Course Description - cs.ucf.edudcm/Teaching/COT4810-Spring … · Web viewDiscrete-continuous...
Click here to load reader
-
Upload
truongkhuong -
Category
Documents
-
view
213 -
download
1
Transcript of Course Description - cs.ucf.edudcm/Teaching/COT4810-Spring … · Web viewDiscrete-continuous...
Assessment Report for COT4810 Section 1
COT 4810: Topics in Computer Science (Spring 2013)Designation: Required for BSCS program.
Catalog Description:A range of topics from the field of computer science. Applications of oral and written communication skills. Social, ethical and moral issues of computing. The societal implication of advances in computer and information sciences and technologies,.
Pre-requisite and/or Co-requisite Course(s):COP 3402, COP 3503, and COT 3960 (Foundation Exam)
References: (the links to the papers were provided on the class Web site)Required reading: How to give a talk Turing awards - http://awards.acm.org/homepage.cfm?awd=140Classical papersComputational models: Turing, Turing-correctionEarly computers: UNIVAC-report, vonNeuman- Probabilistic Logic Programming languages: Hoare, Backus, Distributed systems: “Distributed snapshots: determining the global states of distributed systems” by K. Mani Chandy and Leslie LamportSurvey papersAlgorithms: Local Ratio Approximation Algorithms, Approximate String Matching, Designing Programs that Check their Work, External Memory AlgorithmsArchitecture: Processor with Explicit Multi-threading, Networks on a Chip, Power Reduction of Microprocessors, Reconfigurable Computing, Cellular AutomataCollaboration networks: NewmanCompiling: Just in Time (JIT) CompilationDistributed systems: Group Communication, Publish-subscribe Paradigm, Access Control in Collaborative Systems, Roll Back Recovery ProtocolsFuture challenges: Gordon Bell’s talkModels: Modeling Time in ComputingNetworking and Ad-hoc Networks: Packet Classification Techniques, Anonymity Communication, Peer-to-peer Contents Distribution, Overlay Networks, Topology Control in Ad-hoc Networks Novel paradigms: Introduction to Quantum Computing, Quantum Cryptography Novel applications: Computer Systems for Music, Face Recognition, Bioinformatics
Page 1 of 14
Programming languages: Data Flow Programming Languages,Security: Key Management for Secure Communication, Denial of Service AttacksSensor: Sensor Networks Survey, OS for Sensor Networks, Sensor Networks Security, Information Fusion in Sensor Networks, Utility computing, grids, and clouds: Berkeley Report, Data GridsWeb: Web Metrics, Replication for Web Hosting, Web Page Classification, Web Cache Replacement Strategies
“Algorithms design and analysis techniques” by E.M. Reingold, in Algorithm and Theory of Computation Handbook, Edited by M.K. Atallah, CRC Press, 1999, ISBN 0-8493-2649-4.“Consistent global states of distributed systems; fundamental concepts and mechanisms” by O. Babaoaglu and K. Marzullo. In Distributed Systems, Edited by Sape Mullender, pp. 55-94, Addison-Wesley, 1993, ISBN 0-2-1-62427-3.“Authentication in distributed systems” by Butler Lampson. In Distributed Systems, Edited by Sape Mullender, pp. 543-579, Addison-Wesley, 1993, ISBN 0-2-1-62427-3
Course Outcomes and MeasuresCourse Outcome & Measures Mapping to
Program Outcomes
PerformanceCriteria
Outcome 1: To enhance professional oral and written communication skills of every student in the class. Each student gives two, 25 minutes, presentations and answers questions related to the papers presented.Measures the oral skills in
1. Two presentation2. The answers to questions related to each the presentation
Measures the written skills:1. Two papers, each expanding on the ideas discussed in the presentation. Each
paper was structures as a paper submitted to a publication to a journal.
#5,#6, #7 70% of students score 70% or above
Outcome 2: To test the ability to grasp major ideas in a presentation and to critically evaluate presentations of their peers. The students are asked to:
a. Provide a review of the paper(s) including ethics and technological changes issues;b. Analyze the depth of the technical discussion;c. Evaluate the clarity of the presentation;d. Evaluate the interaction with the audience and the answers to the questions;e. Provide additional comments and suggestions for improvements.
Measures the writing skills exhibited in the:1. 33 reviews of the papers presented by other students.
#5, #6, #7 70% of students score 70% or above
Page 2 of 14
Course Outcome & Measures Mapping toProgram Outcomes
PerformanceCriteria
Outcome 3: To understand the process of technological changes in the society and the role of computer science. The students are required to read the relevant papers related to each presentation, comment on the process of technological changes in the society and the role of computer science, and write a final paper. Recognize the need for continuing professional development and shall demonstrate the knowledge of research tools and professional resources necessary to accomplish this end. Measures the quality of the:
1. Paper on social impact of information science and technology.
#6,#7,#8 70% of students score 70% or above
Outcome 4: To understand the basic ethical and professional issues inherent in the discipline of computing. To enhance student ability to objectively evaluate a presentation. The students are required to read the relevant papers related to each presentation, comment on the ethical and professional issues inherent in the discipline of computing, and write a final paper. Measures the quality of the:
1. Paper on ethical implications of computer and information
#5,#6 70% of students score 70% or above
Quality Goal: 70% of all students who receive 70% or above shall meet or exceed the assessment threshold for each Course Assessment Outcome.
Relationship of the course to the Degree Program Outcomes: BSCS Degree Program, Outcome 5: Demonstrate an understanding of professional, ethical, legal, security, and social issues and
responsibilities. CAC(e) (maps to course outcome #4 ) BSCS Degree Program, Outcome 6: Communicate effectively with a range of audiences; in particular, graduating majors shall
demonstrate effective oral and written communication skills while disseminating technical information about computing technology and its applications. CAC (f) (maps to course outcomes #1 and #2 )
BSCS Degree Program, Outcome 7: Analyze the local and global impact of computing on individuals, organizations and society. CAC(g) (maps to course outcomes #3 )
Page 3 of 14
Relationship of the course to CAC Outcomes:
Course Outcomes
CAC Outcomesa b c d e f g h i j k
1 x2 x3 x4 x
Course Content and Assessment PlanAssignment Purpose Outcome Performance Criteria
Oral presentation, answers to questions, and the ability to write a paper on the subject 40 % of the grade.
Test student ability to expose clearly the technical ideas of one or more papers. To test their intellectual curiosity and ability to select relevant papers for the presentation.
#1 Two thirds should receive 80% or better
The ability to critically evaluate a presentation and grasp its main ideas. 20%of the grade.
To test the ability to grasp major ideas in a presentation and to critically evaluate the presentations of their peers.
#2 Two thirds should receive 80% or better
The paper on the social impact of computer science 20% of the grade.
To test student’s understanding of the social impact of technological changes and the role of computer science
#3 Two thirds should receive 80% or better
The paper on ethics.20% of the grade
To test students understanding of ethics in computer science
#4 Two thirds should receive 80% or better
Page 4 of 14
Topics Covered .Week 1MondayJanuary 7
Instructor Class organization
WednesdayJanuary 9
Instructor Ethics in computer science
FridayJanuary 11
Instructor Impact of information technology
Week 2MondayJanuary 14
Tony Aguilar Wireless networks
MondayJanuary 14
Brian Woods Machine learning in automated text characterization
WednesdayJanuary 16
Rodney Anderson Landmark recognition
WednesdayJanuary 16
Keith Williams Introduction to threading
FridayJanuary 18
Omar Garcia Defending against denial of service attacks
FridayJanuary 18
Neil Weber Network neutrality
Week 3WednesdayJanuary 23
Michael Galleti Surface detection in 3D worlds
WednesdayJanuary 23
Bryan Warren Network routing
FridayJanuary 25
Hosam Bassioni Copy protection
FridayJanuary 25
Daniel Vivas-Garcia User modeling
Page 5 of 14
Week 4MondayJanuary 28
Steven Batten RISC vs CISC architectures
MondayJanuary 28
Bruno Sobral Solid state drives
WednesdayJanuary 30
Thomas Beaver Wireless network security protocols and their vulnerabilities
WednesdayJanuary 30
John Singleton Playing poker with the devil; secure information flow in the Android environments
FridayFebruary 1
Melanie Kaproki Automated surveillance: how far is too far?
Week 5MondayFebruary 4
Nicholas Buelich Graph drawing
MondayFebruary 4
Cody Seibert Computer systems for expressive performance of music
WednesdayFebruary 4
Michael Cardenas CAPTCHA and reCAPTCHA Computer Security tools
WednesdayFebruary 4
Thomas Ollweiler Load balancing in content distribution networks
FridayFebruary 4
Daniel Carpenter The evolution of game artificial intelligence
FridayFebruary 4
Adam Nutt Unity3D and serious games
Page 6 of 14
Week 6MondayFebruary 11
Russell Cheatham Analysis of crypters and RATs (Remote Administrative Tools)
MondayFebruary 11
Jose Murillo Access control in collaborative systems
WednesdayFebruary 13
Ian Martin Computer and information ethics: a historical examination.
FridayFebruary 15
Jordan Dubique Computer-aided drug discovery
FridayFebruary 15
Jacob Hoffmann Google file system
Week 7MondayFebruary 18
Brandon Forster The patentability of algorithms
MondayFebruary 18
Jeffry Loppert Fault tolerance
WednesdayFebruary 20
Sarah Duncan Philosophical problems in AI
WednesdayFebruary 20
Kawai Lau Designing programs that check their work
FridayFebruary 22
Justin Frederick Current state of facial recognition
FridayFebruary 22
Taylor Kourim Impact of the digital millennium copyright act
Page 7 of 14
Week 8MondayFebruary 25
Michael Funchess Intellectual property protection
MondayFebruary 25
Rodney Anderson Context - free grammar in computational biology
WednesdayFebruary 27
Tony Aguilar Cellular automata
WednesdayFebruary 27
John Gibson Ada versus Java.
Week 10MondayMarch 11
Kwai Lau Cloud computing
MondayMarch 11
Brian Woods The ACM code of ethics
WednesdayMarch 13
John Gibson The world is in your hands – cellular phones
WednesdayMarch 13
Keith Williams Recursive functions
FridayMarch 15
Neil Weber Electronic waste
Page 8 of 14
Week 11MondayMarch 18
Michael Galletti Three states and a plan: the AI of F.E.A.R
MondayMarch 18
Bryan Warren File systems
WednesdayMarch 20
Hosam Bassiouni Modern GPUs
WednesdayMarch 20
Daniel Vivas-Garcia Google - the anatomy of a search engine
FridayMarch 22
Steven Batten Procedural generation
FridayMarch 22
Bruno Sobral Discrete-continuous optimization for multi-target tracking
Week 12MondayMarch 25
Thomas Beaver Quantum computing and quantum cryptography
MondayMarch 25
John Singleton Beautiful concurrency: a new approach to shared memory parallel processing
WednesdayMarch 27
Melanie Kaprocki Haptic technology
WednesdayMarch 27
Jacob Hoffmann History of concurrent programming
FridayMarch 29
Nicholas Buelich Genetic algorithm
FridayMarch 29
Cody Seibert An Overview of SIFT (Scale Invariant Feature Transform)
Page 9 of 14
Week 13MondayApril 1
Michael Cardenas Augmented reality
MondayApril 1
Thomas Ollweiler Intellectual Property and Related Ethical Concerns
WednesdayApril 3
Daniel Carpenter Digital rights management
WednesdayApril 3
Adam Nutt Using C++ within C#; a case study in Unity3D
FridayApril 5
Russel Cheatam Overview of the TOR network
FridayApril 5
Jose Murillo Before we knew it: zero-day attacks
Week 14MondayApril 8
Ian Martin Ethics and the advancement of military technology
WednesdayApril 10
Jordan Dubique Clinical Decision Support Systems
WednesdayApril 10
Michael Funchess Artificial neural networks and finite-state machines
FridayApril 12
Sarah Duncan Artificial neural networks
FridayApril 12
Jeffrey Loppert Recommender systems and the Netflix Prize
Page 10 of 14
Week 15MondayApril 15
Taylor Kourim The evolution of Google search
WednesdayApril 17
Justin Frederick Feasibility of electronic voting
WednesdayApril 17
Brandon Forster Mechanical computing
FridayApril 19
Faculty Quantum information processing
Class Schedule:
Number of sessions per week: 3 sessions per week Duration of each session: 50 minutes
Contribution of course to meeting the Professional Component: Math & Science Topics: <3> Engineering Topics: <0> General Education Topics: <0>
Page 11 of 14
Assessment Data
Course Outcome
s #1 #1 #2 #3 #4
Outcome#1
Outcome #2
Outcome #3
Outcome #4
Faculty evaluative of
student’s papers
Students evaluation of the student’s presentations
Student’s reviews
Societal impact paper
Ethicspaper
student1 98, 95 94, 95 100 90 85 96 100 90 85student2 98, 90 85, 85 69 90 90 90 69 90 90student3 98, 95 93, 92 85 100 100 95 85 100 100student4 95, 98 89, 93 42 100 100 94 42 100 100student5 92, 85 92, 92 91 95 90 90 80 95 100student6 90, 94 85, 90 87 90 95 90 87 90 95student7 85, 95 91, 93 91 95 90 91 91 95 90student8 92, 95 95, 92 70 95 90 94 70 95 90student9 98, 95 91, 93 71 95 90 94 71 95 90student10 70, 100, EC91 83, 93 88 100 98 100 88 100 98student11 95, 100 92, 91 62 95 90 95 62 95 90student12 90, 95 90, 91 97 95 90 92 97 95 90student13 92, 95 95, 92 91 92 100 94 91 92 100student14 90, 90 84,84 95 90 90 87 95 90 90student15 98, 0 94,0 0 0 0 48 0 0 0student16 98, 92 93, 93 11 95 92 94 11 95 92student17 98, 95 91, 93 100 100 90 94 100 100 90student18 98, 90 89, 88 100 100 90 91 100 100 90student19 90,95 91, 93 83 90 100 92 83 90 100student20 96, 100 93, 94 100 100 100 93 100 100 100student21 85,80 78, 75 91 80 80 80 91 80 80student22 92, 95 91, 90 77 95 92 92 77 95 92student23 100, 100 90, 90 55 98 95 95 55 98 95student24 95, 92 87, 92 91 98 80 92 91 98 80student25 85, 90 93, 92 86 98 98 90 86 98 98student26 90, 90 89, 91 97 100 98 90 97 100 98
Page 12 of 14
student27 100, 90 88, 91 95 98 100 92 95 98 100student28 99, 95 90, 93 91 100 100 94 91 100 100student29 100, 98 96, 88 100 98 95 95 100 98 95student30 98, 90 83, 85 89 90 85 89 89 90 85student31 90, 90 89, 88 17 98 100 89 17 98 100student32 95, 95 95, 95 69 90 88 95 94 100 100student33 90, 95 94, 87 0 80 60 92 0 80 60student34 95, 95 87, 91 86 90 80 92 86 90 80
Max Points 100 100 100 100 100 100 100 100 100
Performance Threshold %
80% 80% 80% 80% 80%34/34=100%
28/34=82%
33/34 = 97%
33/34 =97%
Page 13 of 14
Assessment Results AnalysisQuality Goal: 70% of all students who receive 70% or above shall meet or exceed the assessment threshold for each Course Assessment Outcome. Outcome 1: To enhance professional & technical oral and written communication skills.Outcome 2: To develop the ability to objectively evaluate a presentation of the peers and grasp the main ideas of a presentation.Outcome 3: To understand the societal impact of the development in computer and information sciences and technology.Outcome 4: To understand the basic ethical and professional issues in computer science and computer technology.
Quality goals have been exceeded for all four outcomes. The actual results for outcomes 1, 3, and 4 are exceptionally high, 100%, 97%, and 97%, respectively, while outcome 2 was also very good, 82%.
Recommendation based on Assessment Results
At the beginning of the class the instructor provided a list of topics and papers; this list included seminal papers, some written by Turing award winners, as well as, surveys of important areas of computer science. The students were asked to choose topics from this list or discuss with the instructor the possibility of presenting topics related to their research interests. This turned out to be a very good idea; the majority of the presentations were of a very high quality; they showed the enthusiasm of the students for their research and generated interesting discussions. The students are required to do a literature search and identify important resources for each topic they present. The majority of presentations cover multiple recent papers. Ethics questions and the impact of computer science and technology are addressed throughout the semester, as well as in several dedicated presentations.
The topics selected by the students covered a broad range of areas of computer science including: algorithms; architecture; distributed systems; Internet and networking; programming languages; security; intelligent systems, computer vision, gaming, and so on. This selection of topics allowed the students to follow the process of technological and theoretical changes and their impact for many areas of computer science. Virtually all presentations discussed the impact of technological changes and the ethics in computer science.
The class attendance was high and the students showed interest in the topic presented, as indicated by the fair number of questions during and after each presentation. Many CS students are involved in undergraduate research and their interest in research was stimulated. The students were encouraged to suggest improvements to the class.
Submitted by: Dr. Dan C. Marinescu Date: May 2013
Page 14 of 14