Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Bits Pilani Wilp - Sem-2 Electives Course Details

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

3/14/2015

Bits Pilani Wilp: sem-2 electives course details


More

Next Blog

Create Blog

Bits Pilani Wilp


@DESIGN_PATTERN@
Network_sec_quiz
SEM2_PAPER

T ot a l
Pa gev i ews

203
49

(1)

(2)

(1)

BOOKS_SEM1

OOAD_QUIZ

SEM_QUIZ

(3)

(1)

(3)

BOOKS_SEM2

(1)

SEM-1 Course Detail

Software_Arch_quiz

DATABASE_QUIZ
(1)

(2)

DSA_QUIZ

(2)

MID_SEM-1_QUESTION_PAPER

SEM-1_FINAL_EXAM_QUESTION_PAPER

(1)

(1)

sem-2 electives course details

(1)

(1)

Mon da y , Ja n u a r y 5, 2015

sem-2 electives course details


C our se No. : SS ZG5 26
C our seTitl e : DISTRIB UTED C OMP UTING
C our se descr iption:
This course will cover topics like Introduction to distributed computing, Message passing
models, Logical time and global state, Message ordering and Group communication,
Mutual exclusion, Consensus, and Self stabilization, etc. The course will also cover the
design aspects of various advanced distributed computing models like Cluster of
cooperative computers, Grid computing, Peer-to-Peer networks, and Internet of Things.
Scope a nd Objectiv es:
Over the past three decades, distributed computing has emerged as a well-developed
field in computer science and information technology domain. This field covers all
aspects of computing and information access across multiple processing elements
connected by any form of communication network, either local area, or wide area. There
has been a steady growth in the development of contemporary applications that
demonstrate their efficacy by connecting millions of users/applications/machines
across the globe without relying on a traditional client-server approach. In recent times,
the general computing trend is to leverage shared resources and massive amounts of
data over the Internet. This course aims to provide an in-depth understanding of theory,
algorithms, and systems aspects of distributed computing.
P RESC RIB ED TEXT B OOK
Ajay D. Kshemkalyani, and Mukesh Singhal Distributed Computing: Principles,
Algorithms, and Systems, Cambridge University Press, 2008 (Reprint 2013).
--------------------------------------------------------------------C OURSE NO. : SS ZG65 3
C OURSE TITLE : SOF TWA RE A RC H ITEC TURES
C our se Descr iption
Systems engineering and software architectures; Hatley Pirbhai architectural template;
architectural flow diagrams; requirements engineering and software architecture;
architectural design processes; real-time architectures; architectural design patterns;
software architecture and maintenance management; object oriented architectures;
client server architectures; forward engineering for object oriented and client server
architectures; emerging software architectures.

Sol v ed Qu i z

............

Fol l ow by Em a i l

Email address...

Submit

Sea r ch T h i s Bl og

Search

A bou t Me

sac hin c haud hary


Pursuing M.Tech from BITS Pilani
Loves Programming in
C,C++,JavaScript (LINUX
Environment).
View my complete profile

Scope a nd Objectiv es
The scope of the course is primarily to understand architectural abstractions, localizing
and codifying the ways components interact, and distinguish among the various ways in
which architectural principles can be applied to software system and analysis and
design.
At the end of studying this course, the student should be able:
To illustrate the current state of the discipline of Software Architecture and examine the
ways in which architectural design can affect software design.
To study the various architectural styles used in software engineering.
To understand the evaluate designs of existing software systems from an architectural
perspective.
To provide the intellectual building blocks for designing new systems in principled
ways, using well-understood architectural paradigms.
To present concrete examples of actual system architectures that can serve as model
for new designs.
P r escr ibed Tex tbooks
Bass, Len . Software Architecture in Practice. Pearson Education, Either 2nd or 3rd Ed.
Buschmann, F. Pattern Oriented Software Architecture. Vol 1, Wiley Student Edition, 2002.
-----------------------------------------------------------------------------

http://bits-pilani-wilp.blogspot.in/2015/01/sem-2-electives-course-details.html

1/11

3/14/2015

Bits Pilani Wilp: sem-2 electives course details


C our se No. : SS ZG5 13
C our se Titl e : Networ k Secur ity
C our se Descr iption
The primary goal of the course is to introduce the student to system and application
design aspects of network security including cryptographic, systemic and
computational security aspects of the network / internetwork systems.
Objectiv e a nd Scope of the C our se
This course aims at providing a sound conceptual foundation in the area of Network
Security with emphasis on the design aspects while adopting combination of the
systems approach. The course attempts to provide a balanced treatment of the state-ofthe-art in the area and thus prepares the students for taking more rigorous and
specialized courses in this and related fields. At the end of this course, students should
be able to design, build and analyze simple network security architectures and systems.
C our se Ma ter ia l
Being a graduate-level course, no single book would actually suffice for the purpose of
this course. In addition, from time to time, students would be expected to consult
identified material from different sources including research papers, standards, patents
and case-studies.
P r escr ibed Tex t book
William Stallings: Cryptography and Network Security, 5th Edition, Prentice-Hall /
Pearson Education, Englewood Cliffs /New Delhi, 2011. (A new edition has appeared as:
William Stallings: Cryptography and Network Security, 6th Edition, Prentice-Hall Inc.,
2013. Unfortunately, as of now Indian reprint is not available. Those, who can afford it,
are encouraged to use the new edition.)
-----------------------------------------------------------------------------C our se No. : IS ZC 462
C our se Titl e : Networ k P r og r a m m ing
C our se Descr iption
Overview of computer networks; inter-process communication; network programming;
Socket interface; client-server computing model; design issues, concurrency in server
and clients; external data representation; remote procedure calls.
Scope a nd Objectiv es
At the end of this course, the students would be able to design and implement network
client-server applications.
P r escr ibed Tex t B ooks
Stevens, R.W., Unix Network Programming, Vol-I Networking APIS : Sockets and XTI,
Prentice- Hall of India, 3rd Edition, 2004
Stevens, R.W., Unix Network Programming: Vol-II Inter Process Communications,
Prentice-Hall of India, 2nd Edition, 1999.

------------------------------------------------------C our se No. : SS ZG5 27


C our se Titl e : C LOUD C OMP UTING
C our se Descr iption
Concurrency and distributed computing, message passing over the network,
connectivity and failure models, local vs remote connectivity, distributed resource
modeling, distributed data models; replication & consistency; virtualization; CPU
virtualization, memory and storage virtualization, virtualized networks, computing
over WAN and Internet; computing on the cloud, computing models, service models and
service contracts, programming on the cloud; Cloud infrastructure, LAN vs Wan issue,
resource scaling and resource provisions, performance models, scalability,
performance measurement and enhancement techniques; cloud applications and
infrastructure services.
Scope a nd Objectiv e
The primary goal of the course is to introduce the student to cloud computing from cloud
provider and service provider perspectives. As such the emphasis of the course would
be on the underlying infrastructure and architecture of clouds, techniques for enabling
services and the quality of such services, as well as issues in designing clouds. Specific
issues in performance, security, and management would also be addressed. Case studies
would be used to illustrate the techniques and highlight the issues.
P r escr ibed Tex t B ooks
Rajkumar Buyya, James Broburg & anderzej M.G, Cloud Computing Principles and
Paradigms. John Wiley Pub, 2011
Dinkar Sitaram and Geetha Manjunath. Moving to the Cloud. Syngress (Elsevier) Pub, 2011
---------------------------------------------------------------------------C our se No. : B ITS ZC 481

http://bits-pilani-wilp.blogspot.in/2015/01/sem-2-electives-course-details.html

2/11

3/14/2015

Bits Pilani Wilp: sem-2 electives course details


C our se Titl e : C om puter Networ ks
C our se Descr iption
Introduction, History and Development of Computer Networks, Concept of Layered
Architecture (e.g. OSI Model and TCP/IP Model), Application Layer: Basic Communication
Applications and Protocols, Transport Layer: Services and Protocols, Reliable Protocol
Design Concepts, Network Layer: Services, Routing Algorithms and Protocols, Inter
domain and Intra domain Routing, Multicasting, IP Addressing, Concept of Sub Networks,
Link Layer: Services, Channel Access Protocols, Link layer Addressing, Interconnection
devices (e.g. Hub, Bridge, Switch, Routers), ATM and MPLS networks, Concept of LAN, LAN
Implementations, Physical Layer: Physical Media, Data Communication Basics, Line
Encoding Techniques,
Network Security: Principles, Symmetric and Asymmetric encryption, Confidentiality,
Authenticity, Integrity and Non-repudiation.
Scope a nd Objectiv e
This course will give you a breakdown of the applications, communications protocols,
and network services that make a computer network work. It focuses on computer
networks underlying architecture using TCP/IP model. We will closely follow the top
down approach to computer networking as given in the textbook, which will enable you
to understand the most visible part i.e. the applications, and then seeing, progressively,
how each layer is supported by the next layer down. Most of the time, our example
network will be Internet. Also, some time examples will be from wireless and mobile
networks will be covered as currently users access the Internet from offices, from
homes, while on move, and from public places wirelessly.
P r escr ibed Tex t B ook
Kurose James F and Keith W. Ross: Computer Networking: A Top-Down Approach
Featuring the Internet, Pearson Education, 3rd Edition, 2005.
---------------------------------------------------------------------------C our se No. : C S ZG5 25
C our se Titl e : A dv a nced C om puter Networ ks
C our se Descr iption
This is a graduate level course on computer networking and assumes a student has a
basic familiarity with networking concepts. We will discuss around 25 research papers
on various aspects of computer networking. This course will introduce students to the
basic design principles on which today's networks are based along with the current and
emerging research topics in computer networking. In addition, this course will cover
some recent proposals to improve network performance, functionality and scalability.
The emphasis of the course is on topics in wide-area networks and measurement
methodologies for Internet experiments. The tentative list of topics to be covered are:
Internet Architecture & Principles, Congestion/flow control, Traffic Engineering and
traffic analysis, network measurements, Inter & Intra domain routing principles and
design challenges, Multicast, Overlay networks (P2P), Wireless networks, Content
Distribution Networks (CDN), Software Defined Networks (SDNs) and Cloud & Data Center
Networks.
Scope a nd Objectiv es
To understand the state of the art in network protocols, network architecture, and
networked systems.
To develop a strong understanding of the core concepts of computer networks
To understand how to engage in networking research
P r escr ibed Tex t B ook
No specific book available
Refer ence B ooks
[R1] Kurose James F and Keith W. Ross: Computer Networking: A Top-Down Approach
Featuring the Internet, Pearson Education, 5th Edition, 2012.
[R2] L. Peterson and B. Davie, Computer Networks: A Systems Approach, Fourth Edition,
Elsevier, 2007
[R3] Andrew S. Tanenbaum, Computer Networks, Fourth Edition, Pearson Education, 2006.
-----------------------------------------------------------------------C our se No. : SS ZG5 31
C our se Titl e : P er v a siv e C om puting
C our se Descr iption
The course is about the emerging discipline of Pervasive Computing, also known as
Ubiquitous Computing, Everywhere Computing and Invisible Computing. The key
element here is the omnipresence of information devices. These devices can be
embedded into cars, airplanes, ships, bikes, posters, signboards, walls and even clothes.
This course focuses on independent information devices including mobile phones, smart
phones, and laptops (PCs), and the services made available by them. It includes human-

http://bits-pilani-wilp.blogspot.in/2015/01/sem-2-electives-course-details.html

3/11

3/14/2015

Bits Pilani Wilp: sem-2 electives course details


computer interaction using several types of elements including text, speech, and
handwriting.
Scope a nd Objectiv es
The course aims at providing a sound conceptual foundation in the area of Pervasive
Computing aspects. The course attempts to provide a balanced treatment of the
mechanisms and environments of pervasive computing and initiates senior CS students
to the state-of-the-art in the area. At the end of this course, students should be able to
conceptualize, analyze and design select classes of pervasive computing systems.
P r escr ibed Tex t B ooks:
No graduate level course can depend on only one book.
Jochen Burkhardt, Horst Henn, Stefan Hepper, Thomas Schaec & Klaus Rindtorff:
Pervasive Computing: Technology and Architecture of Mobile Internet Applications,
Pearson Education, New Delhi, 2006.
Refer ence Ma ter ia l :
Stefen Poslad: Ubiquitous Computing: Smart Devices, Environments and Interactions,
Wiley, Student Edition, 2010.
Rahul Banerjee: Lecture Notes in Pervasive Computing, BITS Pilani, 2012.
A. Genco, S. Sorce: Pervasive Systems and Ubiquitous Computing, WIT Press, 2012.
Ajith Abraham (Ed.): Pervasive Computing, Springer-Verlag, 2012.
Guruduth S. Banavar, Norman H. Cohen, Chandra Narayanaswami: Pervasive Computing:
An Application-Based Approach, Wiley Interscience, 2012.
Frank Adelstein, S K S Gupta, GG Richard & L Schwiebert: Fundamentals of Mobile and
Pervasive Computing, Tata McGraw-Hill, New Delhi, 2005.
--------------------------------------------------------------------C our se No. : IS ZC 415
C our se Titl e : Da ta Mining
C our se Descr iption
Introduction, Applications, issues in data mining, data warehouse, dimensional modeling,
Online Analytical Processing (OLAP), data warehousing to data mining, data mining
tasks, association rules, advanced association rules, classification, different approaches
for classification, prediction, clustering, outlier analysis, mining spatial databases,
temporal databases, mining time series and sequence data, mining world wide web.
Scope a nd Objectiv es
The course explores the concepts and techniques of data mining, a promising and
flourishing frontier in database systems. Data Mining is automated extraction of
patterns representing knowledge implicitly stored in large databases, data warehouses,
and other massive information repositories. It is a decision support tool that addresses
unique decision support problems that cannot be solved by other data analysis tools
such as Online Analytical Processing (OLAP). The course covers data mining tasks like
constructing decision trees, finding association rules, classification, and clustering. The
course is designed to provide students with a broad understanding in the design and use
of data mining algorithms. The course also aims at providing a holistic view of data
mining. It will have database, statistical, algorithmic and application perspectives of
data mining.
P r escr ibed Tex t B ook
Tan, Pang-Ning and other Introduction to Data Mining Pearson Education, 2006.
--------------------------------------------------------------SS ZG5 48
A dv a nced Da ta Mining
Topics beyond conventional record data mining. Mining complex data structures.
Tree/graph
mining, sequence mining, web/text data mining, stream data mining, spatiotemporal
data
mining, mining multi-variate time series data, high-dimensional data clustering, and
mining
social networking sites. Mining data from multiple relations (Multi-relational Data
Mining).
Privacy preserving Data Mining. Distributed computing solutions for data intensive data
mining.
-------------------------------------------------------------IS ZC 446
Da ta Stor a g e Technol og ies & Networ ks
Storage Media and Technologies Magnetic, Optical and Semiconductor media,
techniques for read/write operations, issues and limitations. Usage and Access
Positioning in the memory hierarchy, Hardware and Software Design for access,
Performance issues. Large Storages Hard Disks, Networked Attached Storage,

http://bits-pilani-wilp.blogspot.in/2015/01/sem-2-electives-course-details.html

4/11

3/14/2015

Bits Pilani Wilp: sem-2 electives course details


Scalability issues, Networking issues. Storage Architecture. - Storage Partitioning,
Storage System Design, Caching, Legacy Systems. Storage Area Networks Hardware
and Software Components, Storage Clusters/Grids. Storage QoS Performance,
Reliability, and Security issues.
-------------------------------------------------------------C our se No. : SS ZG5 15
C our se Titl e : Da ta Wa r ehousing
C our se Descr iption
Introduction, Evolution of data warehousing; decision support systems; goals, benefit,
and challenges of data warehousing; architecture; data warehouse information flows;
software and hardware requirements; approaches to data warehouse design; creating
and maintaining a data warehouse; Online Analytical Processing (OLAP) and multidimensional data, multi-dimensional modeling; view materialization; data marts; data
warehouse metadata; data mining.
Scope a nd Objectiv es
Corporate decision makers require access to all the organizations data, wherever it is
located. To provide comprehensive analysis of the organization, its business, its
requirements and any trends, require access to not only the current data in the database
but also to historical data. To facilitate this type of analysis, data warehouses have been
created to contain data drawn from several sources, maintained by different
departments of the organization. This course will involve an in-depth study of various
concepts needed to design and develop a data warehouse and its maintenance. It also
provides an introduction to data warehouse security, data mining and end user access
tools for a data warehouse.
P r escr ibed Tex t B ook(S)
Ponnaiah, Paulraj, Data Warehousing Fundamentals, Wiley-Student Edition, 2001
Kimball R, The Data Warehouse Toolkit, Wiley-Student Edition, 2nd Ed., 2002.
------------------------------------------------------------------C our se No. : B ITS C 464
C our se Titl e : Ma chine Lea r ning
C a ta l og Descr iption
Machine Learning is an exciting sub-area of Artificial Intelligence which deals with
designing machine which can learn and improve their performance from
examples/experience. This course introduces the student to the key algorithms and
theory that forms the core of machine learning. The course will cover the major
approaches to learning namely, supervised, unsupervised, and reinforcement leaning.
The course emphasizes various techniques, which have become feasible with increased
computational power. The topics covered in the course include regression, decision
trees, support vector machines, artificial neural networks, Bayesian techniques, Hidden
Markov models, genetic algorithms etc.
Text Books:
Tom M. Mitchell, Machine Learning, The McGraw-Hill Companies, Inc. International
Edition 1997.
-------------------------------------------------------------------------C our se No. : B ITS ZG5 5 3
C our se Titl e : Rea l Tim e Sy stem s
C our se Descr iption
Introduction to real-time systems, Modeling of a Real-Time System, Task assignment and
scheduling, Resource management, Real-time operating systems, RTOS services,
Programming language with real-time support, System design techniques, Intertask
communication, Fault tolerant techniques, Reliability evaluation methods; Performance
analysis, Case studies of real-time systems.
Scope a nd Objectiv es
At the end of the course, the student should be able to understand Real-Time systems,
modeling and Design of Real-Time Systems, Task scheduling, resource management,
real-time operating systems, fault tolerant techniques
P r escr ibed Tex t B ooks
1.Liu, Jane W.S., Real Time Systems, Pearson Education, 2000.
2.Laplante, Phillip A., Real-Time Systems Design and Analysis, WSE, 3rd Ed., 2004.
Course Title : Real Time Systems
-------------------------------------------------------------------C our se Num ber : EEE ZG5 12
C our se Titl e : EMB EDDED SYSTEM DESIGN
C our se Descr iption
Introduction to embedded systems; embedded architectures; Architectures and
programming of microcontrollers and DSPs; Embedded applications and technologies;

http://bits-pilani-wilp.blogspot.in/2015/01/sem-2-electives-course-details.html

5/11

3/14/2015

Bits Pilani Wilp: sem-2 electives course details


power issues in system design; introduction to software and hardware co-design.
Scope a nd Objectiv e of the cour se
The course covers the design issues involved in embedded systems and system-on-chip
technologies. The course also deals with the applications and programming languages
used for embedded systems.
P r escr ibed Tex t B ooks
T1. Wolf, Wayne, Computers as Components: Principles of Embedded Computing Systems
Design, Elsevier, 2000.
Refer ence B ooks:
R1. James.K.Peckol, Embedded System Design A Contemporary Design Tool, Wiley
Student Edition, 2010
Jonathan W. Valvano, Introduction to Embedded Microcomputer Systems, Motorola 6811
and 6812 Simulation, (International Student Edition), Thomson Learning, 2003.
Steven F. Barrett, Daniel J. Pack, Embedded Systems Design and Applications with the
68HC12 and HCS12, Pearson Education, 2005.
Sriram V Iyer, Pankaj Gupta, Embedded Realtime Systems Programming, TMH, 2004.
James.K.Peckol, Embedded System Design A Contemporary Design Tool, Wiley Student
Edition, 2010
8051 Microcontroller- Hardware Manual
8051ED2 Reference Manual
Atmel ATMega 128 Reference Manual
Motorola HCS12 Reference Manual
ARM CPU Reference Manual
LPC 23xx Reference Manual
TI DSP 64xx Manual
TI DSP 67xx Manual
------------------------------------------------------------------C our se No. : IS ZC 424
C our se Titl e : Softwa r e for Em bedded Sy stem s
C our se Descr iption
Real-time and Embedded Systems; Software issues in Embedded Systems; Software
Development Process; Requirements Analysis Use Cases, Identification and Analysis
of use cases, Use Case Diagrams. Design Architectural Design, Design Patterns,
Detailed Design. Implementation Languages, Compilers, Runtime Environments and
Operating Systems for embedded software. Testing Methodologies, Test Cases
Objectiv e of the cour se
To introduce the students to issues and challenges in developing software for
embedded systems and to educate them in methodologies, tools and techniques for
developing such software.
Scope of the cour se
The course will review basics of embedded and real-time systems and generic software
processes. The primary focus will be on identifying specific issues related to embedded
software development within the usual phases of software development cycle
requirements, design, implementation and testing. A number of illustrative examples
will be used as ad-hoc case studies for different phases to bring out the issues and
challenges in the process. Specific technologies, operating environments and
development tools will be also used as part of the practical aspects of the course.
P r escr ibed Tex t B ook:
Douglass Bruce Powel, Real-Time UML, Pearson Education, 3rd Edition, 2004
Reference Book
Douglass, Real-Time UML Workshop for Embedded Systems, Elsevier, 1st Edition, 2011
-------------------------------------------------------------------C our se Num ber : EA ZC 473
C our se Titl e : Mul tim edia C om puting
C our se Descr iption
Introduction to multimedia; media & data streams; image, documents, video & audio file
formats and their representation; image and video processing, synthesis of audio signal;
text, image, audio and video compression techniques; Storage Media & Other Hardware;
Documents, Hyper Text, MHEG & User Interface; Multimedia Operating System &
Synchronization; Multimedia Communications, Networks & Standards; Multimedia
Applications & Architecture; Multimedia Databases, Future Directions and Research
Agenda
Scope a nd Objectiv es
The aim of this course is to introduce the concepts of multimedia computing techniques
as used for various data streams, multimedia networks, operating systems and
architecture. Emphasis will be given to theoretical, algorithmic and advanced
architectural aspects of multimedia system design along with detailed coverage of
latest compression techniques available for text, images, audio and video data. After

http://bits-pilani-wilp.blogspot.in/2015/01/sem-2-electives-course-details.html

6/11

3/14/2015

Bits Pilani Wilp: sem-2 electives course details


successful completion of the course student should be able to apply the concepts and
techniques to various problem domains concerned with multimedia based applications
and solutions.
P r escr ibed Tex tbook(s)
Li, Ze-Nian and Mark S. Drew, Fundamentals of Multimedia, Prentice Hall of India, 2004.
Steinmetz Ralf and K. Nahrstedt Multimedia: Computing, Communications &
Applications,, Pearson Education, 1995
Refer ence B ooks
Jeffcoate J, Multimedia in Practice Technology & Applications, PHI, 1998
Gonzalez R C & Woods R E, Digital Image Processing, 3rd Edition, Pearson Education,
2008
IEEE Transactions/ACM Magazines on Multimedia, Image and Signal Processing, Audio &
Video
-----------------------------------------------------SS ZG65 6
Networ ked Em bedded A ppl ica tions
Networked embedded systems, Clock synchronization, Protocol mechanisms protocol
performance, CAN Bus architecture, USB Architecture, Embedded Internet, Distributed
computing, Use of Java in building networked systems, Reliability & Fault Tolerance etc.
Mission-critical distributed real-time applications, e.g., military, air traffic control;
Prototyping
benchmark applications, e.g. simulated air traffic visualization, radar display;
Networking:
TCP/IP, distributed objects; Embedded system programming and middleware: I/O, analog
/
digital conversion, DSP, runtime monitoring of CPU, processes, network equipment;
Modeling
distributed real-time systems; Quality of service maintenance.
------------------------------------------------------SS ZG626
H a r dwa r e Softwa r e C o-Desig n
FPGA and ASIC based design, Low-Power Techniques in RT Embedded Systems On-chip
networking. Hardware Software partitioning and scheduling, Co-simulation, synthesis
and
verifications, Architecture mapping, HW-SW Interfaces and Re-configurable computing.
---------------------------------------------------IS ZC 423
Softwa r e Dev el opm ent for P or ta bl e Dev ices
Introduction to mobile computing and emerging mobile application and hardware
platforms;
Developing and assessing mobile applications; Software lifecycle for mobile
application
design and architecture, development tools, techniques, frameworks, deployment;
Human
factors and emerging human computer interfaces (tangible, immersive, attentive,
gesture, zeroinput); Select application domains such as pervasive health care, m-Health; Mobile web
browsing, gaming and social networking.
----------------------------------------------------B ITS ZG5 5 3
Rea l Tim e Sy stem s
Real time software, Real time operating systems-scheduling, virtual memory issues and
file
systems, real time data bases, fault tolerance and exception handling techniques,
reliability
evaluation, data structures and algorithms for real time/embedded systems,
programming
languages, compilers and run time environment for real time/embedded systems, real
time
system design, real time communication and security, real time constraints and multi
processing
and distributed systems.
---------------------------------------------------C S ZG5 24
Rea l Tim e Oper a ting Sy stem s
Real time software, Real time operating systems-scheduling, virtual memory issues and
file
systems, real time data bases, fault tolerance and exception handling techniques,
reliability
evaluation, data structures and algorithms for real time/embedded systems,
programming
languages, compilers and run time environment for real time/embedded systems, real
time

http://bits-pilani-wilp.blogspot.in/2015/01/sem-2-electives-course-details.html

7/11

3/14/2015

Bits Pilani Wilp: sem-2 electives course details


system design, real time communication and security, real time constraints and multi
processing
and distributed systems.
------------------------------------------------------C S ZG5 5 1
A dv a nced C om pil a tion Techniques
Generic Code Optimization Techniques - loop optimization, inlining, and other
transformations.Impact of architectures on code generation and optimization: RISC
architectures, VLIW architectures, special-purpose architectures. Architecture- specific
code optimizations register allocation, instruction scheduling. Code Optimizations
under real-time / embedded constraints cacheless / diskless memory models, bounded
time responses. Garbage Collection Techniques.
Virtual Machines and Just-in-Time Compilation techniques - HotSpot-like optimizations.
Implementation of exception handling, concurrency, and generic jumps (like call/cc).
----------------------------------------------------C our se Num ber : SS ZG5 16
C our se Titl e : C om puter Or g a niz a tion a nd Softwa r e Sy stem s
C our se Descr iption:
Programmer model of CPU; Basic concept of buses and interrupts; Memory subsystem
organization; I/O organization; Instruction Set and its characteristics; Processor Structure
and its functions, Instruction cycle, Instruction Pipeline; Concept of assembler, linker &
loader; Types of operating systems; Concept of process; OS functions: Process
scheduling, Memory Management, I/O management and related issues.
Scope a nd Lea r ning Objectiv es of the C our se:
This course introduces the students to systems aspects involved in software
development. In particular, it focuses on basic hardware architectural issues that affect
the nature and performance of software as well as those features of an operating
system with which most systems software have to interact.
At the end of this course, a student must not only be aware of various aspects of
architecture and operating systems but also must be in a position to evaluate the effects
of the same on high level software. In particular, students must be able to correlate
environmental and performance related issues of high-level software with system
level features of the architecture or an operating system.
P r escr ibed Tex t B ook (S)
Stallings William, Computer Organization & Architecture, Pearson Education, 8th Ed.,
2010
A. Silberschatz, Abraham and others, Operating Systems Concepts, Wiley Student
Edition, 8th Edition, 2008.
Refer ence B ook (S)
J. Hennessy and D. Patterson. Computer Architecture A Quantitative Approach, Morgan
Kaufman, 1990.
William Stallings, Operating Systems Internals and Design Principles. Prentice Hall of
India, 2001.
Reference Books from 24x7
C. Madana Kumar Reddy, Operating Systems Made Easy Laxmi Publications, India, 2009
Nirmala Sharma, Computer Architecture Laxmi Publications, India, 2009
-------------------------------------------------------C our se No. : C S ZG623
C our se Titl e : A dv a nced Oper a ting Sy stem s
C our se Descr iption
Overview; Distributed Operating Systems: Architectures, Theoretical Foundations,
Distributed Mutual Exclusion, Distributed Deadlock Detection, Agreement Protocols;
Resource Management: Distributed File Systems, Distributed Shared Memory,
Distributed Scheduling; Failure Recovery: Recovery; Resource Security and Protection:
Access and Flow Control, Cryptography; Multiprocessor Operating Systems; Database
Operating Systems: Introduction Concurrency Control.
C our se Objectiv e:
To introduce the design and implementation issues of Distributed Operating Systems.
P r e-r equisites.
It is assumed that the students have done a basic course on operating systems.
Scope
Distributed Operating Systems work in an environment where we have independent
machines (both hardware and software) connected with each other over a network. A
Distributed OS makes a Distributed System a virtual uniprocessor system.
The distributed OS to be studied in this course is microkernel based. It's just that the user
level processes that are separated from the kernel can run on remote machines. Also,
the OS has some sort of idea what machines are hooked up, and can make decisions about
where to run things based on the relative speed of the machines.

http://bits-pilani-wilp.blogspot.in/2015/01/sem-2-electives-course-details.html

8/11

3/14/2015

Bits Pilani Wilp: sem-2 electives course details


Few case studies like Sun NFS, V-System, Condor, Sprite, IVY, Fidge Mattern Vector Clocks,
Mutual Exclusion (Lamports) etc. shall be discussed and also implemented as part of the
coding assignments
P r escr ibed Tex t B ook
Singhal, Mukesh & N.G. Shivaratri, Advanced Concepts in Operating Systems, Tata
McGraw-Hill, 1994.
Reference Books
R1 P. K. Sinha, Distributed Operating Systems Pearson Education, 1998.
R2 Distributed Operating Systems The Logical Design by A. Goscinski, AW
R3 Modern Operating Systems by A. S. Tanenbaum, Pearson Education
R4 Distributed Systems-Concepts and Design by G. Coulouris, AW
R5 Distributed System Design by Jie Wu, CRC Press.
--------------------------------------------------------------------C our se No. : SS ZG622
C our se Titl e : Softwa r e P r oject Ma na g em ent
C our se Descr iption
Overview of Software Engineering, Project Management Concepts, Software Process &
Project Metrics, Software Project Planning, Project Evaluation, Selection of an
appropriate project approach, Software site, effort and cost Estimation, Risk Analysis &
Management, Project Scheduling & Tracking, Activity Planning, Resource Allocation,
Project Monitoring & Control, Managing Contracts, Managing People and Organizing
teams, Software Quality Assurance, Software Configuration Management
Scope a nd Objectiv es
This course covers the management techniques required to plan, organize, monitor, and
control software projects. It addresses the following questions:
How must be people, process, and problem be managed during a software project?
What are software metrics and how can they be used to manage a software project and
the software process?
How does a software team generate reliable estimates of efforts, cost, and project
duration?
What techniques can be used to formally asses the risks that can have an impact on
project success?
How does a software project manager select the set of software engineering work
tasks?
How is a project schedule created?
How is quality defined so that it can be controlled?
What is software quality assurance?
Why are formal technical reviews so important?
How is change managed during the development of computer software and after
delivery to the customer?
At the end of the course, student should be able to understand the nuances of software
project management and various tools, methodologies and metrics along with few
undocumented/informal knowledge of a seasoned project managerfor quality and ontime delivery of software project.
Students are expected to observe the PM practices in their organizations and relate them
to formal methodologies espoused in the books and discussed in the class-room.
P r escr ibed Tex t B ooks
Pressman, R.S. Software Engineering : A Practitioners Approach, 7th Edition, TMH, 2010
Hughes, B and Cotterel, M., Software Project Management, 11th Edition, TMH, 2011
---------------------------------------------------C our se Num ber : SS ZG5 5 2
C our se Titl e : Softwa r e Testing Methodol og ies
C our se Descr iption
Concepts and principles of software testing and quality assurance; software testing
techniques; functional, structural, integration and system testing techniques; software
testing process and its management; evaluation of test effectiveness; testing
specialized systems and applications; automated software testing; case studies.
Scope a nd Objectiv e
The course aims at providing a sound conceptual foundation in the area of Software
Testing Methodologies with emphasis on concepts and techniques for testing and
analysis of software. The testing of software, at a unit, subsystem and system level.
Various test techniques: specification based testing and code based testing. Techniques
and methods for software test generation and validation. The Software Analysis: Static
and Dynamic. Test adequacy. Testing Object Oriented Software. The types of software
testing: Regression and interoperability. The software test processes and management.
P r escr ibed Tex t B ooks
Software Testing: A Craftsmans Approach, Third Edition, Paul C Jorgenson, CRC Press
Foundations of Software Testing, Second Edition, Aditya P Mathur, Pearson, 2013

http://bits-pilani-wilp.blogspot.in/2015/01/sem-2-electives-course-details.html

9/11

3/14/2015

Bits Pilani Wilp: sem-2 electives course details


---------------------------------------------------------------------IS ZC 444
A r tificia l Intel l ig ence
The object of this course is to give an introduction to the problems and techniques of A.I.
along
with the applications of A.I. techniques to the fields like natural language understanding,
image
processing, game theory and problem solving. The course also aims at understanding its
implementation using LISP and PROLOG languages.
----------------------------------------------------------------------IS ZC 422
P a r a l l el C om puting
Introduction to parallel computing; Models of parallel computers; Interconnection
networks,
basic communication operations; Introduction to parallel algorithms; Parallel
programming
paradigms; issues in implementing algorithms on parallel computers; Parallel
programming with
message passing interface; Performance analysis; Scalability analysis; Basic design
techniques
for parallel algorithms; Parallel algorithms for selected topics like sorting, searching
and
merging, matrix algebra, graphs, discrete optimization problems and computational
geometry.
---------------------------------------------------------------B ITS ZC 463
C r y ptog r a phy
Objectives of cryptography; ciphers block and stream; mathematical foundations
modular
arithmetic, finite fields, discrete logarithm, primality algorithms; RSA; digital signatures;
interactive proofs; zeroknowledge proofs; probabilistic algorithms; pseudorandomness.

Posted by sachin chaudhary at 7:04 AM

Recommend this on Google


Labels: sem-2 electives course details

2 comments:
A no ny m o us January 25, 2015 at 8:47 PM
Please provide old papers of Data Analytics....Urgent
Reply

A no ny m o us February 10, 2015 at 6:45 AM


Do u hv Software testing Quiz answers?
Reply

Enter your comment...

Comment as:

Publish

Google Account

Preview

Newer Post

Home

Older Post

Subscribe to: Post Comments (Atom)

http://bits-pilani-wilp.blogspot.in/2015/01/sem-2-electives-course-details.html

10/11

3/14/2015

Bits Pilani Wilp: sem-2 electives course details


Simple template. Powered by Blogger.

http://bits-pilani-wilp.blogspot.in/2015/01/sem-2-electives-course-details.html

11/11

You might also like