Fall 2011 Special Topics Offerings
All CSE 489 courses are cross-listed as IT 489.
CSE 489/589 Mobile Computing with Dr. Jun Zheng
The combination of wireless communication infrastructure and portable computing devices has laid the foundation for a new network computing paradigm, called mobile computing, which allows the users access information and collaborate with others while on the move. This course is an introduction of state of art in mobile computing and we will discuss the design, implementation, and evaluation of mobile computing technologies and applications. Topics covered in this course are wireless networking fundamentals, mobility management, mobile data management, location-based services, context-aware computing, mobile ad hoc and sensor networks, security for mobile systems etc.
CSE 489/589 Computer Vision with Dr. James Holten
Students will be introduced to the concepts of computer vision: what is meant, how it is done, and its current limitations. In-depth exercises will help the student to become familiar with the algorithms that are being used.
Content: Students will be exposed to the details of computer vision. They will cover the following:
1. Image acquisition and manipulation,
2. Basic features in images,
3. Stereo and image sequence processing,
4. Generating models from multiple image views,
5. Feature aggregation for object characterization, and
6. Object identification.
CSE 589 Sensor Networks with Dr. Hamdy Soliman
The class introduces to the sensor networks technology and their advantageous applications, keywords/terminologies, constraints, and challenges on the sensor networks field, in general, and a special focus on mobile ad-hoc wireless sensor networks in particular. In addition to the MAC protocols (e.g., S-MAC and IEEE 802.15.4-ZigBee), routing protocols at the network layer will be also covered. The challenging issue of routing over Mobile Ad-hoc Sensor Networks Wireless (MASNET) will be covered, including the latest research in the area of routeless routing protocols. Sensor networks security will be also covered, including node authentication, data confidentiality, and authenticity. There will be two proposed major si/emulation projects for modeling the deployment and operating performance of sensor networks for the detection of “forest-fire” and “borders-intrusion“, students might select one of the above simulation projects for their final class presentation and report. In addition, they will read in the literature any class related research topics, and present their findings as their midterm presentation exam.