290D Advanced Data Mining
This is a graduate-level course on data mining. This time, we will specifically focus on neural network, deep learning, NLP, knowledge base, question answering, and text mining.
This is a graduate-level course on data mining. This time, we will specifically focus on neural network, deep learning, NLP, knowledge base, question answering, and text mining.
Great Presentations is a hands-on, practice-intensive course that focuses on the most important elements of excellent formal presentations. The fundamental principles discussed and practiced in class can be applied in a variety of contexts, including the short research or lab talk, the formal conference presentation, a poster presentation, a job talk, an interview, an “elevator talk,” a class presentation.
The purpose of the class is to explore current research topics and technological developments pertaining to the subject of "Cloud Computing."
Java-centric cluster computing: Java Remote Method Invocation; work-stealing; eager scheduling;
system & computational complexity issues; some cluster applications.
Java-centric concurrent programming: Design principles & patterns of concurrent Java programs.
Java's functional programming features
Topics that will be covered: elementary quantum mechanics, quantum information, quantum gates and circuits, quantum circuit complexity, teleportation, quantum cryptography, Shor's quantum algorithm for factoring integers and discrete logarithms, Grover's quantum searching algorithm, lower bounds in quantum computation, quantum error correction, and fault tolerant quantum computation.
Cryptography provides techniques, mechanisms, and tools for private and authenticated communication, and for performing secure and authenticated transactions over the Internet as well as other open networks. It is highly probable that every single bit of information flowing through our networks will have to be either encrypted and decrypted or signed and authenticated in a few years from now.
This course focuses on practical applications of and issues in Computer Security. This includes the study of exploitation techniques, software defenses, and recent developments in the field. Students will be expected to invest time, outside of class, developing an understanding of Computer Security concepts. In particular, there will be one take-home challenge per week that will be mandatory for everyone to complete.
Support for this seminar provided by Appfolio.