Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2009

Institution
Keyword
Publication
Publication Type

Articles 61 - 90 of 352

Full-Text Articles in Engineering

A Service Choice Model For Optimizing Taxi Service Delivery, Shih-Fen Cheng, Xin Qu Oct 2009

A Service Choice Model For Optimizing Taxi Service Delivery, Shih-Fen Cheng, Xin Qu

Research Collection School Of Computing and Information Systems

Taxi service has undergone radical revamp in recent years. In particular, significant investments in communication system and GPS devices have improved quality of taxi services through better dispatches. In this paper, we propose to leverage on such infrastructure and build a service choice model that helps individual drivers in deciding whether to serve a specific taxi stand or not. We demonstrate the value of our model by applying it to a real-world scenario. We also highlight interesting new potential approaches that could significantly improve the quality of taxi services.


Sharing Mobile Multimedia Annotations To Support Inquiry-Based Learning Using Mobitop, Khasfariyati Razikin, Dion Hoe-Lian Goh, Yin-Leng Theng, Quang Minh Nguyen, Thi Nhu Quynh Kim, Ee Peng Lim, Chew-Hung Chang, Kalyani Chatterjea, Aixin Sun Oct 2009

Sharing Mobile Multimedia Annotations To Support Inquiry-Based Learning Using Mobitop, Khasfariyati Razikin, Dion Hoe-Lian Goh, Yin-Leng Theng, Quang Minh Nguyen, Thi Nhu Quynh Kim, Ee Peng Lim, Chew-Hung Chang, Kalyani Chatterjea, Aixin Sun

Research Collection School Of Computing and Information Systems

Mobile devices used in educational settings are usually employed within a collaborative learning activity in which learning takes place in the form of social interactions between team members while performing a shared task. We introduce MobiTOP (Mobile Tagging of Objects and People), a geospatial digital library system which allows users to contribute and share multimedia annotations via mobile devices. A key feature of MobiTOP that is well suited for collaborative learning is that annotations are hierarchical, allowing annotations to be annotated by other users to an arbitrary depth. A group of student-teachers involved in an inquiry-based learning activity in geography …


Mining Globally Distributed Frequent Subgraphs In A Single Labeled Graph, Xing Jiang, Hui Xiong, Chen Wang, Ah-Hwee Tan Oct 2009

Mining Globally Distributed Frequent Subgraphs In A Single Labeled Graph, Xing Jiang, Hui Xiong, Chen Wang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Recent years have observed increasing efforts on graph mining and many algorithms have been developed for this purpose. However, most of the existing algorithms are designed for discovering frequent subgraphs in a set of labeled graphs only. Also, the few algorithms that find frequent subgraphs in a single labeled graph typically identify subgraphs appearing regionally in the input graph. In contrast, for real-world applications, it is commonly required that the identified frequent subgraphs in a single labeled graph should also be globally distributed. This paper thus fills this crucial void by proposing a new measure, termed G-Measure, to find globally …


Analyzing The Video Popularity Characteristics Of Large-Scale User Generated Content Systems, Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-Yeol Ahn, Sue Moon Oct 2009

Analyzing The Video Popularity Characteristics Of Large-Scale User Generated Content Systems, Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-Yeol Ahn, Sue Moon

Research Collection School Of Computing and Information Systems

User generated content (UGC), now with millions of video producers and consumers, is re-shaping the way people watch video and TV. In particular, UGC sites are creating new viewing patterns and social interactions, empowering users to be more creative, and generating new business opportunities. Compared to traditional video-on-demand (VoD) systems, UGC services allow users to request videos from a potentially unlimited selection in an asynchronous fashion. To better understand the impact of UGC services, we have analyzed the world's largest UGC VoD system, YouTube, and a popular similar system in Korea, Daum Videos. In this paper, we first empirically show …


Towards Google Challenge: Combining Contextual And Social Information For Web Video Categorization, Xiao Wu, Wan-Lei Zhao, Chong-Wah Ngo Oct 2009

Towards Google Challenge: Combining Contextual And Social Information For Web Video Categorization, Xiao Wu, Wan-Lei Zhao, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Web video categorization is a fundamental task for web video search. In this paper, we explore the Google challenge from a new perspective by combing contextual and social information under the scenario of social web. The semantic meaning of text (title and tags), video relevance from related videos, and user interest induced from user videos, are integrated to robustly determine the video category. Experiments on YouTube videos demonstrate the effectiveness of the proposed solution. The performance reaches 60% improvement compared to the traditional text based classifiers.


Distribution-Based Concept Selection For Concept-Based Video Retrieval, Juan Cao, Hongfang Jing, Chong-Wah Ngo, Yongdong Zhang Oct 2009

Distribution-Based Concept Selection For Concept-Based Video Retrieval, Juan Cao, Hongfang Jing, Chong-Wah Ngo, Yongdong Zhang

Research Collection School Of Computing and Information Systems

Query-to-concept mapping plays one of the keys to concept-based video retrieval. Conventional approaches try to find concepts that are likely to co-occur in the relevant shots from the lexical or statistical aspects. However, the high probability of co-occurrence alone cannot ensure its effectiveness to distinguish the relevant shots from the irrelevant ones. In this paper, we propose distribution-based concept selection (DBCS) for query-to-concept mapping by analyzing concept score distributions of within and between relevant and irrelevant sets. In view of the imbalance between relevant and irrelevant examples, two variants of DBCS are proposed respectively by considering the two-sided and onesided …


Motion Analysis Of Fluid Flow In A Spinning Disk Reactor, Valentina N. Korzhova Sep 2009

Motion Analysis Of Fluid Flow In A Spinning Disk Reactor, Valentina N. Korzhova

USF Tampa Graduate Theses and Dissertations

The flow of a liquid film over a rapidly rotating horizontal disk has numerous industrial applications including pharmaceuticals, chemical engineering, bioengineering, etc. The analysis and control of complex fluid flows over a rapidly rotating horizontal disk is an important issue in the experimental fluid mechanics. The spinning disk reactor exploits the benefits of centrifugal force, which produces thin highly sheared films due to radial acceleration. The hydrodynamics of the film results in excellent fluid mixing and high heat or mass transfer rates.

This work focuses on developing a novel approach for fluid flow tracking and analysis. Specifically, the developed algorithm …


Temporal Data Classification Using Linear Classifiers, Peter Revesz, Thomas Triplet Sep 2009

Temporal Data Classification Using Linear Classifiers, Peter Revesz, Thomas Triplet

CSE Conference and Workshop Papers

Data classification is usually based on measurements recorded at the same time. This paper considers temporal data classification where the input is a temporal database that describes measurements over a period of time in history while the predicted class is expected to occur in the future. We describe a new temporal classification method that improves the accuracy of standard classification methods. The benefits of the method are tested on weather forecasting using the meteorological database from the Texas Commission on Environmental Quality.


Initial Framework For Measuring And Evaluating Heuristic Problem Solving, Zhisheng Huang, Annette Ten Teije, Frank Van Harmelen, Gaston Tagni, Hansjorg Neth, Lael Schooler, Sebastian Rudolph, Pascal Hitzler, Tuvshintur Tserendorj, Yi Huang, Danica Damljanovic, Angus Roberts Sep 2009

Initial Framework For Measuring And Evaluating Heuristic Problem Solving, Zhisheng Huang, Annette Ten Teije, Frank Van Harmelen, Gaston Tagni, Hansjorg Neth, Lael Schooler, Sebastian Rudolph, Pascal Hitzler, Tuvshintur Tserendorj, Yi Huang, Danica Damljanovic, Angus Roberts

Computer Science and Engineering Faculty Publications

One of the key aspects in the development of LarKC is how to evaluate the performance of the platform and its constituent components in order to guarantee that the execution of a pipeline will match the user’s needs and provide the desired solutions (answers) to the user’s queries. Therefore, in this deliverable, the first in a series three documents concerned with the definition of a Framework for Measuring and Evaluating Heuristic Problem Solving, we make the first steps towards defining such framework by considering the theoretical foundations and principles of evaluation and measurement theory, discussing several important aspects related to …


Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle Sep 2009

Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle

Conference papers

This paper discusses a new approach to ‘watermarking’ digital signals using linear frequency modulated or ‘chirp’ coding. The principles underlying this approach are based on the use of a matched filter to provide a reconstruction of a chirped code that is uniquely robust in the case of signals with very low signal-to-noise ratios. Chirp coding for authenticating data is generic in the sense that it can be used for a range of data types and applications (the authentication of speech and audio signals, for example). The theoretical and computational aspects of the matched filter and the properties of a chirp …


Reliability Analysis For The Advanced Electric Power Grid: From Cyber Control And Communication To Physical Manifestations Of Failure, Ayman Z. Faza, Sahra Sedigh, Bruce M. Mcmillin Sep 2009

Reliability Analysis For The Advanced Electric Power Grid: From Cyber Control And Communication To Physical Manifestations Of Failure, Ayman Z. Faza, Sahra Sedigh, Bruce M. Mcmillin

Electrical and Computer Engineering Faculty Research & Creative Works

The advanced electric power grid is a cyber-physical system comprised of physical components, such as transmission lines and generators, and a network of embedded systems deployed for their cyber control. The objective of this paper is to qualitatively and quantitatively analyze the reliability of this cyber-physical system. The original contribution of the approach lies in the scope of failures analyzed, which crosses the cyber-physical boundary by investigating physical manifestations of failures in cyber control. As an example of power electronics deployed to enhance and control the operation of the grid, we study Flexible AC Transmission System (FACTS) devices, which are …


Exploiting Set-Level Non-Uniformity Of Capacity Demand To Enhance Cmp Cooperative Caching, Dongyuan Zhan, Hong Jiang, Sharad C. Seth Sep 2009

Exploiting Set-Level Non-Uniformity Of Capacity Demand To Enhance Cmp Cooperative Caching, Dongyuan Zhan, Hong Jiang, Sharad C. Seth

CSE Technical Reports

As the Memory Wall remains a bottleneck for Chip Multiprocessors (CMP), the effective management of CMP last level caches becomes of paramount importance in minimizing expensive off-chip memory accesses. For the CMPs with private last level caches, Cooperative Caching (CC) has been proposed to enable capacity sharing among private caches by spilling an evicted block from one cache to another. But this eviction-driven CC does not necessarily promote cache performance since it implicitly favors the applications full of block evictions regardless of their real capacity demand. The recent Dynamic Spill-Receive (DSR) paradigm improves cooperative caching by prioritizing applications with higher …


Font Size: Make Font Size Smaller Make Font Size Default Make Font Size Larger Exploiting Coordination Locales In Distributed Pomdps Via Social Model Shaping, Pradeep Varakantham, Jun Young Kwak, Matthew Taylor, Janusz Marecki, Paul Scerri, Milind Tambe Sep 2009

Font Size: Make Font Size Smaller Make Font Size Default Make Font Size Larger Exploiting Coordination Locales In Distributed Pomdps Via Social Model Shaping, Pradeep Varakantham, Jun Young Kwak, Matthew Taylor, Janusz Marecki, Paul Scerri, Milind Tambe

Research Collection School Of Computing and Information Systems

Distributed POMDPs provide an expressive framework for modeling multiagent collaboration problems, but NEXPComplete complexity hinders their scalability and application in real-world domains. This paper introduces a subclass of distributed POMDPs, and TREMOR, an algorithm to solve such distributed POMDPs. The primary novelty of TREMOR is that agents plan individually with a single agent POMDP solver and use social model shaping to implicitly coordinate with other agents. Experiments demonstrate that TREMOR can provide solutions orders of magnitude faster than existing algorithms while achieving comparable, or even superior, solution quality.


Detecting Automotive Exhaust Gas Based On Fuzzy Inference System, Li. Shujin, Ming Bai, Quan Wang, Bo Chen, Xiaobing Zhao, Ting Yang, Zhaoxia Wang Sep 2009

Detecting Automotive Exhaust Gas Based On Fuzzy Inference System, Li. Shujin, Ming Bai, Quan Wang, Bo Chen, Xiaobing Zhao, Ting Yang, Zhaoxia Wang

Research Collection School Of Computing and Information Systems

This paper proposes a method of detecting automotive exhaust gas based on fuzzy logic inference after analyzing the principle of the infrared automobile exhaust gas analyzer and the influence of the environmental temperature on analyzer. This paper analyses the measurement error caused by environmental temperature, and then makes a non-linear error correction of temperature for the infrared sensor using fuzzy inference. The results of simulation have clearly demonstrated that the proposed fuzzy compensation scheme is better than the non-fuzzy method.


Admission Control For Differentiated Services In Future Generation Cdma Networks, Hwee-Pink Tan, Rudesindo Núñez-Queija, Adriana F. Gabor, Onno J. Boxma Sep 2009

Admission Control For Differentiated Services In Future Generation Cdma Networks, Hwee-Pink Tan, Rudesindo Núñez-Queija, Adriana F. Gabor, Onno J. Boxma

Research Collection School Of Computing and Information Systems

Future Generation CDMA wireless systems, e.g., 3G, can simultaneously accommodate flow transmissions of users with widely heterogeneous applications. As radio resources are limited, we propose an admission control rule that protects users with stringent transmission bit-rate requirements (“streaming traffic”) while offering sufficient capacity over longer time intervals to delay-tolerant users (“elastic traffic”). While our strategy may not satisfy classical notions of fairness, we aim to reduce congestion and increase overall throughput of elastic users. Using time-scale decomposition, we develop approximations to evaluate the performance of our differentiated admission control strategy to support integrated services with transmission bit-rate requirements in a …


Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar Aug 2009

Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar

International Conference on Information and Communication Technologies

Putting constraints on performance of a system in the temporal domain, some times turns right into wrong and update into outdate. These are the scenarios where apposite value of time inveterate in the reality. But such timing precision not only requires tightly scheduled performance constraints but also requires optimal design and operation of all system components. Any malfunctioning at any relevant aspect may causes a serious disaster and even loss of human lives. Managing and interacting with such real-time system becomes much intricate when the resources are limited as in wireless sensor nodes. A wireless sensor node is typically comprises …


Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali Aug 2009

Wireless Networks: Automated Frequency Distribution, Management & Assignment (Afdma) In Ieee 802.16, Khurram Shehzad, A. Ali, F. Rasool, R. M. Hashmi, A. Zubair, R. L. Ali

International Conference on Information and Communication Technologies

Frequency is amongst the most exclusive and most costly resources in wireless communication networks, especially, while considering the demands of broadband wireless access (BWA). In BWA, the management of frequency distribution and its effective utilization is of utmost importance. This research explores possible ways to ensure the most effective allocation of bandwidth resources and their best possible utilization on need basis. The model for static frequency allocation has been optimized and the dynamic frequency management has been calculated while dividing the users in different user classes on the basis of their needs and requirements. The effect of ping-pong handovers has …


Networks - Ii: Formal Modeling Of Trust In Semantic Grid Registry, Saba Mahmood, Saman Iftikhar, Hafiz Farooq Ahmad, Farah Mahmood Aug 2009

Networks - Ii: Formal Modeling Of Trust In Semantic Grid Registry, Saba Mahmood, Saman Iftikhar, Hafiz Farooq Ahmad, Farah Mahmood

International Conference on Information and Communication Technologies

In this paper we have analyzed and developed a formal specification of a trust model in semantic grid registry. This paper formalizes the basic requirements of a trust model in case of semantic grid registry. We have described the flow of operations of our system through links and processes in the system architecture. The system is formally modeled in pi-calculus. Finally we transformed the specification to pi- ADL and generated code using Archware tool. We have already developed a semantic grid registry.


Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit Aug 2009

Application Of Ict - I: Using Point-To-Point 1550nm Laser For Outdoor Mobility, Roshan A. Shaikh, Abdul Basit

International Conference on Information and Communication Technologies

Significant implementation challenges exist in wireless backbone connectivity. Typical optical wireless communication topologies are evaluated. A fresh approach using 1550nm Wavelength laser to design protocol and topology for point-to-point outdoor connectivity is carried out. Matlab simulation results support the 1550nm laser as a good choice for outdoor connectivity for optical wireless communication. New design and topology for an optical wireless communication system is suggested with special consideration of security and recommendation for the optimal use of such a technology is suggested.


Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan Aug 2009

Networks - I: Networks-On-Chip: Challenges, Trends And Mechanisms For Enhancements, Omer Tayan

International Conference on Information and Communication Technologies

The rate of increase of silicon capacity in integrated circuits (IC) will enable system integration of several billion transistors to reside on a single chip in the near future. Future system-on-chip (SoC) systems must therefore integrate up to several hundreds of cores within a single chip, and SoC designs will employ on-chip communication networks (NoCs) as a result. This paper discusses the problems with many current SoC systems, surveys the challenges and trends facing future SoC designs and proposes a mechanism for enhancing NoC strategies of the future by enhancing memory management and utilization techniques within an NoC.


Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood Aug 2009

Networks - I: A Comparative Analysis Of Dccp Variants (Ccid2, Ccid3), Tcp And Udp For Mpeg4 Video Applications, Muhammad Ajmal Azad, Rashid Mahmood, Tahir Mehmood

International Conference on Information and Communication Technologies

New emerging technologies like Multimedia applications require timely delivery of information as compared to reliability. The most widely used protocols over transport layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both of these have some drawbacks while using in real time applications. TCP increases delay in transfer of data but achieving reliable transfer of data while UDP does not provide any acknowledgment, hence it overcomes the problem of delay but lacking congestion control mechanism. To provide congestion control over transport layer using UDP, Datagram Congestion Control Protocol (DCCP) has been designed to provide timely delivery of data …


Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain Aug 2009

Artificial Intelligence – I: A Two-Step Approach For Improving Efficiency Of Feedforward Multilayer Perceptrons Network, Shoukat Ullah, Zakia Hussain

International Conference on Information and Communication Technologies

An artificial neural network has got greater importance in the field of data mining. Although it may have complex structure, long training time, and uneasily understandable representation of results, neural network has high accuracy and is preferable in data mining. This research paper is aimed to improve efficiency and to provide accurate results on the basis of same behaviour data. To achieve these objectives, an algorithm is proposed that uses two data mining techniques, that is, attribute selection method and cluster analysis. The algorithm works by applying attribute selection method to eliminate irrelevant attributes, so that input dimensionality is reduced …


Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik Aug 2009

Artificial Intelligence – I: Subjective Decision Making Using Type-2 Fuzzy Logic Advisor, Owais Malik

International Conference on Information and Communication Technologies

In this paper, we present and compare two-stage type-2 fuzzy logic advisor (FLA) for subjective decision making in the domain of students' performance evaluation. We test our proposed model for evaluating students' performance in our computer science and engineering department at HBCC/KFUPM in two domains namely cooperating training and capstone/senior project assessment where we find these FLAs very useful and promising. In our proposed model, the assessment criteria for different components of cooperative training and senior project are transformed into linguistic labels and evaluation information is extracted into the form of IF-THEN rules from the experts. These rules are modeled …


Design Of An All-Optical Wdm Lightpath Concentrator, Shivashis Saha, Jitender S. Deogun Aug 2009

Design Of An All-Optical Wdm Lightpath Concentrator, Shivashis Saha, Jitender S. Deogun

CSE Technical Reports

A design of a nonblocking, all-optical lightpath concentrator using WOC and WDM crossbar switches is presented. The proposed concentrator is highly scalable, cost-efficient, and can switch signals in both space and wavelength domains without requiring a separate wavelength conversion stage.


Selection Of Switching Sites In All-Optical Nework Topology Design, Shivashis Saha, Eric D. Manley, Jitender S. Deogun Aug 2009

Selection Of Switching Sites In All-Optical Nework Topology Design, Shivashis Saha, Eric D. Manley, Jitender S. Deogun

CSE Technical Reports

In this paper, we consider the problem of topology design for optical networks. We investigate the problem of selecting switching sites to minimize total cost of the optical network. The cost of an optical network can be expressed as a sum of three main factors: the site cost, the link cost, and the switch cost. To the best of our knowledge, this problem has not been studied in its general form as investigated in this paper. We present a mixed integer quadratic programming (MIQP) formulation of the problem to find the optimal value of the total network cost. We also …


Safety Intelligence And Legal Machine Language: Do We Need Three Laws Of Robotics?, Chien Hsun Chen, Y. H. Weng, C. T. Sun Aug 2009

Safety Intelligence And Legal Machine Language: Do We Need Three Laws Of Robotics?, Chien Hsun Chen, Y. H. Weng, C. T. Sun

Chien Hsun Chen

In this chapter we will describe a legal framework for Next Generation Robots (NGRs) that has safety as its central focus. The framework is offered in response to the current lack of clarity regarding robot safety guidelines, despite the development and impending release of tens of thousands of robots into workplaces and homes around the world. We also describe our proposal for a safety intelligence (SI) concept that addresses issues associated with open texture risk for robots that will have a relatively high level of autonomy in their interactions with humans. Whereas Isaac Asimov’s Three Laws of Robotics are frequently …


Setting Discrete Bid Levels Adaptively In Repeated Auctions, Jilian Zhang, Hoong Chuin Lau, Jialie Shen Aug 2009

Setting Discrete Bid Levels Adaptively In Repeated Auctions, Jilian Zhang, Hoong Chuin Lau, Jialie Shen

Research Collection School Of Computing and Information Systems

The success of an auction design often hinges on its ability to set parameters such as reserve price and bid levels that will maximize an objective function such as the auctioneer revenue. Works on designing adaptive auction mechanisms have emerged recently, and the challenge is in learning different auction parameters by observing the bidding in previous auctions. In this paper, we propose a non-parametric method for determining discrete bid levels dynamically so as to maximize the auctioneer revenue. First, we propose a non-parametric kernel method for estimating the probabilities of closing price with past auction data. Then a greedy strategy …


Multilayer Image Inpainting Approach Based On Neural Networks, Quan Wang, Zhaoxia Wang, Che Sau Chang, Ting Yang Aug 2009

Multilayer Image Inpainting Approach Based On Neural Networks, Quan Wang, Zhaoxia Wang, Che Sau Chang, Ting Yang

Research Collection School Of Computing and Information Systems

This paper describes an image inpainting approach based on the self-organizing map for dividing an image into several layers, assigning each damaged pixel to one layer, and then restoring these damaged pixels by the information of their respective layer. These inpainted layers are then fused together to provide the final inpainting results. This approach takes advantage of the neural network's ability of imitating human's brain to separate objects of an image into different layers for inpainting. The approach is promising as clearly demonstrated by the results in this paper.


Cs 480/680: Comparative Languages, Krishnaprasad Thirunarayan Jul 2009

Cs 480/680: Comparative Languages, Krishnaprasad Thirunarayan

Computer Science & Engineering Syllabi

This course will introduce fundamental concepts and paradigms underlying the design of modern programming languages. For concreteness, we study the details of an object-oriented language (e.g. Java), and a functional language (e.g., Scheme) . The overall goal is to enable comparison and evaluation of existing languages. The programming assignments will be coded in Java 5 and in Scheme.


Cs 240: Introduction To Computer Science I, Vanessa Starkey Jul 2009

Cs 240: Introduction To Computer Science I, Vanessa Starkey

Computer Science & Engineering Syllabi

Basic concepts of programming and programming languages are introduced.
Emphasis is on structured programming and stepwise refinement. Prerequisite: MTH 130 or MPL 5.