Spring 2013 Special Topics Offerings

All CSE 489 courses are cross-listed as IT 489.

CSE 489-01/589-01 Information Privacy, Mobile and Graph Data Management with Dr. Subhasish Mazumdar

  • Study the conflict between the need for data sharing/ distribution and the right to information privacy of individuals; how data mining tools used on public data can reveal private information; and proposed counter-measures such as k-anonymity.
  • Examine how to manage and use data on moving objects (e.g., to find a vehicle, help travelers find traffic conditions up the road); match mobile resources with mobile consumers (e.g., find customers for a cab driver); and preserve privacy of people who must expose their geographic location in order to avail of location-based services.
  • Explore domains (e.g., computer networks, biological networks, road networks, social networks, and professional networks) in which data yields meaningful information when conceptualized as graphs, the patterns in such graphs, and the challenges in information extraction from them.

The course involves lectures by the instructor and at least one paper presentation by each student.  Each student must participate in class discussion, judge presented ideas, and do an individual project.


CSE 489-02/589-02 Advances in Computing & Data Management with Dr. Abdelmounaam Rezgui

The objective of this course is to explore recent advances in computing and data management through an in-depth study of recent literature. Topics covered in computing include: multicore/multiprocessor systems, accelerators, interconnection networks, parallel and multicore programming languages and compilers, GPU computing, social computing, green computing, cloud computing and virtualization, crowdsourcing, and inter-cloud deployment of applications. Topics in data management include: new database architectures, storage and indexing, query processing and optimization, approximate query processing, NoSQL databases, big data, MapReduce, streams, spatial, temporal, multimedia, scientific, and sensor databases, data cleaning, data-center systems, performance and evaluation, benchmarking, and experimental methodology at scale.

CSE489-02/589-02 Full Course Description


CSE 489-03/589-03 Cloud Computing with Dr. Dongwan Shin

The primary objective of this course is to provide the techniques and practices of cloud computing, often called the internet as a platform. In addition, this course is to explore the current challenges facing cloud computing. Mainly focusing on cloud computing models, techniques, and architectures, this course will provide students with the advanced level of knowledge and hand-on experience in designing and implementing cloud-based software systems and applications. Topics include advanced web technologies (AJAX, Mashup, Web Services), distributed computing models and technologies, cloud service models (SaaS, PaaS, IaaS), virtualization, parallelization, security/privacy, and current issues of advanced research in cloud computing. This is a project-driven course, including two homework assignments and a term project.


CSE 489-04/589-04 Sensor Networks & Security with Dr. Hamdy Soliman

The class will focus on wireless sensor networks (WSN) security (confidentiality, integrity, authentication) in the context of all associated WSNs inherent constraints (e.g., limited computational/power budget, wireless medium vulnerabilities– such as intrusion and physical sensors’ capturing), and cover critical military (battle fields) & civil (health monitoring, airport security, boarder intrusion) applications/systems. The class will introduce to the science of smart WSN event detection systems- SWSNEDS -(architecture and applications), where neural networks (NNs) models are utilized to complement the system for final intelligent processing of the collected/sensed field data for better decision making (e.g., accurate detection of forest-fire, enemy boarder(field) intrusion, tsunami, earthquake, heart-attack, etc). In addition, major WSN’s security topics will be introduced, e.g., basic WSNs security vocabulary/definitions, attacks at different layers of the WSN-ZigBee protocol stack, WSNs Key Management schemes, etc.

Based on the knowledge obtained from the class lectures, CSE489 students will implement an experimental SWSNEDS unit for either forest-fire or boarder intrusion and emulate attacks on the implemented system, while utilizing the smart (NN) phase of the system to detect/filter such attacks. Meanwhile, CSE589 students will carry out an extra literature intensive research on the subject to bring/present some useful ideas/approaches to help enrich/fine-tune our implemented SWSNEDS model; such task will also involve the deployment of the lab SENSE simulator for performance measurements of our designed SWSNEDS model under different security techniques.


CSE 489-05/589-05 Soft Computing with Dr. Andrew Sung 

This course covers primarily the basic paradigms of neural networks and an introduction to fuzzy systems and evolutionary computation.  Additional topics may be added or substituted as appropriate to the class’ interest.  The purpose is to let students learn the important and versatile techniques of “soft computing” and develop skills to build systems for simulation, modeling, control, optimization, classification and prediction for problem solving in various science and engineering disciplines.


CSE 489-06/589-06 Mobile Systems and Applications with Dr. Jun Zheng

As mobile phones especially smartphones have been widely used by today’s users for their daily activities, the demand for new applications and services has increased dramatically which also opens up a new set of challenges. This course will discuss recent advances in mobile systems and applications, especially the advances in design and implementation of applications and services for smartphones. Topics covered in this course include introduction to smartphone platforms, networking for smartphone, smartphone sensing basics and crowd-sensing, location based services in smartphones, mHealth application, energy consumption and efficiency, context based computing, mobile security and privacy, mobile human computer interaction etc.