Formal Language Theory

Introduction to formal language theory. Topics include finite state languages, context-free languages, the relationship between language classes and formal machine models, the Turing Machine model of computation, theories of computability, resource-bounded models, and NP-completeness. It is recommended that students have a B- or better in COMPSCI 311 in order to attempt COMPSCI 501.

Honors Research

The Commonwealth Honors College thesis or project is intended to provide students with the opportunity to work closely with faculty members to define and carry out in-depth research or creative endeavors. It provides excellent preparation for students who intend to continue their education through graduate study or begin their professional careers. The student works closely with their 499Y Honors Research sponsor to pursue research on a topic or question of special interest to them in preparation for writing a 499T Honors Thesis or completing a 499P Honors Project.

Honors Thesis

Honors Thesis expectations are high. The intended end-product is a traditional research manuscript with accompanying artifact(s), all theses: - are 6 credits or more of sustained research on a single topic, typically conducted over two semesters. - begin with creative inquiry and systematic research. - include documentation of substantive scholarly endeavor. - culminate in an oral defense or other form of public presentation.

Honors Project

Honors Project expectations are high. The intended end-product is a traditional project manuscript with accompanying artifact(s), all projects: - are 6 credits or more of sustained research on a single topic, typically conducted over two semesters. - begin with creative inquiry and systematic research. - include documentation of substantive scholarly endeavor. - culminate in an oral defense or other form of public presentation.

Hnr Indstu In COMPSCI

This is a stand-alone independent study designed by the student and faculty sponsor that involves frequent interaction between instructor and student. Qualitative and quantitative enrichment must be evident on the proposed contract before consent is given to undertake the study. Further information is available at CHC PATHS (honors.umass.edu/chc-paths/). REGISTRATION SHOULD BE DONE DURING PRE-REGISTRATION AND COMPLETED BEFORE THE END OF THE ADD-DROP PERIOD.

S-Computer Networking Lab

In this course, students will learn how to put "principles into practice," in a hands-on-networking lab course. The course will cover router, switches and end-system labs in the areas of Single Segment IP Networks, Multiple Segment IP Networks and Static Routing, Dynamic Routing Protocols (RIP, OSPF and BGP), LAN switching, Transport Layer Protocols: UDP and TCP, NAT, DHCP, DNS, and SNMP. Students will also get engaged in evaluating power consumption of network components as an aid in the design of energy efficient (green) networks.

Intro to UX Research

As technology becomes more and more integrated with our work and life, it is increasingly critical to consider how we can better design technology to enhance the experience and behavior of its users. UX Research, or User Experience Research, is an interdisciplinary field that combines knowledge from computer science, design, statistics, and psychology to gather insights about the needs, attitudes, and behaviors of technology users to inspire and inform design. This course introduces you to the cycle of UX research and aims to prepare you to tackle real-world UX research challenges.

Applied Cryptography

An undergraduate-level introduction to modern cryptography, with a "theory applied to practice" viewpoint. Topics: Blockciphers, pseudorandom functions, symmetric-key encryption schemes, hash functions, message authentication codes, public-key encryption schemes, digital signature schemes, and public-key infrastructures.

Computer Networks

Introduction to computer communication networks and protocols. Fundamental concepts in the design and analysis of computer networks. Topics include: layered network architectures, networked applications, network programming interfaces, transport, congestion, routing, data link protocols, local area and data center networks, network security, and wireless networks. Examples drawn from the Internet (e.g., TCP, UDP, and IP) protocol suite.
Subscribe to