Page 235 - 2016-2018 Graduate Catalog (Revised)
P. 235

elimination, modeling, shading, shadow generation, anti-aliasing, ray-
               tracing,  fractals,  animation  techniques,  color  theory,  graphics
               languages, and modern graphics.

               COSC  623     LOGIC, COMPUTABILITY AND AUTOMATA
               II
               Prerequisites: COSC 523
               Credits: 3
               Continuation  of  COSC  523.  The  theory  of  abstract  mathematical
               machines. Structural and behavioral classification of automata; finite
               state  automata;  theory  of  regular  sets.    Pushdown  automata,  linear
               bounded automata. Finite transducers. Universal Turing machines.


               COSC  631     DATABASE AND INFORMATION SYSTEMS II
               Prerequisites:  COSC 531
               Credits: 3
               Continuation of COSC 531. Advanced topics in data base design and
               information  management  systems.  Topics  include  normalization  and
               semantic  modeling,  view  integration,  recovery  and  concurrency,
               security  and  integrity,  data  base  machines,  distributed  and
               heterogeneous  data  base  management,  intelligent  data  bases,  and
               object-oriented systems.
               COSC  641     NUMERICAL ANALYSIS II
               Prerequisites: COSC 541
               Credits: 3
               This course is a continuation of COSC 541. The topics include numerical
               differentiation  and  integration;  the  solution  of  initial  value  and
               boundary ordinary differential equations; methods of solving nonlinear
               systems of
               equations; other topics as time permits.
               COSC  645     APPLIED CRYPTOGRAPHY
               Prerequisites: COSC 535
               Credits: 3
               This  course  teaches  students  some  of  the  basic  paradigms  and
               principles  of  modern  cryptography  and  their  applications.    After
               mathematical preliminaries from algebra and number theory, we will
               explore the following topics in the field:  foundations of cryptography,
               public  key  cryptography,  pseudorandom  generators,  elliptic  curve
               cryptography, and fundamental limits to information operations.


                                                                      234
   230   231   232   233   234   235   236   237   238   239   240