CSC 612: Analysis and Design of Algorithms

Major data structures design techniques - Divide and conquer - Dynamic programming - Heuristics - Parallel algorithms - Analysis of algorithms - Orders of magnitude - Lower bound theory - Time and space complexity - NP-hard and NP-complete problems - Applications and examples - Correctness of algorithms - Structure of algorithms.

ملحقات المادة الدراسية

CSC 618: Selected topics in Computer Systems and Networks

New trends and research directions in the area of Computer Systems and Networks.

ملحقات المادة الدراسية

CSC 601: Advanced Computing Science and Applications

Graph theory and applications in computer science – Computational methods and application in computing science – Advanced data structures –Applications in computing - Discrete mathematics applications in computing – New trends in computing science.

ملحقات المادة الدراسية

CSC 551: Automata, Calculability and Formal Languages

Finite state automata and regular expressions - Regular sets - the Pumping lemma - Context-free grammars and derivation trees - Chomsky and Greiback normal forms - Context-free languages - Recognizers - Turing machines - recursive and recursively innumerable languages - Decidability problems - The halting problem - Rice’s theorem and Chomsky hierarchy.

ملحقات المادة الدراسية

CSC 512: Algorithms Analysis and Design

Review of major data structures - Basic design techniques - Divide and conquer - Greedy method - Backtracking - Dynamic programming - Heuristics - Parallel algorithms - Analysis of algorithms - Orders of magnitude - Lower bound theory - Time and space complexity - NP-hard and NP-complete problems - applications and examples - Correctness of algorithms - Structure of algorithms.

ملحقات المادة الدراسية

DTCF: A Distributed Trust Computing Framework for Vehicular Ad hoc Networks (2017)

The concept of trust in vehicular ad hoc networks (VANETs) is usually utilized to assess the trustworthiness of the received data as well as that of the sending entities. The quality of safety applications in VANETs largely depends on the trustworthiness of exchanged data. In this paper, we propose a self-organized distributed trust computing framework (DTCF) for VANETs to compute the trustworthiness of each vehicle, in order to filter out malicious nodes and recognize fully trusted nodes.

Identity Hiding Authentication Protocol for Vehicular Ad hoc Networks (2017)

This paper introduces an authentication protocol for vehicular communications, which uses two techniques to preserve privacy namely pseudonym and group signcryption. The main features of this protocol: Firstly, it offers conditional anonymous authentication: a message sender is authenticated anonymously on behalf of a group of potential signers while only a trusted entity (group manager) can reveal the real identity of a message issuer. Secondly, it guarantees message integrity and prevents replay attacks.

الصفحات

اشترك ب KSU Faculty آر.إس.إس