MS in CSE
MS in CSE
Textbook:
(1) Approximation algorithms. Vazirani, Vijay V. Berlin: springer, 2001.
Texts/References
4
Reference:
(1) The design of approximation algorithms. Williamson, David P., andDavid B. Shmoys.
Cambridge university press, 2011.
Title of the course Parametrized Algorithms and Complexity
1
(L-T-P-C) (3-0-0-6)
Pre-requisite
2 Data Structures and Algorithms, Design and Analysis of Algorithms
courses(s)
Introduction. Kernelization, Bounded Search Trees, Iterative Compression, Treewidth,
Advanced kernelization algorithms. Lower bounds: Fixed- parameter intractability, lower
3 Course content
bounds based on ETH, lower bounds for kernelization. Parameterized Algorithms,
Kernelization, and Complexity of Graph Modification Problems
Textbook:
(1) Parameterized Algorithms, Marek Cygan, FedorV. Fomin, Lukasz Kowalik. Daniel
Lokshtanov, Daniel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Sourabh. Springer.
Texts/References
4 2015
Reference:
(1) Parameterized Complexity, R. G. Downey, and M. R. Fellows. Springer Science and
Business Media. 2012
1. Building Embedded Linux Systems, 2nd Edition by Gilad Ben-Yossef, Jon Masters,
Karim Yaghmour, Philippe Gerum, O'Reilly Media, Inc. 2008
2. Linux Device Drivers, Third Edition By Jonathan Corbet, Alessandro Rubini, Greg
Kroah-Hartman, O'Reilly Media, Inc. 2005
Texts/References 3. Embedded Systems: ARM Programming and Optimization by Jason D Bakos,
4 Elsevier, 2015
4. Learning Computer Architecture with Raspberry Pi by Eben Upton, Jeff Duntemann,
Ralph Roberts, Tim Mamtora, Ben Everard, Wiley Publications, 2016
5. Real Time Systems by Jane S. Liu, 1 edition, Prentice Hall; 2000
6. Practical Embedded Security: Building Secure Resource-Constrained Systems by
Timothy Stapko, Elsevier, 2011
Title of the course Advanced Computer Networks
1
(L-T-P-C) (3-0-0-6)
Pre-requisite
2
courses(s)
1. Circuit, Packet and Virtual Circuit Switching, MPLS
2. Switch Architectures, Buffering Strategies, Input and Output Queuing, IP
Buffer Sizing
3. Quality of Service and Scheduling Algorithms
4. IP Address Lookup and IP Packet Classification algorithms
5. Software Defined Networking
6. Next Generation Network Architectures, Network Provisioning and Design, and
“Green” (Energy- Efficient) Networking
7. Data Driven Networking
8. Wireless Networks - MANETs, Sensor Networks, Cellular Networks, Personal
3 Course content Area Networks
9. Content Based Delivery Networks - Principles of data dissemination, aggregation and
caching that are applied to sensor networks, Internet of Things and other content-based
paradigms. Students will survey recent research publications on opportunistic networks
and next generation content-based networking ideas.
10. Delay tolerant Networks
11. Network security - authentication, access control, privacy preservation, intrusion
detection and prevention
12. Performance analysis of new Networking ideas using simulation (such as Network
Simulator (ns3), GENI testbed, Simulink, Open LTE and Open C-RAN frameworks)
Textbook:
Computer Networks: A Systems Approach, Larry Peterson and Bruce Davie, 2011.
Performance Evaluation of Computer Systems, by Raj Jain, Wiley, 1991. Computer
Networking, Kurose and Ross, Addison-Wesley, 2012.
Reference:
1.An Engineering Approach to Computer Networking by S. Keshav, 1997, Addison-
Texts/References Wesley Professional Series.
4 2.Network Routing, by Deepankar Medhi and Karthikeyan Ramasamy, Morgan
Kaufmann, 2007.
3.SDN: Software Defined Networks, by Thomas D.Nadeau, Ken Gray, O’Reilly Media,
2013.
4.High Performance Switches and Routers, By H.Jonathan Chao and Bin Liu, Wiley,
2007.
Network Algorithmics, by George Varghese, Morgan Kaufmann, 2005
Title of the course FPGA for communication networks prototyping
1
(L-T-P-C) (3-0-0-6)
Pre-requisite
2 EE 224 Digital System Exposure on Computer Network
courses(s)
History and evaluation of FPGAs; FPGA architecture; Introduction to Quartus Prime
(vendors and design tools; vendors and programmable logic); Exploiting Simulation tools
(e.g., ModelSim); Exploiting FPGAs for multi-domain technologies; Introduction to
radio access networks-fronthaul (e.g., common public radio interface); optical
3 Course content network; metro and core networks; Cross-layer design; The role of FPGA in the
specified network segments and use case scenarios; In and Out; Clocks and Registers; State
Machines; Modular Design; Memories Managing Clocks; I/O Flavors; Exploiting Qsys
and Nios II tools
1.C. Maxfield, “The Design Warrior's Guide to FPGAs: Devices, Tools and Flows”,
Jun. 2004, eISBN 9780080477138
2.FPGAs For Dummies, 2nd Intel Special Edition. Published by. John Wiley & Sons,
Inc
3.William J. Dally, R. Curtis Harting, “Digital Design: A Systems Approach 1st Edition”,
Texts/References Cambridge University Press, September 2012, ISBN 9780521199506
4
4.Verilog by Example: A Concise Introduction for FPGA Design, Blaine C. Readler
5.Course materials: Slides; Notes; Tutorials from Altera website
https://www.altera.com/support/training/university/materials-tutorials.html
6.R. Ramaswami, K. Sivarajan, G. Sasaki; “Optical Networks: A Practical Perspective,”
3rd Ed., Morgan Kaufmann, ISBN: 9780123740922
Software Defined Networking (SDN) and Network Function
Title of the course
1 Virtualization (NFV)
(L-T-P-C)
(3-0-0-6)
Pre-requisite
2 Exposure to Computer Networks
courses(s)
History and evolution of SDN; SDN Architecture (Application, Control, Infrastructure
Layer); SDN Interfaces (East/West/North/South-bound interfaces); SDN
Security; SDN routing; SDN standards; SDN Controllers; Network Operating Systems
and Languages; OpenFlow; Software Switches (e.g. OpenVSwitch); SDN
3 Course content Simulation/Emulation Platforms (e.g. Mininet); Federated SDN networks; SDN
Applications and Use Cases; Programming assignment/project;
Need for NFV; NFV and SDN Relationship; Virtual Network Functions; Service
Function Chaining; NFV Specifications; NFV Architecture; NFV Use Cases; NFV
Management and orchestration (MANO); Open-source NFV; Hands-on exercises based
on OpenStack/Docker.
1.Software Defined Networks: A Comprehensive Approach by Paul Goransson and
Chuck Black, Morgan Kaufmann Publications, 2014
2.SDN – Software Defined Networks by Thomas D. Nadeau & Ken Gray, O'Reilly, 2013
Software Defined Networking with OpenFlow, By Siamak Azodolmolky, Packt Publishing,
Texts/References 2013
4 3.Gray, Ken, and Thomas D. Nadeau. Network function virtualization. Morgan Kaufmann,
2016.
4.Zhang, Ying. Network Function Virtualization: Concepts and Applicability in 5G
Networks. John Wiley & Sons, 2018.
5.Foundations of modern networking- SDN, NFV, QoE, IoT, and Cloud, William Stallings
James Kurose and Keith Ross, "Computer Networking, A Top-Down Approach"
Texts/References 1.R.O.Duda, P.E.Hart and D.G.Stork, Pattern Classification, John Wiley, 2001.
4 2.C.M.Bishop, Pattern Recognition and Machine Learning, Springer, 2006.
Title of the course Statistical Pattern Recognition
1
(L-T-P-C) (3-0-0-6)
Pre-requisite
2 Multivariate Calculus and Linear Algebra, Probability, Programming
courses(s)
Bayesian Decision Making and Bayes Classifier, Parametric and Non Parametric
Estimation of Densities, General Linear Models, Discriminative Learning based
3 Course content Models, Dimensionality Reduction Techniques, Empirical and Structural risk
minimization, Ensemble Methods - Bagging, Boosting, Pattern Clustering, Graphical
Models, Statistical Learning Theory
Texts/References 1.R.O.Duda, P.E.Hart and D.G.Stork, Pattern Classification, John Wiley, 2001.
4 2.C.M.Bishop, Pattern Recognition and Machine Learning, Springer, 2006.
Processors
Memories
3 Course content
Special Processors and Accelerations
Textbook:
Cormen, Leiserson, Rivest and Stein, Introduction to Algorithms, 3rd edition, by, MIT
Press, 2009.
Texts/References
4 Reference:
1.Sanjoy Dasgupta, Christos Papadimitriou and Umesh Vazirani, Algorithms, McGraw
Hill Education, 2008.
2.Kleniberg and Tardos, Algorithm Design, 1st edition, Pearson, 2006.
Texts/References 1.Cormen TH, Leiserson CE, Rivest RL, Stein C. Introduction to algorithms. MIT
4 press; 2009.
Reference:
1.Brass P. Advanced data structures. Cambridge: Cambridge University Press; 2008.
Title of the course Algorithms
1
(L-T-P-C) (3-0-0-3)
Pre-requisite
2
courses(s)
Algorithm design techniques - divide and conquer, greedy, and dynamic programming;
3 Course content
Algorithms for graph problems. Complexity, lower bounds and NP-completeness.
Textbook:
Cormen TH, Leiserson CE,Rivest RL,Stein C.Introduction to algorithms. MIT press; 2009.
Texts/References
4 Reference:
Dasgupta S, Papadimitriou CH, Vazirani UV. Algorithms. New York: McGraw-Hill Higher
Education; 2008..
Textbook:
1 . Introduction to Graph Theory (2nd Edition), Douglas B. West. Prentice Hall.
Texts/References References:
4 1.Algorithmic Graph Theory and Perfect Graphs (2nd Edition), Martin Charles Golumbic.
Elsevier.
2.Graph Theory (Graduate Texts in Mathematics, 5th Edition), Reinhard Diestel.
Springer.
Title of the Topics in Parameterized Algorithms and Complexity
1 course
(3-0-0-6)
(L-T-P-C)
Pre-requisite
2 Data Structures and Algorithms, Design and Analysis of Algorithms
courses(s)
Introduction. Kernelization, Bounded Search Trees, Iterative Compression, Treewidth,
Advanced kernelization algorithms. Lower bounds: Fixed-parameter intractability, lower
3 Course content bounds based on ETH, lower bounds for kernelization. Parameterized Algorithms,
Kernelization, and Complexity of Graph Modification Problems
Textbook:
Parameterized Algorithms, Marek Cygan, Fedor V. Fomin, Lukasz Kowalik. Daniel
Texts/References Lokshtanov, Daniel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Sourabh.
4
Springer. 2015
Reference:
Parameterized Complexity, R. G. Downey, and M. R. Fellows. Springer Science and
Business Media. 2012
4.Rakesh Chadha, J Bhasker an ASIC Low Power Primer: Analysis, Techniques and
Specification
Title of the course Dataflow Processor Architecture (Guided Study)
1
(L-T-P-C) (3-0-0-6)
Pre-requisite
2 Computer Architecture
courses(s)
The philosophy of dataflow; static and dynamic approaches; contrast with conventional out-
of-order pipelines; understanding different granularities of operations, appreciating the
3 Course content performance and power possibilities; understanding the caveats; studying particular example
architectures; analyzing the fundamental concept in the light of modem trends in the
semiconductor industry; analyzing the fundamental concept in the context of particular
application classes
Papers(list not exhaustive);
1 Exploring the potential of heterogeneous von Neumann/Dataflow execution
models, Nowatzkietal., ISCA2015.
2 Dataflow Machine Architecture. AH Veen,ACM Computing Surveys.1986.
3 Dataflow Architecture: Are dataflow computers commercially viable?, Kavi et
al.,IEEE Pontentials 1992.
Texts/References 4 Synchronous Dataflow Architectures for Network processors, Carlstrom et al.,
4 IEEE Micro,2004.
5 Dataflow architectures,Culler.Annual review of Computer Science 1986.
6 An architectural comparison of dataflow systems .Srini. dataflow Computing:
Theory and Practice 1992.
7 The Machester Prototype Dataflow Computer.Gurd et al.ACM.1985.
8 Monsoon: an Explicit Token-store Architecture.Papadopolous et al. ACM
SIGARCH 1990.