorem

d. surfaces: lambertian, specular, BDRF

e. environmental influences on appearance: inter-reflection, chameleons

3) Color

a. the electromagnetic spectrum

b. the human visual system, color camera technologies

c. color temperature, perceived color constancy, whiteness correction

d. color representations, gamut, many-to-oneness of color perception

e. infrared, ultraviolet, multi-spectral imaging

4) Feature extraction

a. simple features, simple filters: edges, neighborhoods

b. many variations on the theme of edge detection

c. complex features: man-made (e.g., corners), nature-made (e.g., faces)

d. decomposition, Gabor filters, wavelets, scale-independence

e. transformations, compression, lossy-compression

5) Motion

a. motion tracking, optical flow

b. structure from motion

c. affine structure from motion

d. projective structure from motion

e. video compression

6) Binocular and multi-view stereo

a. recovery of scene depth from a stereo pair

b. the corresponding point problem

c. occlusions, windows, periodicities, other ambiguities

d. stereo from motion, holography, motion from stereo

e. stereo for people (teleoperation) vs. stereo for computers

7) Image understanding

a. segmentation of objects and regions

b. foreground-background, sky-ground, belonging-anomalous

c. people, vehicles, threats, targets

d. vision-based driving and navigation

e. scene enhancement for inspection and teleoperation

8Referencing Textbooks and Required References for Students ()

[1] Computer Vision: A Modern Approach, Forsyth & Ponce, ISBN: 0130851981

[2] Image Processing: Analysis and Machine Vision, Sonka, Hlavac, & Boyle, ISBN: 0-534-9539

[3] Computer Vision, Shapiro & Stockman, ISBN: 0130307963

9Author () Liu, Yazhou

10Teacher () Liu, Yazhou

CodeL106C008

Information Security and Applied Cryptography

1. Class Hours 32 Credits 2

2. Majors Concerned

Computer Science and Technology, Software Engineering

3. Preparatory Courses

Discrete Mathematics

C++ Programming

Operating Systems

Computer Network

4. Teaching Purpose

This course is a comprehensive and rigorous introduction about information security and data cryptography, with a focus on services, mechanisms, and applications. Besides the indispensable discussion about security protocols and encryption algorithms, the course contents span confidentiality, integrity, authentication, and availability, and a good coverage of practical applications of these ideas in the areas of operational, physical, network, and operating system security. Students are guided to examine and understand the security strength of protocols and systems against arbitrary attackers and attack scenarios.

5. Teaching Method

The course is provides as a composition of lectures, seminars, and laboratory exercises. The instructor gives lectures about fundamental concepts, theories, algorithm, and protocols. Then each student is required for course reading and research on a specific system or application for information security and cryptography. Students will be guided to host seminars about their research topics. Laboratory excises are designed to provide students opportunities to implement and experience the techniques learned in class.

6. Introduction to the Course

The first part of the course discuss rules and mechanisms to keep information secure on both individual computer and computer network. Contents include system management, file management, network management, service management, secrecy management, user authentication, risk evaluation and attack counter-measures. The second part covers essential cryptography concepts and algorithms in its original mathematical sense, while keeps connections and emphasis of these theoretical contents with practice. We will introduce classical and main-stream cryptography algorithms for symmetric-encryption, public key cryptography, data integrity and authentication. Upon successful completion of this course, students build their knowledge on how to design and manage information security in cyberspace, and what are the choices of cryptographic services and mechanisms to achieve their goals.

7. Main Contents and Requirements

a) Computer security management

b) File management

c) User management and authentication

d) Network security management

e) Symmetric-key encryption

f) Public key cryptography

g) Data integrity and digital signatures

h) Internet security protocols

8. Textbooks, References

Introduction to Modern Cryptography, by Jonathan Katz , Yehuda Lindell, Chapman and Hall/CRC, ISBN: 1584885513

Elementary Information Security, by Richard Smith, Jones & Bartlett Learning, ISBN: 1449648207

9. AuthorWei, Songjie

10.TeacherWei, Songjie,

CodeL106C009

Pattern Recognition

1. Class Hours 32 Credits 2

2Majors Concerned ()

Pattern Recognition and Intelligent System

3Preparatory Courses

LinearAlgebra, Probabilityand Statistics

4Teaching Purpose ()

This Selective Course is for ph.D/Master candidates whose major is Pattern Recognition and Intelligent System. After learning this course, the ph.D/Master candidates should master the principal and methods of pattern recognition, and know the advances in the theoretical study on the pattern recognition.

5Teaching Method()

Oralinstruction

6Introduction to the course ()

The main content of this course is about the advances in the nonlinear cases of pattern recognition related research fields, including nonlinear principal component analysis, nonlinear Fisher discriminate analysis, support vector machine, feature fusion and classifier combination, and unsupervised learning.

7Main Contents and Requirement for Students ()

(Note: symbol * for emphasis, # for difficulty and for leading advance, respectively)

Chapter 1 Nonlinear Principal Component Analysis (9 credit hours)

1.1 principal component analysis (PCA)

1.2 kernel-based learning theory *#

1.3 kernel principal component analysis (KPCA) *

1.4 the pre-image problem in kernel methods #

1.5 gernalized KPCA

1.6 nonlinear PCA

Chapter 2 Nonlinear Discriminant Aanalysis (12 credit hours)

2.1 linear Fisher discriminant syslysis

2.2 kernel Fisher discriminant syslysis (KFDA) *

2.3 algorithm of selecting the significant training samples #

2.4 KFDA for multi-class problem *

2.5 regularization and kernel optimization in KFDA #

2.6 reproducing kernels and KFDA #

2.7 relationship between KPCA and KFDA #

2.8 the unified framework of discriminant analysis learning methods

Chapter 3 Support Vector Machines (15 credit hours)

3.1 linear learning method

3.2 dual form *

3.3 the generalization theory in statistical learning #

3.4 convex optimization *

3.5 support vector classifier (SVC) for linear separable cases *#

3.6 soft margin SVC *#

3.7 kernel based SVC *#

3.8 linear regression and hard -band hyperplane *#

3.9 support vector regression (SVR) for linear regression *#

3.10 the kernel optimization problem in SVM #

3.11 -SVC, C-SVC, -SVR, -SVR #

3.12 SVC for multi-class problem

3.13 SMO algorithm and big data problem in SVM

Chapter 4 Feature Fusion and Classifier Combination (6 credit hours)

4.1 ugly duckling theorem #

4.2 bias/variance dilemma in classification *#

4.3 feature fusion strategy

4.4 feature fusion based on canonical correlation analysis *

4.5 theory of classification combination *

4.6 bootstrap, resampling *

4.7 Bagging/Boosting in classifier design*

4.8 cross validation

Chapter 5 Unsupervised Learning (6 credit hours)

5.1 unsupervised Bayesian learning *

5.2 C-Means clustering

5.3 Fuzzy C-Means clustering #

5.4 kernel based C-Means clustering

5.5 unsupervised manifold learning *

8Referencing Textbooks and Required References for Students ()

Referencing Textbooks:

[1]. C.M.Bishop, Pattern Recognition and Machine Learning, Springer Press, 2007

Required References:

[2]. R.O.Duda, P.E. Hart, D.G.. Stork, , Pattern Classification,

[3]. N.Cristianini, John Shawe-Tayor, Introduction to Support Vector Machine,

[4]. B. Scholkopf and A. J. Smola, Learning with Kernels, MIT Press, 2001

[5]. John Shawe-Tayor et al, Kernel Method for Pattern Analysis

9Author () Sun, Tingkai, Liu, Chuancai

10Teacher () Sun, Tingkai

S106B001

Computer Vision and Image Understanding

32 2

,

---,

*#

1 (2)

1.1

1.2

1.3

1.4

2 (2)

* 2.1

* 2.2

2.3

3 (6)

* 3.1

* 3.2

# 3.3

4 (3)

* 4.1

* 4.2

4.3

* 4.4

5 6

# 5.1

# 5.2

6 (5)

* 5.1

# 5.2

5.3 PDE

7 4

7.1

7.2

7.3

8 4

* 8.1

8.2

8.3

[1] DA Forsyth and J. Ponce, Computer Vision: A Modern Approach, Prentice Hall

[2] 2004

[3] 1998

[4] 2006.

[5]Jean-Luc Stark, . , , 2014.

CodeS106B002

Distributed System

1Class Hours () 32 Credits 2

2Majors Concerned ()

Computer Science and Technology, Software Engineering

3Preparatory Courses

Computer Networking

4Teaching Purpose ()

This course aims to let students gain an understanding of the principles and techniques behind the design of distributed systems, such as locking, concurrency, scheduling, and communication across the network. Besides, students who choose this course should be able to gain practical experience designing, implementing, and debugging real distributed systems.

5Teaching Method()

In-class lecture and lab

6Introduction to the course ():

This course is an advanced course in computer networking and distributed systems. Topics include: communication, processes, naming, synchronization, consistency and replication, security, distributed object-based systems and so on.

7Main Contents and Requirement for Students ()

Detailed schedule is:

1 INTRODUCTION (2 hrs)

1.1 DEFINITION OF A DISTRIBUTED SYSTEM

1.2 GOALS

1.3 HARDWARE CONCEPTS

1.4 SOFTWARE CONCEPTS

1.5 THE CLIENT-SERVER MODEL

2 COMMUNICATION (4 hrs)

2.1 LAYERED PROTOCOLS

2.2 REMOTE PROCEDURE CALL

2.3 REMOTE OBJECT INVOCATION

2.4 MESSAGE-ORIENTED COMMUNICATION

2.5 STREAM-ORIENTED COMMUNICATION

LAB 1 SIMPLE DISTRIBUTED COMPUTING

3 PROCESSES (6 hrs)

3.1 THREADS

3.2 CLIENTS

3.3 SERVERS

3.4 CODE MIGRATION *

3.5 LOAD BALANCE *

3.6 SOFTWARE AGENTS *

LAB 2 ROOM DISTRIBUTION BASED UPON JAVA RMI

4 NAMING (2 hrs)

4.1 NAMING ENTITIES

4.2 LOCATING MOBILE ENTITIES

4.3 REMOVING UNREFERENCED ENTITIES

5 SYNCHRONIZATION (5 hrs)

5.1 CLOCK SYNCHRONIZATION

5.2 LOGICAL CLOCKS

5.3 GLOBAL STATE

5.4 ELECTION ALGORITHMS

5.5 MUTUAL EXCLUSION

5.6 DISTRIBUTED TRANSACTIONS

LAB 3 PERSONAL CALENDAR BASED ON CORBA

6 CONSISTENCY AND REPLICATION (2 hrs)

6.1 INTRODUCTION

6.2 DATA-CENTRIC CONSISTENCY MODELS

6.3 CLIENT-CENTRIC CONSISTENCY MODELS

6.4 DISTRIBUTION PROTOCOLS

6.5 CONSISTENCY PROTOCOLS

6.6 EXAMPLES

7 FAULT TOLERANCE (4 hrs)

7.1 INTRODUCTION TO FAULT TOLERANCE

7.2 PROCESS RESILIENCE

7.3 RELIABLE CLIENT-SERVER COMMUNICATION

7.4 RELIABLE GROUP COMMUNICATION

7.5 DISTRIBUTED COMMIT

7.6 RECOVERY

LAB 4 THE SOLUTION FOR BYZANTINE GENERAL PROBLEM

8 DISTRIBUTED OBJECT-BASED SYSTEMS (5 hrs)

8.1 CORBA TECHNOLOGY

8.2 DISTRIBUTED COM

8.3 JAVA RMI

8.4 COMPARISON OF CORBA, DCOM, AND RMI

9 NEW TECHNOLOGY WEB SERVICES (4 hrs)

9.1 INTRODUCTION

9.2 GOALS OF WEB SERVICES

9.3 UDDI,WSDL,SOAP and XML

9.4 FAMOUS COMPANIES JOBS

9.5 MS .Net

9.6 WEB SERVICES AND GRID COMPUTING

8Referencing Textbooks and Required References for Students ()

Andrew S. Tanenbaum, Maarten van Steen. Distributed Systems: Principles and Paradigms, second edition (photocopy edition), Beijing: Tsinghua University Press, 2008.

George Coulouris, Jean Dollimore and Tim Kindberg. Distributed Systems: Concepts and Design, fifth edition (photocopy edition), Beijing: Mechanical Industry Press, 2012.

Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications

http://pdos.csail.mit.edu/papers/chord:sigcomm01/chord_sigcomm.pdf

Freenet: A Distributed Anonymous Information Storage and Retrieval System

http://homepage.cs.uiowa.edu/~ghosh/freenet.pdf

A Survey of Peer-to-Peer Security Issues

http://www.cs.rice.edu/~dwallach/pub/tokyo-p2p2002.pdf

MapReduce: simplified data processing on large clusters

http://www.cs.amherst.edu/~ccm/cs34/papers/p107-dean.pdf

Refactoring android Java code for on-demand computation offloading

http://dl.acm.org/citation.cfm?doid=2384616.2384634

A Secure Migration Process for Mobile Agents

http://iel.ucdavis.edu/publication/2011/SPE.pdf

XML-Based Agent Communication, Migration and Computation in Mobile Agent Systems

http://iel.ucdavis.edu/publication/2008/JSS8098.pdf

Epidemic algorithms for replicated database maintenance

http://bitsavers.informatik.uni-stuttgart.de/pdf/xerox/parc/techReports/CSL-89-1_Epidemic_Algorithms_for_Replicated_Database_Maintenance.pdf

Tutorial: Gossip Protocols for Large-Scale Distributed Systems

http://sbrc2010.inf.ufrgs.br/resources/presentations/tutorial/tutorial-montresor.pdf

Scalable Application Layer Multicast

http://pages.cs.wisc.edu/~suman/pubs/sigcomm02.pdf

Toward Automatic Context-based Attribute Assignment for Semantic File Systems.

http://www.pdl.cmu.edu/PDL-FTP/ABN/CMU-PDL-04-105.pdf

Why cant I nd my les?

http://www.pdl.cmu.edu/PDL-FTP/Storage/hotOS03.pdf

9Author () Zhao, Yang

10Teacher () Zhao, Yang

S106B003

Automated functional testing theory

32 2

:CC++Java

;

*#

1 (4)

1.1

1.2

1.3 *

2 (6)

2.1 *

2.2

2.3

2.4 *

3 (2)

3.1

3.2 *#

3.3

4 (8)

4.1

4.2 DOM

4.3 GUI

4.4

4.5 UI Automation

4.6 QTP

4.7 QTP3

4.8 QTP

5 (12)

1.QTP.:,2013

2. []James WhittakerJason ArbonJeff CarolloGoogle. .2013

Selenium

S106B004

Pattern Recognition Technology

32 2

4

5

*#

1 (2)

1.1 *

1.2 *

1.3

1.4

2 (6)

2.1

2.2 Bayes*#

2.3 Bayes *#

2.4 *

2.5 Neyman-Pearsen

2.6

2.7

2.8

2.9 *

2.10Bayes*

2.11

3 (4)

3.1

3.2 *

3.3 *#

3.4 *

3.5

4 (4)

4.1

4.2 *

4.3 *

4.4

4.5

4.6 *#

5 (4)

5.1

5.2

5.3 *#

5.4 *#

5.5 K-L*#

6 Fisher (4)

6.1

6.2 fisher*

6.3 *#

6.4 *#

6.5 *#

7 (4)

7.1

7.2 *#

7.3 *#

7.4

8 (4)

8.1

8.2 *#

8.3 *#

8.4

Pattern Classification (second edition) (Richard O.Duda,etc

Statistical Pattern Recognition (second edition) Andrew R.Webb

Pattern Recognition(3rd Edition) () S. Theodoridis,etc

CodeS106B005

The Formal Semantics of Program

1Class Hours () 32 Credits 2

2Majors Concerned ()

Computer Science and Technology, Software Engineering

3Preparatory Courses

Discrete MathematicsProgramming Language

4Teaching Purpose ()

In order to adapt to the rapid development of computer science and technology and meet the demand for systems development personnel, it is necessary for the Graduates of Computer Science and Technologyto have a comprehensive understanding of The Formal Semantics of Program while deeply studying your own professional knowledge. In this way, the students can master the two essential components of the Programming language: the formal syntax and formal semantics of the language.

The course is an integral part of the programtheory, itprecisely define and explain the semantics of computer programming languages by taking mathematics as a tool as well as using symbols and formulas. Through this course, students can lay a solid foundation on the formal semantics of computer language, master the basic theory, basic methods and important conclusions of formal semantics. Also, they can learn about the latest research developments and hot spots at home and abroad to be well prepared for the future research.

5Teaching Method()

The course bases on lecturing in the classroom, supplemented by discussions among the students, also 25 percent experimental contents included (Axiomatic semantics proof based on Hoare's axiomatic method).

6Main Contents and Requirement for Students ()

semantic, true value and logic

1.1 proposition, sentence meaning and semantics

1.2 message types of the sentence meaning

1.3 study scope of the Formal Semantics of Program

1.4 statusof logic in the semantic study

alleged semantics

2.1 alleged semantic basis

2.2 storage semantics

2.3 environmental semantics

2.4 command semantics

2.5 examples ofalleged semantics

operational semantics

3.1 structured operation semantics andattributegrammar of program

3.2 machine calculation of application expression

axiomatic semantics

4.1 Hoare axiom system

4.2 Dijkstra's weakest precondition

4.3 Martin-Lof type theory

4.4 proof method of program correctness

semantics of concurrent programming languages

5.1 concurrent systems

5.2concurrent programming language and its

alleged semantics and axiomatic semantics

5.3 communication sequential process and its

operational semantics

instance applicationsof auxiliary formal

semantics description

axiomatic semantics proof experiment based on

Hoare's axiomatic method

7.1 programming of Hoare axiomatic rules

7.2 semantic nature of program to be proved: discretion of P(precondition) and

Q(postcondition).

7.3 derivation and validation logistic

7Referencing Textbooks and Required References for Students ()

Formal Syntax and Semantics of Programming Languages: a laboratory based approach. Kenneth Slonneger, Barry L. Kurtz. ISBN: 0-201-65697-3. Addison-Wesley Publishing Company. 1995.

8Author () Zhang, Kun

9Teacher () Zhang, Kun

S106B006

Principles and Methods of Artificial Intelligence

32 2

:

7

Stuart Russell, Peter Norvig2004

[1] 2010

[2] 2011

[3] 2004

[4] 2007

[1]Stuart Russell, Peter Norvig2004

[2] 2010

[3] 2011

S106B007

The Formal Semantics of Program

32 2

:

CC++Java

*#

1 (2)

1.1

1.2

1.3 *

1.4 *

2 (4)

2.1 *

2.2

2.3

2.4

2.5 *

3 (6)

3.1

3.2 *#

4 (8)

4.1 Hoare*

4.2 Dijkstra*#

4.3 Martin-Lof*#

4.4 *#

5 (6)

5.1

5.2 *

5.3 *#

6 (2)

7 Hoare(4)

7.1 Hoare

7.2 PQ

7.3 *#

1.(),..:,2006

2.,,..:,2000

3...:,1994

Glynn Winskel..:,2004

CodeS106B008

Distributed System

1Class Hours () 32 Credits 2

2Majors Concerned ()

Computer Science and Technology, Software Engineering

3Preparatory Courses

Computer Networking

4Teaching Purpose ()

This course aims to let students gain an understanding of the principles and techniques behind the design of distributed systems, such as locking, concurrency, scheduling, and communication across the network. Besides, students who choose this course should be able to gain practical experience designing, implementing, and debugging real distributed systems.

5Teaching Method()

In-class lecture and lab

6Introduction to the course ():

This course is an advanced course in computer networking and distributed systems. Topics include: communication, processes, naming, synchronization, consistency and replication, security, distributed object-based systems and so on.

7Main Contents and Requirement for Students ()

1 INTRODUCTION (2 hrs)

1.1 DEFINITION OF A DISTRIBUTED SYSTEM

1.2 GOALS

1.3 HARDWARE CONCEPTS

1.4 SOFTWARE CONCEPTS

1.5 THE CLIENT-SERVER MODEL

2 COMMUNICATION (4 hrs)

2.1 LAYERED PROTOCOLS

2.2 REMOTE PROCEDURE CALL

2.3 REMOTE OBJECT INVOCATION

2.4 MESSAGE-ORIENTED COMMUNICATION

2.5 STREAM-ORIENTED COMMUNICATION

LAB 1 SIMPLE DISTRIBUTED COMPUTING

3 PROCESSES (6 hrs)

3.1 THREADS

3.2 CLIENTS

3.3 SERVERS

3.4 CODE MIGRATION *

3.5 LOAD BALANCE *

3.6 SOFTWARE AGENTS *

LAB 2 ROOM DISTRIBUTION BASED UPON JAVA RMI

4 NAMING (2 hrs)

4.1 NAMING ENTITIES

4.2 LOCATING MOBILE ENTITIES

4.3 REMOVING UNREFERENCED ENTITIES

5 SYNCHRONIZATION (5 hrs)

5.1 CLOCK SYNCHRONIZATION

5.2 LOGICAL CLOCKS

5.3 GLOBAL STATE

5.4 ELECTION ALGORITHMS

5.5 MUTUAL EXCLUSION

5.6 DISTRIBUTED TRANSACTIONS

LAB 3 PERSONAL CALENDAR BASED ON CORBA

6 CONSISTENCY AND REPLICATION (2 hrs)

6.1 INTRODUCTION

6.2 DATA-CENTRIC CONSISTENCY MODELS

6.3 CLIENT-CENTRIC CONSISTENCY MODELS

6.4 DISTRIBUTION PROTOCOLS

6.5 CONSISTENCY PROTOCOLS

6.6 EXAMPLES

7 FAULT TOLERANCE (4 hrs)

7.1 INTRODUCTION TO FAULT TOLERANCE

7.2 PROCESS RESILIENCE

7.3 RELIABLE CLIENT-SERVER COMMUNICATION

7.4 RELIABLE GROUP COMMUNICATION

7.5 DISTRIBUTED COMMIT

7.6 RECOVERY

LAB 4 THE SOLUTION FOR BYZANTINE GENERAL PROBLEM

8 DISTRIBUTED OBJECT-BASED SYSTEMS (5 hrs)

8.1 CORBA TECHNOLOGY

8.2 DISTRIBUTED COM

8.3 JAVA RMI

8.4 COMPARISON OF CORBA, DCOM, AND RMI

9 NEW TECHNOLOGY WEB SERVICES (4 hrs)

9.1 INTRODUCTION

9.2 GOALS OF WEB SERVICES

9.3 UDDI,WSDL,SOAP and XML

9.4 FAMOUS COMPANIES JOBS

9.5 MS .Net

9.6 WEB SERVICES AND GRID COMPUTING

8Referencing Textbooks and Required References for Students ()

Textbooks :

Andrew S. Tanenbaum, Maarten van Steen. Distributed Systems: Principles and Paradigms, second edition (photocopy edition), Beijing: Tsinghua University Press, 2008.

ReferencesGeorge Coulouris, Jean Dollimore and Tim Kindberg. Distributed Systems: Concepts and Design, fifth edition (photocopy edition), Beijing: Mechanical Industry Press, 2012.

References for Students

Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications

http://pdos.csail.mit.edu/papers/chord:sigcomm01/chord_sigcomm.pdf

Freenet: A Distributed Anonymous Information Storage and Retrieval System

http://homepage.cs.uiowa.edu/~ghosh/freenet.pdf

A Survey of Peer-to-Peer Security Issues

http://www.cs.rice.edu/~dwallach/pub/tokyo-p2p2002.pdf

MapReduce: simplified data processing on large clusters

http://www.cs.amherst.edu/~ccm/cs34/papers/p107-dean.pdf

Refactoring android Java code for on-demand computation offloading

http://dl.acm.org/citation.cfm?doid=2384616.2384634

A Secure Migration Process for Mobile Agents

http://iel.ucdavis.edu/publication/2011/SPE.pdf

XML-Based Agent Communication, Migration and Computation in Mobile Agent Systems

http://iel.ucdavis.edu/publication/2008/JSS8098.pdf

Epidemic algorithms for replicated database maintenance

http://bitsavers.informatik.uni-stuttgart.de/pdf/xerox/parc/techReports/CSL-89-1_Epidemic_Algorithms_for_Replicated_Database_Maintenance.pdf

Tutorial: Gossip Protocols for Large-Scale Distributed Systems

http://sbrc2010.inf.ufrgs.br/resources/presentations/tutorial/tutorial-montresor.pdf

Scalable Application Layer Multicast

http://pages.cs.wisc.edu/~suman/pubs/sigcomm02.pdf

Toward Automatic Context-based Attribute Assignment for Semantic File Systems.

http://www.pdl.cmu.edu/PDL-FTP/ABN/CMU-PDL-04-105.pdf

Why cant I nd my les?

http://www.pdl.cmu.edu/PDL-FTP/Storage/hotOS03.pdf

9Author () Zhao, Yang

10Teacher () Zhao, Yang

S106B009

Information Security

32 2

*#

1 (4)

1.1

1.2

1.3

1.4

1.5

2 * (16)

2.1

2.2

2.3

2.4

2.5

2.6

2.7

2.8

2.9

2.10

3 *(6)

3.1

3.2

4 *# (6)

4.1

4.2

1. 2008

22008

Code S106C001

Bioinformatics

1Class Hours ()32 Credits2

2Majors Concerned ()

Pattern Recognition and Intelligent System

3Preparatory Courses

Machine Learning, Pattern Recognition Technique

4Teaching Purpose ()

The main purposes of this course are to bring fundamental introduction and future directions of bioinformatics to students, broaden the students horizons, and build a solid foundation for future scientific research.

5Teaching Method()

Teaching methods of this course include teaching, self-learning, and reading report.

6Introduction to the course ()

Bioinformatics is an emerging interdiscipline of biology, computer science, information science, statistics, and so on.

Prospective students should have basic knowledge on molecular biology, computer science, and mathematics. Particularly, students should learn machine learning and pattern recognition technique courses in advance.

After finishing this course, students will master basic tools and have the capability to perform related genomics and proteomics research.

7Main Contents and Requirement for Students ()

Chapter 1 - Overview of bioinformatics (2)

1.1 The scope of bioinformatics

1.2 Bioinformatics and Internet

1.3 Useful bioinformatics sites on the WWW

Chapter 2 - Data acquisition (2)

2.1 Sequence DNA,RNA and proteins

2.2 Determination of protein structure

2.3 Gene and protein expression data

2.4 Protein interaction data

Chapter 3 - Databases - contents, structure and annotation (2)

3.1 File formats

3.2 Annotated sequence databases

3.3 Genome and organism-specific databases

3.4 Miscellaneous databases

Chapter 4 - Retrieval of biological data (2)

4.1 Data retrieval with Entrez and DEGET/LinkDB

4.2 Data retrieval with SRS (sequence retrieval system)

Chapter 5 - Searching sequence databases (4)

5.1 Sequence similarity searches

5.2 Amino acids substitution matrices

5.3 Databases searches: FASTA and BLAST

5.4 Sequence filters

5.5 Iterative databases searches and PSI-BLAST

Chapter 6 - Multiple sequence alignment (2)

6.1 Multiple sequence alignment and family relationship

6.2 Protein families and pattern databases

6.3 Protein domain families

Chapter 7 - Sequence annotation (2)7.1 Principles of genome annotation7.2 Annotation tools and resources

Chapter 8 - Structural bioinformatics (8)

8.1 Conceptual models of protein structure

8.2 The relationship of protein three-dimensional structure to protein function

8.3 The evolution of protein structure and function8.4 Obtaining, viewing and analyzing structural data 8.5 Structural alignment8.6 Classification of proteins of known three-dimensional structure: CATH and SCOP8.7 Introduction to protein structure prediction8.8 Structure prediction by comparative modeling8.9 Secondary structure prediction8.10 Advanced protein structure prediction and prediction strategies

Chapter 9 - Microarray data analysis(2)

9.1 Microarray data: analysis methods 9.2 Microarray data: tools and resources 9.3 Sequence sampling and SAGE

Chapter 10 - Seminar on Bioinformatics (8)

10.1 Literature review in Bioinformatics

10.2 Discussion on selective papers of structural bioinformatics

8Referencing Textbooks and Required References for Students ()

Referencing Textbook:

Charlie Hodgman, Andrew French, and David R.Westhead. Instant Notes in Bioinformatics, Taylor & Francis; 2 edition (September 24, 2009).

Required References

Five most recently published papers in bioinformatics.

9Author () Yu, Dong-Jun

10Teacher () Yu, Dong-Jun

S106C003

Applied Cryptography

32 2

:

1

1.1

1.2

1.3

2

2.1

2.1.1

2.1.2

2.2

2.2.1

2.2.2

2.2.3 NP

2.2.4

2.3

2.3.1

2.3.2

2.3.3

2.3.4

2.3.5

3

3.1

3.1.1

3.1.2

3.1.3

3.2

3.2.1

3.2.2 salt

3.2.1 skey

3.3

3.3.1

3.4

3.5

3.6

3.7

4

4.1

4.2

4.3

4.4

5

5.1

5.1.1

5.1.2

5.1.3

5.2

5.2.1

5.2.2

5.2.3

6

6.1

6.2

6.3

6.3.1

6.3.2

6.3.3

7

7.1

7.2 Diffie-Hellman

7.3

7.4 RSA

7.5 DSA

7.6

Hash

(1)

(2)

(3) hash

Bruce Schneier. (C). 2000.

William Stallings.:(4). 2006

. . 2000

Code S106C004

Fundamentals of Image Analysis

1Class Hours ()32 Credits2

2Majors Concerned ()

Computer Science and Technology, Pattern Recognition and Intelligent System,Biomedical Engineering

3Preparatory Courses

Experience with C/C++ or Matlab. Courses on Matrix Theory, Probability Theory

4Teaching Purpose ()

This is an advanced senior and graduate level elective course on Digital Image Processing and Analysis, which provides a comprehensive theory of various image processing tasks and the practical experience to simulate them. Upon the completion of this course, the students will have gained a hands-on experience about the below topics through extensive simulation assignments.

To study the image fundamentals and mathematical transforms necessary for image processing. To study the image enhancement techniques To study image restoration procedures. To study the image compression procedures. To study the image segmentation and representation techniques.

5Teaching Method()

Combined tutorial mode and Class Teaching

Group discussion: Small-group discussion consists of two to six students and is given a task to do or a topic to discuss. One student may be selected to summarize the group's discussion for the whole class.

Practice: Matlab Programming for Image Processing Algorithm Implementation;C++ Programming Practice in Image Processing

Seat work. Following a teacher-directed or group discussion, each student is assigned a project to consider or work to be completed that is related to what preceded it

6Main Contents and Requirement for Students ()

Chapter 1: Digital Image Fundamentals 2h

What is an image?

Image Representation

Human visual system

Sampling and Fourier analysis

Chapter 2:Spatial Image enhancement Technique 4h

Basic grey level transformation

Histogram equalization

Image subtraction

Image averaging

Spatial filtering: Smoothing, sharpening filters Laplacian filters

Chapter 3:Basic transformations and Frequency domain filters 4h

Introduction to Fourier Transform and DFT Properties of 2D Fourier Transform FFT Separable Image Transforms -Walsh Hadamard Discrete Cosine Transform, Haar, Slant Karhunen Loeve transforms.

Frequency domain filters : Smoothing Sharpening filters Homomorphic filtering

Chapter 4:Image Restoration and Reconstruction 6h

Model of Image Degradation/restoration process

Noise models

Inverse filtering

Least mean square filtering

Constrained least mean square filtering

Blind image restoration

Pseudo inverse

Singular value decomposition

Chapter 5:Morphological Image Processing 4h

Erosion, dilation, opening, closing

Basic Morphological Algortihms: hole filling, connected components, thinning,

skeletons

Chapter 6: Color Image Processing 2h

Color Models

Color Transforms

Image Segmentation Based on color

Chapter 7: Image Compression 4h

Fundamentals

Basic Compression Methods

Chapter 8: Image Segmentation and measurements 6h

Edge detection Thresholding - Region Based segmentation

Boundary representation: chair codes- Polygonal approximation Boundary segments boundary descriptors: Simple descriptors-Fourier descriptors - Regional descriptors

Texture

7Referencing Textbooks and Required References for Students ()

Textbooks:

Digital Image Processing (3rd edition), Rafael C. Gonzalez and Richard E. Woods, Prentice Hall, 2007, ISBN 013168728X, http://www.imageprocessingplace.com

Digital Image Processing Using MATLAB, Rafael C. Gonzalez, Richard E. Woods, and Steven L. Eddins, Prentice-Hall, 2003. ISBN 0130085197

Additional References:

Handbook of Image and Video Processing, Publisher: Academic Press; 2 edition (June 21, 2005), Alan C. Bovik (Author)

Computer Vision Research Groups: http://www-2.cs.cmu.edu/~cil/v-groups.html

ITK - Segmentation & Registration Toolkit

8Author () XiaoLiang, Wei, Zhihui

9Teacher () Xiao, Liang

CodeS106C005

Services Computing and Business Process Management (I)

1. Class Hours ()32 Credits2

2Majors Concerned ()

Computer Science and Technology, Software Engineering

3Preparatory Courses

Software Engineering, Database

4Teaching Purpose ()

This course aims to let students gain an understanding of the paradigm of services computing and business process management, as well as related techniques and approaches, like SOA and loosely-couple, Web services, service composition, workflow, BPEL, Petri nets, etc. Besides, students are expected to understand the mergence of services computing and business process management (BPM).

5Teaching Method()

In-class lecture

6Introduction to the course ()

This course is an advanced course of software engineering. Topics include: the paradigm of services computing, SOA and loosely-couple, Web services, service composition, business process management, workflow, Petri nets, BPEL, formal verification for services and business processes, and so on.

7Main Contents and Requirement for Students ()

1 INTRODUCTION (4 HRS)

1.1 PARADIGM OF SERVICES COMPUTING

1.2 BUSINESS PROCESS MANAGEMENT

1.3 RELEVANT CONFERENCES AND JOURNALS

2 SERVICES COMPUTING (5 HRS)

2.1 SERVICE-ORIENTED ARCHITECTURE (SOA)

2.2 WEB SERVICES

2.3 WSDL,UDDI, SOAP

2.4 RESTFUL SERVICES

3 SERVICE COMPOSITION (6 HRS)

3.1 PROGRAMMING-IN-THE-LARGE

3.2 SERVICE COMPOSITION

3.3 SERVICE ORCHESTRATION

3.4 SERVICE CHOREOGRAPH

3.5 BPEL

4 BUSINESS PROCESS MANAGEMENT (5 HRS)

4.1 WORKFLOW AND BUSINESS PROCESS

4.2 WHERE SERVICES COMPUTING AND BUSINESS PROCESS MEET

4.3 KEY ISSUES RELATED TO BUSINESS PROCESS MANAGEMENT (BPM)

4.4 ABSTRACT AND EXECUTABLE PROCESSES

5 FORMAL VERIFICATION(6 HRS)

5.1 FORMAL METHODS

5.2 PETRI NETS

5.3 ANALYSIS TECHNIQUES OF PETRI NETS

5.4 WORKFLOW NETS

5.5 WORKFLOW VERIFICATION AND ANALYSIS

6 DISCUSSION (6 HRS)

6.1 HOT TOPICS

6.2 FURTHER STUDY

6.3 DISCUSSION ON SOME TOPICS

8Referencing Textbooks and Required References for Students ()

Textbooks

Thomas Erl. Service-Oriented Architecture: Concepts, Technology, and Design, Beijing: Science Press, 2012.

Dumas, Marlon, et al. Fundamentals of business process management. Berlin: Springer, 2013.

Required References for Students:

Service-Oriented Computing: State-of-the-Art and Open Research Issues

https://doc.freeband.nl/dsweb/Get/Rendition-19063/UvT%20SOC%20research%20agenda.pdf

Service-oriented computing

http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1607964

Petri nets: Properties, analysis and applications

http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=24143&tag=1

The application of Petri nets to workflow management

http://www.worldscientific.com/doi/abs/10.1142/S0218126698000043

9Author () Song, Wei

10Teacher () Song, Wei

CodeS106C006

Machine Learning

1Class Hours () 32 Credits 2

2Majors Concerned ()

Computer Science and Technology, Pattern Recognition and Intelligent system

3Preparatory Courses

Probability and Statistic, Linear Algebra, Optimization

4Teaching Purpose ()

The purpose of this course is to introduce the basic algorithms of machine learning, let students have strong fundamentals of machine learning and the ability of using machine learning algorithms to address real-world applications.

5Teaching Method()

This course is conducted in a combined manner including teaching, seminar, etc.

6Introduction to the course ()

The main content of this course contains: 1) the fundamental algorithms of machine learning, such as linear regression, Perceptron model, logistic regression, support vector machines, nave Bayes, etc.; 2) the key concepts and principles in machine learning, such as assumption, learning, inferences, model selection, generalization, etc.; 3) real-world machine learning application such as text classification system.

7Main Contents and Requirement for Students ()

1. Introduction

1.1 What is machine learning

1.2 The History of machine learning

1.3 Real-world applications of machine learning

2. Basic concepts in machine Learning

2.1 Supervised machine learning

2.2 Semi-supervised, unsupervised machine learning

2.3 Cost function and model learning

2.4 Evaluation and model selection

2.5 Over-fitting and Regularization

3. Linear regression

3.1 Regression and classification

3.2 Least mean square criterion

3.3 Maximum likelihood estimation

3.4 Application of linear regression

4. Logistic regression

4.1 Model assumptions

4.2 Model learning

4.3 Gradient descent, Newtons method, and Quasi-Newton

4.4 Softmaxregresson

5. Perceptron

5.1 The perceptron criterion

5.2 Parameter learning

5.3 Stochastic gradient descent

6. Support vector machines

6.1 Maximum margin criterion

6.2 Dualoptimzation

6.3 Soft-margin SVM

6.4 Kernel functions

6.5 How to use the LIBLINEAR toolkit

7. Nave Bayes

7.1 Generative model vs. Discriminative model

7.2 Multinomial event model

7.3 Parameter learning based on MLE

7.4 Bayes decision rule

7.5 Applications of Nave Bayes

8. Semi-supervised and unsupervised machine learning

8.1 Self-training

8.2 Co-training

8.3Transductive SVM

8.4 Semi-supervsed Nave Bayes based on EM algorithm

8.5 K-means clustering

8.6 Gaussian Mixture Model

9. Ensemble learning

9.1 The principle of ensemble learning

9.2 Ensemble rules

9.3 The Bagging algorithm

9.4 The Boosting algorithm

9.5 The other ensemble learning algorithms

10. Machine learning practice

10.1 Implementation of supervised machine learning algorithms

10.2 Design of a text classification system

8Referencing Textbooks and Required References for Students ()

Textbooks

Tom M. Mitchell, Machine Learning, McGraw Hill, 1997

Bishop C. M. Pattern recognition and machine learning. New York: springer, 2006.

Reading materials

1. Linear regression: http://cs229.stanford.edu/notes/cs229-notes1.pdf

2. Perceptron model: Bishop, Pattern recognition and machine learning, Section 4.1

3. Support vector machines:

http://cs229.stanford.edu/notes/cs229-notes3.pdf

http://blog.pluskid.org/?page_id=683

http://ntu.csie.org/~piaip/svm/svm_tutorial.html

4. Nave Bayes:

http://cs229.stanford.edu/notes/cs229-notes2.pdf

5. EM Algorithm:

http://cs229.stanford.edu/notes/cs229-notes8.pdf

http://www.cs.columbia.edu/~mcollins/em.pdf

6. Gaussian Mixture Model:

http://cs229.stanford.edu/notes/cs229-notes7a.pdf

http://cs229.stanford.edu/notes/cs229-notes7b.pdf

http://home.in.tum.de/~xiaoh/pub/em.pdf

Bishop, Pattern recognition and machine learning, Chapter 9

9Author () Xia, Rui ()

10Teacher () Xia, Rui ()

CodeS106C007

Trusted Computing Technologies

1.Class Hours ()32 Credits2

2Majors Concerned ()

Computer Science and Technology, Software Engineering

3Preparatory Courses

Operating System ;Computer Networks;Information Security and Cryptography

4Teaching Purpose ()

This course is designed to guide graduate students in computer science and technology program to understand the cutting-edge Trusted Computing technologies and application specifications. Students after the class should achieve cognition and familiarity of the followings:

The basic and advanced Trusted Platform Modules (TPM) capabilities

The good practice of TPMs and related technologies in academic researches and enterprise applications

The thought and experience in applying the necessary tools and information to design and build systems that take advantage of trusted computing

5Teaching Method()

This is a graduate-level course with a proper combination of in-class lectures, seminars and out-of-class readings and projects. The instructor uses lectures to explain the concepts and Specifications from TCG architectures. Then the students are grouped to survey and discuss in each TCG work group and solution. Publications from top-tier Trusted Computing conferences and journals such as IEEE ATC, TDSC are carefully selected and assigned to students as out-of-class readings. Typical and signification TPM implementations and applications are brought to class for discussion.

6Main Contents and Requirement for S