Assignments got your hair on fire?

Douse the flames with our full-range writing service!

Experienced academic writing professionals are at your fingertips. Use this handy tool to get a price estimate for your project.

Dr. Yong Guan - Iowa State University

Many 21st-century computer science applications require the design of software or systems that interact with multiple self-interested participants. This course will provide students with the vocabulary and modeling tools to reason about such design problems. Emphasis will be on understanding basic economic and game theoretic concepts that are relevant across many application domains, and on case studies that demonstrate how to apply these concepts to real-world design problems. Topics include auction and contest design, equilibrium analysis, cryptocurrencies, design of networks and network protocols, reputation systems, social choice, and social network analysis. Case studies include BGP routing, Bitcoin, eBay's reputation system, Facebook's advertising mechanism, Mechanical Turk, and dynamic pricing in Uber/Lyft. Prerequisites: CS106B/X and CS161, or permission from the instructor.

Introduction to the theory of error correcting codes, emphasizing algebraic constructions, and diverse applications throughout computer science and engineering. Topics include basic bounds on error correcting codes; Reed-Solomon and Reed-Muller codes; list-decoding, list-recovery and locality. Applications may include communication, storage, complexity theory, pseudorandomness, cryptography, streaming algorithms, group testing, and compressed sensing. Prerequisites: Linear algebra, basic probability (at the level of, say, CS109, CME106 or EE178) and "mathematical maturity" (students will be asked to write proofs). Familiarity with finite fields will be helpful but not required.
Same as:

Explore computer forensics degrees and programs for computer forensics training

Master of Science in Computer Information Systems (blended)

Yang Liu, Wenji Chen, and Yong Guan, "A Fast Sketch for Aggregate Queries over High-Speed Network Traffic," in Proceedings of the 31st Annual IEEE International Conference on Computer Communications (INFOCOM 2012), Mini-Conference, Orlando, Florida, USA, March 25-30, 2012. Ramzi Saifan, Ahmed Kamal, and Yong Guan, "Efficient Spectrum Searching and Monitoring in Cognitive Radio Network", in the Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2011), Valencia, Spain, October 17-22, 2011. Yanlin Peng, Linfeng Zhang, and Yong Guan, "Detecting Fraud in Internet Auction Systems," in 5th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, January 25 - 28, 2009. Chunwang Gao, Zhen Yu, Yawen Wei, Steve Russell, and Yong Guan, "A Statistical Indoor Localization Method for Supporting Location-based Access Control," ACM/Springer Mobile Networks and Applications (MONET), Vol.

Introduction to the engineering of computer applications emphasizing modern software engineering principles: object-oriented design, decomposition, encapsulation, abstraction, and testing. Uses the JavaScript programming language. Emphasis is on good programming style and the built-in facilities of the JavaScript language. No prior programming experience required. This course covers most of the same material as CS106A Section 1 in Java and Section 3 in Python, but this course uses the JavaScript programming language. To enroll in this class, enroll in Section 2 for Fall Qtr. May be taken for 3 units by grad students.

What is computer vision? - BMVA

Gang Xu, George Amariucai, and Yong Guan, "Delegation of Computation with Verification Outsourcing using GENI Infrastructure," in Proceedings of the 3rd GENI Research and Educational Experiment Workshop (GREE 2014),held in conjunction with GEC19Atlanta, GA, USA, March 19-20, 2014 Jin-Ning Tioh and Yong Guan, "8th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2013), Hong Kong, November 21-22, 2013.

Introduction to the engineering of computer applications in Python, emphasizing modern software engineering principles: decomposition, abstraction, and testing. Emphasis is on good programming style. This course covers most of the same material as CS106A Section 1 in Java and Section 2 in JavaScript, but this course uses the Python programming language which is popular for general engineering and web development. Required readings will all be available for free on the web. Students are encouraged to bring a laptop to lecture to do the live exercises which are integrated with lecture. No prior programming experience required. To enroll in this class, enroll in Section 3. May be taken for 3 units by grad students. Enrollment is limited for winter quarter 2017-18 but from spring quarter 2017-18 enrollment will be unlimited.

Versatile Services that Make Studying Easy
We write effective, thought-provoking essays from scratch
We create erudite academic research papers
We champion seasoned experts for dissertations
We make it our business to construct successful business papers
What if the quality isn’t so great?
Our writers are sourced from experts, and complete an obstacle course of testing to join our brigade. Ours is a top service in the English-speaking world.
How do I know the professor won’t find out?
Everything is confidential. So you know your student paper is wholly yours, we use CopyScape and WriteCheck to guarantee originality (never TurnItIn, which professors patrol).
What if it doesn’t meet my expectations?
Unchanged instructions afford you 10 days to request edits after our agreed due date. With 94% satisfaction, we work until your hair is comfortably cool.
Clients enjoy the breezy experience of working with us
Click to learn our proven method

School of Computing - South Alabama SoC

Advancing Computer Science (MS)

This class will use the case method to teach basic computer, network, and information security from technology, law, policy, and business perspectives. Using real world topics, we will study the technical, legal, policy, and business aspects of an incident or issue and its potential solutions. The case studies will be organized around the following topics: vulnerability disclosure, state sponsored sabotage, corporate and government espionage, credit card theft, theft of embarrassing personal data, phishing and social engineering attacks, denial of service attacks, attacks on weak session management and URLs, security risks and benefits of cloud data storage, wiretapping on the Internet, and digital forensics. Students taking the class will learn about the techniques attackers use, applicable legal prohibitions, rights, and remedies, the policy context, and strategies in law, policy and business for managing risk. Grades will be based on class participation, two reflection papers, and a final exam. Special Instructions: This class is limited to 65 students, with an effort made to have students from Stanford Law School (30 students will be selected by lottery) and students from Computer Science (30 students) and International Policy Studies (5 students). Elements used in grading: Class Participation (20%), Written Assignments (40%), Final Exam (40%). Cross-listed with the Law School (Law 4004) and International Policy Studies (IPS course number TBD).
Same as:

of clients claim significantly improved grades thanks to our work.
of students agree they have more time for other things thanks to us.
Clients Speak
“I didn’t expect I’d be thanking you for actually improving my own writing, but I am. You’re like a second professor!”