IT Course Descriptions
16:137:531 Introduction to User Experience Design (3)
An introduction to the field of User Experience Design (UXD) describing the process by which computer interfaces are specified, designed and tested so that they are easy to learn, understand and use by their intended user population. The course covers how such processes fit within industry and current software practices, how they are managed and what specific competitive advantages can be gleaned from them in addition to an introduction to the practitioner’s field, including conferences, blogs and recognized gurus of UXD.
16:137:541 Enterprise Software Architecture (3)
In this course, the design and processes contained within modern enterprise software will be discussed with special emphasis on systems in use in large organizations such as Oracle EBS, JD Edwards and SAP. The business processes supported by such systems as well as the internal data structures that represent them will also be covered. Students will learn Agile/SCRUM project management processes. Additionally, disaster recovery, high availability and inexpensive application scaling will be discussed. Special emphasis will be given to business process analysis and re-engineering. Students will be expected to complete a project related to enterprise software
16:194:672 Understanding and Building Social Media-An InterdisciplinaryApproach (3)
The goal of this project-based course is to merge social science, information science, and computer science approaches to explore the social and technological forces driving the design and use of social media services. Students will form interdisciplinary teams to conceptualize, design, and implement a social media application.
16:198:513 Design and Analysis of Data Structures and Algorithms I (3)
Worst case, average case, and amortized analysis. Data structures: search trees, hash tables, heaps, Fibonacci heaps, union-find. Algorithms: string matching, sorting and ordering statistics, graph algorithms. NP-completeness. Prerequisites: Admission requirements; familiarity with Prim and Kruskal minimum spanning tree algorithms and Dijkstra shortest path algorithm.
16:198:519 Operating Systems Theory (3)
Operating system basics; process management; synchronization, memory management; interprocess communication, network protocols, RPC, client-server architectures; file systems and distributed file systems; scheduling and security; current trends and case studies. Prerequisite: 01:198:416 or 16:198:505 or equivalent.
16:198:528 Parallel Numerical Computing (3)
Analysis of numerical algorithms for a variety of parallel architectures. Parallelization of existing algorithms. Mapping of algorithms onto various architectures. Techniques for developing fast parallel numerical algorithms. Algorithms implemented on existing simulators or actual parallel machines. Prerequisites: Numerical algorithms (01:198:323 or 16:198:510) and nonnumerical algorithms (01:198:344 or 16:198:503); basics of Unix, Fortran, or C.
16:198:541 (S) Database Systems (3)
Relational data model. Relational query languages and their expressiveness. Dependency theory and relational normalization. Physical database design. Deductive databases and object-oriented databases. Optimization of relational queries. Prerequisites: 01:198:336 or equivalent; 16:198:513. Recommended: 16:198:509 or equivalent.
16:198:545 Distributed Systems (3)
Basic mechanisms for building distributed systems (remote-procedure call, synchronization, transactions), components of distributed operating systems (file systems, distributed shared memory), and issues in wide-area distributed systems (security, wide-area clustering). Prerequisite: 16:198:519.
16:198:547 (F) Secure Computing, Applied to Ecommerce (3)
Foundations of secure distributed computing, including cryptographic algorithms, distributed access-control, and certain principles of software engineering.
16:198:552 Computer Networks
Computer network protocols and architecture. Protocol design. Internetworking and TCP/IP. Medium access, routing, and traffic control. Network security. Integrated and differentiated services. Network programming. Network simulation. Prerequisite: 01:198:416.
16:198:553 Design of Internet Services (3)
Internet applications, services, and programming models. Middleware, proxy caches, and directory services. Web server architecture and commodity clustering systems for scalable services. Electronic commerce. Multimedia streaming. Internet security and firewalls. Prerequisite: 16:198:552.
16:198:580 Topics in Computers in Biomedicine (3)
Survey of computational methods in biology or medicine; topics vary from instructor to instructor and may include computational molecular biology, medical reasoning, and imaging. Prerequisite: 16:198:513 or 520, depending on the semester, or permission of instructor.
16:198:583 Topics in Software Design (3)
In-depth study of selected topics in the areas of software engineering, distributed computing, and electronic commerce and security. Course leads to research in these areas. Prerequisites: Proficiency in at least two of the following areas: database systems, operating systems, programming languages, and AI.
16:198:587 Expert Systems (3)
Scope and characterization of expert systems. Consultation processes and expertise. Knowledge acquisition and representation. Methods of inference under uncertainty and problem-solving strategies. Review of existing expert systems and specialized languages. Prerequisites: 16:198:530 and permission of instructor.
22:198:611 Security for Electronic Commerce (3)
The objective of this course is to introduce to students the emerging area of electronic commerce (EC) and the security challenges and threats in EC, and provide them with an understanding of the state-of-the-art EC security technologies. In particular, this course discusses security requirements for electronic commerce such as identification and authentication, authorization and access control, data integrity, confidentiality, nonrepudiation, trust, and regulation. Discusses various security standards including network security architecture standards, data encryption standards, data integrity standards, digital signature standards, authentication standards, certification standards, electronic data interchange standards, and electronic mail standards. It also discusses the emerging internet standards, firewalls, public key cryptography standards, Java security, Lotus Notes security, database security, security payments such as SET (secure electronic transaction), digital cash and digital checks, and smart card technology.
26:198:643 Information Security (3)
Recent years have witnessed widespread use of computers and their interconnecting networks. This demands additional computer security measures to protect the information and relevant systems. This course prepares the students to meet the new challenges in the world of increasing threats to computer security by providing them with an understanding of the various threats and countermeasures. Specifically, students will learn the theoretical advancements in information security, state-of-the-art techniques, standards and best practices. In particular, the topics covered in this course include: Study of security policies, models and mechanisms for secrecy, integrity and availability; Operating system models and mechanisms for mandatory and discretionary controls; Data models, concepts and mechanisms for database security. Basic cryptology and its applications; Security in computer networks and distributed systems; Identity threat; Control and prevention of viruses and other rogue programs.
16:332:423 Computer and Communication Networks (3)
Problems of network synthesis and analysis. Includes network architectures for telephony and data network, circuit and packet multiplexing/switching methods, network design/routing algorithms via elementary linear/dynamic programming, layered protocol architectures, protocol design and analysis methods, and performance analysis. Prerequisite: 14:332:321.
16:332:544 (S) Communication Networks II (3)
Network and protocol architectures. Layered-connection management, including network design, path dimensioning, dynamic routing, flow control, and random-access algorithms. Protocols for error control, signaling, addressing, fault management, and security control. Prerequisite: 16:332:543.
16:332:560 Computer Graphics (3)
Computer-display systems, algorithms, and languages for interactive graphics. Vector, curve, and surface-generation algorithms. Hidden-line and hidden-surface elimination. Free-form curve and surface modeling. High-realism image rendering.
16:332:561 Machine Vision (3)
Image processing and pattern recognition. Principles of image understanding. Image formation, boundary detection, region growing, texture, and characterization of shape. Shape from monocular cues, stereo, and motion. Representation and recognition of 3-D structure. Prerequisite: 16:332:501.
16:332:562 Visualization and Advanced Computer Graphics (3)
Advanced visualization techniques, including volume representation, volume rendering, ray tracing, composition, surface representation, and advanced data structures. User interface design, parallel and object-oriented graphic techniques, and advanced modeling techniques. Prerequisite: 16:332:560.
16:332:563 Computer Architecture I (3)
Fundamentals of computer architecture using quantitative and qualitative principles. Instruction set design with examples and measurements of use, basic processor implementation: hardwired logic and microcode, pipelining; hazards and dynamic scheduling, vector processors, memory hierarchy; caching, main memory and virtual memory, input/output, and introduction to parallel processors; SIMD and MIMD organizations.
16:332:569 (F) Database System Engineering (3)
Relational data model, relational database management system, relational query languages, parallel database systems, database computers, and distributed database systems.
16:332:570 Robust Computer Vision (3)
A toolbox of advanced methods for computer vision using robust estimation, clustering, probabilistic techniques, and invariance. Applications include feature extraction, image segmentation, object recognition, and 3-D recovery. Prerequisite: 16:332:561.
16:332:571 Virtual Reality Technology (3)
Introduction to virtual reality; input/output tools; computing architecture; modeling; virtual reality programming; human factors, applications; and future systems. Prerequisite: 16:332:560.
16:332:572 Parallel and Distributed Computing (3)
Advanced topics in parallel computing including current and emerging architectures, programming models application development frameworks, runtime management, load balancing, and scheduling, as well as emerging areas such as autonomic computing, Grid computing, pervasive computing, and sensor-based systems. Prerequisites: 16:332:563, 564, and 566.
17:610:512 Interface Design (3)
Basic principles for designing the user interface in information systems, with special reference to computerized systems. Major topics include: relationships between users' models of information systems and the conceptual models presented to them; human cognitive capabilities; evaluation.
17:610:520 Organizing Information (3)
Introduction to the options and methods for describing and organizing messages, texts, and documents of all types (audio, visual, linguistic, graphic, multimedia) for retrieval. Classification; indexing languages, vocabulary management, and thesauri systems; human and machine techniques; and rationales for decisions about the organization of materials In various contexts. Students apply theory by designing and evaluating an Information retrieval (IR) database.
17:610:524 Metadata for the Information Professional (3)
Detailed examination of issues and problems relating to the creation and application of metadata in various information environments. Major metadata schemes, encoding standards, and container architecture are examined with emphasis on functions, syntax, semantics, quality and evaluation. Additional topics for examination will include resource identifiers, controlled vocabularies, and metadata project management.
17:610:534 Records Management (3)
Examination of the document life-cycle of the records of organizations: generation and control--filing, storage, and retrieval systems using various technologies; protection and disposition--retention regulations and practices. Discussion of how records management concepts and contexts differ from archives and library organization and retrieval systems.
17:610:535 Competitive Intelligence (3)
Competitive and strategic intelligence can support various corporate and organizational objectives and functions. Systematic programs for gathering, analyzing, and disseminating information for decision making. Special attention to the information audit; to tailored selection and analysis of information for given user groups; and assessment of quality and value of information services.
17:610:550 Information Technologies for Libraries and Information Agencies (3)
17:610:551 Information Retrieval (3)
Theory, design, use, and evaluation of information retrieval (IR) systems. Design principles for IR systems and their implementation, characteristics of operational and experimental retrieval systems, and evaluation of information retrieval systems.
17:610:552 Understanding Library Systems and Software Applications (3)
Covers the evaluation, selection, application, integration and management of information systems supporting library and information services. Includes systems and software for content management, circulation, acquisition, cataloging and access, and digital library networks.
17:610:553 Digital Libraries (3)
Fundamental issues, problems, and approaches to digital libraries, reflecting differing efforts and thinking in a number of fields and enterprises. Variety of digital library collections; organization, access, and use of digital libraries. Technical infrastructure; socioeconomic issues; integration of information resources; relation to traditional libraries. Current projects and initiatives.
17:610:554 Information Visualization and Presentation (3)
Design of presentations using texts, graphics, images, sounds. User interpretation, navigation, and interaction with visualizations. Visualization in information retrieval, and interfaces in library and information processes. Effective display and presentation of information in organizational contexts, using various formats, both print and electronic.
17:610:555 Multimedia Production (3)
A laboratory course in the design and production of multimedia resources for libraries, media centers, and information systems and other informational applications. Examines and critiques current uses of new media and provides skills in user-centered multimedia design.
17:610:557 Database Design and Management (3)
Relational, object oriented and other database systems as tools for management decision making, for inclusion on the web and for other purposes. Custom designing versus off-the-shelf applications.
17:610:558 Digital library Technology (3)
Organizational, technical, and logistical issues concerning the design and implementation of electronic collections, documents, and services. Students learn in the context of building their own prototype digital library.
17:610: 574 Knowledge Management in Organizations (3)
Critical approach to theories and applications of knowledge management in corporations and organizations, with special attention to multinationals. Knowledge as a resource and asset. Role of special librarians/information specialists as knowledge brokers. Knowledge repositories and transfer of technology. Applications of information technologies to knowledge management.
17:610:581 Social Informatics (3)
Technological innovation, computerization, and electronic information are associated with dilemmas, value conflicts, and choices surrounding the scholarly, personal, and professional use of information. Addresses social relationships, technological utopianism, societal control, vulnerability of information systems, and ethical responsibilities.
17:610:582 Information Policy (3)
The economic, social, and political forces affecting the introduction and implementation of current information legislation and policy, set within the theoretical context of frame refection. Emphasis on national and global policy in the design of evolving electronic infrastructures. Particular attention given to issues of access, including universal service, intellectual freedom, intellectual property rights, privacy, security, advocacy, equity, and the role of library and information professionals and organizations in policy formulation.
16:137: Enterprise Software Architecture (3) ***New Course
Suggested Business Electives:
53:623:510 Managing Information Technology and Resources (3)
Information technology (IT) is an important driver and enabler of the dramatic transformation of the business landscape. This course is designed to provide future managers with a fundamental understanding of the key IT issues for effective decision making on IT initiatives and investments, and manage the IT assets of an organization. Both managerial and technical aspects of IT management are discussed. Case studies and hands-on assignments reinforce the concepts and current business practices.
53:623:513 Emerging Information Technologies (3)
This course addresses emerging information technologies, their evolution, their identification, and the effects of cultural, social, political, and international factors on these technologies. Topics change from year to year and include web and ecommerce technologies. Prerequisite: 53:623:510.
53:623:518 Telecommunications and Network Security Management (3)
This course presents both the technical and managerial aspects of data communications and information security to better enable managers to define infrastructure requirements, evaluate network technology options, understand information vulnerabilities, and secure corporate resources. Topics include data communication and networking in the modern enterprise, internet and distributed applications, network protocols, wide area networks, local area networks, network management, information security technology, risk assessment, and information security planning and policy. Prerequisite: 53:623:510.