Syllabus CSE
Syllabus CSE
Syllabus CSE
B.TECH DEGREE IN
Department Core 80 80
Elective Courses 27 10
Mandatory Courses 06 06
-
Minimum Number of Credits through Department Electives – 07
Minimum Number of Credits through Open Elective – 03
CONSOLIDATED LIST OF COURSES FOR B.Tech (COMPUTER SCIENCE AND ENGINEERING)
Prerequisites: CS 204
CRC Case studies – Inheritance – Implementation of java AWT Classes – Exception Handling in Java
Fixed Point Arithmetic – Text Processing – Keyboard and screen processing – Macro writing – Disk Processing – Memory Resident Programs
– DOS file Management – Copy Protection schemes – Implementation of a simple editor – Construction of Assemblers, Macro processors –
Adding Syntax directed facilities to an editor
CS 301 Theory of computation 3–1–0 4
Prerequisites – CS 201
Finite Automata – Deterministic, non-deterministic – Regular expressions – equivalence – Properties – Pumping Lemma – Context Free
Grammars – Push Down Automata – Context Free Languages – Properties – Turing Machines – Computable Functions – Undecidability
Text Books – John E. Hopcroft, Rajeev Motwani, Jeffrey D Ullman, Introduction to Automata Theory, Languages and Computation, II Ed,
Pearson, 2001
Network structures – Network Architecture – OSI model – LAN protocols – IEE standard 802 – Ethernet – Token Bus and
Token Ring – Error Detection and Correction – Sliding Window protocols – Routing algorithms – Congestion control algorithms
– Internetworking – Network Layer in Internet IP – Transport Layer in Internet – UDP, TCP – Remote Procedure Call –
Implementation and semantics of RPC – E-mail Protocol and File Transfer Protocol.
Text Books: A S Tanenbaum, Computer Networks, PHI, IV Ed, 2003.
Data Warehousing and OLAP technologies – Multi Dimensional modeling, data warehouse architecture, Data warehouse
implementation – Data preprocessing - Concept description, characterization and comparison – Data Mining techniques –
classification, clustering – prediction and mining Association rules – Advanced mining methods
nd
Text Books: Jiawei Han and Kamber, M: Data Mining Concepts and techniques, 2 Edition, Elsevier Publications, 2006.
Lex and Yacc – Generation of Intermediate Code for Expression Grammar – Construction of Predictive Parsing Table – LR
Parsing Tables – Parsing Actions
Computer Networks Lab 0 – 0–3 2
CS 355
Pre/par requisites – CS 352
Error Correction and Detection – IP address Conversion functions - Client Server example using Pipes, FIFOs, Message Queues, Shared Memory
– Connection Oriented Client Server with TCP – Connectionless Client Server with UDP – Concurrent Server – Multi-protocol Server – Internet
Super Server – Chat Server – Mail Server.
Network Security – Attacks Services and Mechanisms – Conventional Encryption – Classical Techniques, Modern Techniques – Simplified DES
– Block cipher Design Principles – Encryption algorithms – placement of encryption function – traffic confidentiality – The Data Encryption
Standard (DES) – Public Key Encryption – The RSA algorithm – Diffie – Hellman Key Exchange – Key Management - Message Authentication
– Authentication Requirements – Authentication Functions – Message Authentication Codes – Digital Signatures and Authentication Protocols –
Digital Signatures – Digital Signature Standard (DSS) – Electronic Mail Security – S/MIME – IP Security – IP security Overview – IP Security
Architecture – Authentication Header (AH) – Encapsulating Security Payload (ESP) – Firewalls – Firewall Design Principles – Trusted Systems.
Text Books: William Stallings, Cryptography and Network Security, the Principles and Practice, Pearson Education, II Ed, 2002
COM/DCOM : COM Interfaces – COM library – Type libraries – Registering Type Libraries – Active template library – Threading models and
apartments – multithreaded components – Dll surrogates – security models
CORBA : OMG’s object management architecture – CORBA services – CORBA business objects - 3-Tier client-server-object-style – Accessing
distributed objects using applets – dynamic CORBA – multithreaded client-server programming
CS 261 Object Oriented Programming and Operating Systems 3 – 0 – 3/2 4
Prerequisite – CS 202
Object Oriented Programming: Introduction to object oriented features of C++ - Classes – Friend functions – function and operator overloading
– Dynamic object creation, constructors and destructors – Inheritance, types of inheritance – Virtual functions - Abstarct classes – Templates –
Exception handling
Operating Systems : Batch, iterative, time sharing and real-time systems – operating system structure – concurrent processes – synchronization
– Deadlocks – Memory management – Secondary storage management – File systems
Text Books: Ira Pohl, “Object oriented programming using C++”, AW.
A. Silberschatz, Galvin, Gagne, “Operating System Concepts”, John Wiley & Sons, Inc publishers, 2006
Prerequisite: CS 351
Compiler optimizations : Processing intermediate code – Interpreters – DAG code generation technique – Loop simplifications – Redundancy
elimination – Re-association – Loop invariant code optimization - Procedure call optimizations - Register allocation - Instruction Scheduling -
Low level loop and branch optimizations – Inter procedural analysis
Parallelizing compilers : Data dependence, Data dependence decision algorithms: GCD test, Banerjee’s Inequality, Exact algorithm for a single
loop index, Exact algorithm for Multiple indices, Vectorization, Concurrentization
Text Books: Steven S. Muchnick. “Advanced Compiler Design and Implementation”. Harcourt Asia and Morgan Kaufmann. 2000.
Michael Wolfe, “High performance compilers for parallel computing”, AW 1996
CS 412 Machine Learning and Soft Computing 3– 0 – 0 3
The concept learning task. General-to-specific ordering of hypotheses. Version spaces. Inductive bias. Decision Tree Learning. Rule Learning:
Propositional and First-Order, Over-fitting, Cross-Validation. Experimental Evaluation of Learning Algorithms Instance-Based Learning: k-
Nearest-neighbor algorithm, Radial basis functions. Case-based learning. Computational Learning Theory: probably approximately correct (PAC)
learning. Sample complexity. Computational complexity of training. Vapnik-Chervonenkis dimension. Artificial Neural Networks: Linear
threshold units, Perceptrons, Multilayer networks and backpropagation, recurrent networks. Probabilistic Machine Learning Maximum
Likelihood Estimation, MAP, Bayes Classifiers Naive Bayes. Bayes optimal classifers. Minimum description length principle. Bayesian Networks,
Inference in Bayesian Networks, Bayes Net Structure Learning Unlabelled data: EM, preventing overfitting, cotraining Gaussian Mixture
Models, K-means and Hierarchical Clustering, Clustering and Unsupervised Learning, Hidden Markov Models, Reinforcement Learning Support
Vector Machines Ensemble learning: boosting, bagging.
Parallel processing terminology – PRAM algorithms – Processor organizations – Interconnection networks – Mapping and Scheduling – Matrix
multiplication , sorting and searching algorithms – graph algorithms – combinatorial search algorithms
Text Books: Michael J. Quinn, “Parallel Computing”, TMH, 1994.
CS 414 Distributed Object Technologies 3–0–0 3
COM/DCOM : Introduction to COM - COM Interfaces and Interface languages – COM library – Type libraries specification – Registering Type
Libraries – Active template library – Developing Components using ATL - Threading models and apartments – Multithreaded components – Dll
surrogates – Security models
CORBA : OMG’s object management architecture – CORBA services – CORBA business objects - 3-Tier client-server-object-style – Accessing
distributed objects using applets – Dynamic CORBA – Multithreaded client-server programming
Text Books: Guy Eddon and Henry Eddon, “Inside DCOM”, Microsoft Press, 1998
Dan Harkey and Robert Orfali, “Client/Server programming with CORBA/Java”, John Wiley and Sons
Introduction. - A Case Study: Designing a Document Editor. - Design Pattern Catalog - Creational Patterns - Structural Pattern - Behavioral
Patterns. What to Expect from Design Patterns, a Brief History, and the Pattern Community.
Text Books: Erich Gamma “Design Patterns” Addison-Wesley
CS 418 Advanced Databases 3–0–0 3
Object Oriented Databases: Persistent Programming Languages, Object Identity and its implementation, Clustering, Indexing, Client Server
Object Bases, Cache Coherence. Parallel Databases: Parallel Architectures, performance measures, shared nothing/shared disk/shared memory
based architectures, Data partitioning, Intra-operator parallelism, Pipelining, Scheduling, Load balancing, query optimization. Distributed
Databases: Query processing, semi-joins, query optimization, Concurrency control Heterogeneity issues. Advanced Transaction Models: Save-
points, Sagas, Nested Transactions, Multi Level Transactions. Recovery: Multi-level recovery, Shared disk systems, Distributed systems 2PC,
3PC, replication and hot spares. Recursive query processing: Top-down and bottom-up evaluation, Magic optimization.
Text Books: Introduction to Object Oriented Databases, Won Kim, MIT Press, 1989. Readings in Object Oriented Database Systems, S. Zdonik
and D. Maier, First Edition, Morgan Kauffman, 1990. Readings in Database Systems, M. Stonebraker, Second Edition, Morgan Kauffman, 1993.
Distributed Databases Principles and Systems, S. Ceri and G. Pelaggati, McGraw Hill, 1985. Selected research papers from various journals and
conferences.
System Access Control, Data Access Control, Security Administration, System Design; Hardware Security Auditing, Software Security Auditing
and controls – Security Policies – Audit Trail Comparison of Database and Operating System Access, Field checks, Change logs, Integrity
checks, User authentication, Precision checks, Access Control Procedures. Encryption, trusted system processing, and firewalls. Detect: security
violation, misrouted data, components failure, and signal interception. Audit Trail, Auditing Virus Infection, Performing a security Audit; Issue:
Future trends, challenges.
Text Books: Deborah Russell, Computer Security Basics, O'Reilly & Associate, 1991.
Karen A. Forcht, Computer Security Management, 1994; Donald A. Watne, Peter B.B. Turney, "Auditing EDP Systems", 2nd PH 1990.
CS 515 Advanced Topics in Theoretical Computer Science 3– 0 – 0 3
Turing machines and non-determinism, models of computation like RAM and pointer machines. Relations between complexity classes. Time-
space tradeoffs for some fundamental problems. Reductions and completeness, Randomized complexity classes, Boolean circuit complexity.
Cryptography and one-way functions. Polynomial hierarchy, P-space completeness, Interactive proofs and Hardness of approximation, Parallel
complexity classes.
CS 517 Programming Language Semantics 3–0–0 3
Operational Semantics – Inductive definitions – Denotational Semantics – Axiomatic Semantics – Domain Theory – Recursion Techniques –
Languages with Higher Types – Information systems – Recursive Types
Text Books – Winskel. “The Formal Semantics of Programming Languages”, MIT Press
CS 461 Network Security 3–0–0 3
Network Security – Attacks Services and Mechanisms – Conventional Encryption – Classical Techniques, Modern Techniques – Simplified
DES– Block cipher Design Principles – Encryption algorithms – placement of encryption function – traffic confidentiality – The Data Encryption
Standard (DES) – Public Key Encryption – The RSA algorithm – Diffie – Hellman Key Exchange – Key Management - Message Authentication
– Authentication Requirements – Authentication Functions – Message Authentication Codes – Digital Signatures and Authentication Protocols –
Digital Signatures – Digital Signature Standard (DSS) – Electronic Mail Security – S/MIME – IP Security – IP security Overview – IP Security
Architecture – Authentication Header (AH) – Encapsulating Security Payload (ESP) – Firewalls – Firewall Design Principles – Trusted Systems.
Text Books: William Stallings, Cryptography and Network Security, the Principles and Practice, Pearson Education, II Ed, 2002.
Prerequisites – CS 352
Applications of Mobile Communications – Wireless Transmission – Medium Access Control – Telecommunication Systems – Satellite Systems
– Wireless Lan – 802.11 – HIPERLAN – BlueTooth – Wireless ATM – Mobile Network Layer – Mobile IP – Mobile Transport Layer – Support
for Mobility – File Systems – Wireless Application Protocol
Text Books: Jochen Schiller, Mobile Communications, Pearson Edition Asia, III Ed, 2001.
CS 463 Computer Graphics 3–0–0 3
Overview of Graphics Systems – Output Primitives – Attributes – Two-dimensional Geometric Transformations – Viewing – Modeling – GUI –
Three-dimensional Concepts – Representations – Transformations – Viewing – Visible Surface Detection Methods
Text Books – Hearn, Baker, “Computer Graphics – C Version”, Pearson, II Ed