Summer University 2015

July 7 – July 24

This summer the SJSU Computer Science Department will be hosting the 2015 Summer University Program. This annual summer program gives SJSU Computer Science and Software Engineering majors an opportunity to network with peers from Switzerland and India. There will be short courses, presentations, excursions to local companies, and social events. SJSU students can receive academic credit (CS180) for the course in the Fall 2015 semester. (See the Summer University web page for an overview of the program and descriptions and photos from past programs.)

2013 Summer University students posing in front of Google/Android Lab

Information for Participants

·       Excursions & Events (Tentative)

·       FaceBook page: 2015 Summer University @ SJSU

·       Practical information

·       Check-In Procedure

Fees & Costs:

For students requiring accommodation the cost will be $880 ($44/night x 20 nights). This must be paid in advance. This does not include meals, airport transfer, or parking ($63). In addition, SJSU and PESIT students must pay a $300 program fee. This fee includes excursions, short courses, and social events for the entire three week period. Normal tuition fees apply for SJSU students wanting credit in the Fall 2015 CS 180 course, but this is optional.

Schedule (tentative)

Participants are required to attend all scheduled classes, seminars, excursions, and events.

Time

Monday

Tuesday

Wednesday

Thursday

Friday

Saturday

Sunday

 

6-Jul

7-Jul

8-Jul

9-Jul

10-Jul

11-Jul

12-Jul

900 - 1200

 

Free

Course 1

Seminar 1

Course 1

Free

1300 - 1600

 

1:00 Opening meeting

Course 2

Pinger

Course 2

 

arrivals

 2:30 The Tech

 

 City tour

 

 

 

 

 

 

 

 

Monday

Tuesday

Wednesday

Thursday

Friday

Saturday

Sunday

 

13-Jul

14-Jul

15-Jul

16-Jul

17-Jul

18-Jul

19-Jul

900 - 1200

Course 1

Computer Museum

Course 1

IBM

Course 3

Free

Angel Island

1300 - 1600

Course 2

LinkedIn

Course 3

Course 2

Course 4

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Monday

Tuesday

Wednesday

Thursday

Friday

Saturday

Sunday

 

20-Jul

21-Jul

22-Jul

23-Jul

24-Jul

25-Jul

26-Jul

900 - 1200

Course 3

Seminar 2

Seminar 3

Course 3

Free

Free

1300 - 1600

Course 4

Facebook

Course 4

Course 4

Closing Ceremony

 

 

 

 

 

 

 

departures

Note: All courses will be held in room 225 of MacQuarrie Hall except for the Friday morning courses, which will be held in room 450 of Duncan Hall.

Courses (Tentative)

1. Introduction to Ethical Hacking (Professor Alex Karlov)
Another day and another bank is being hacked. Another big media company has its data exfiltrated and exposed. The number and complexity of hacking attacks is constantly growing. In order to protect our websites, computer networks and infrastructure, we need first to learn how to think and act like a hacker as well as master a constantly evolving set of hacking tools and methods.

In this short course an introduction to the hacking techniques, tools and overall hacker mindset will be provided.  Participants would have an opportunity to perform labs – search for vulnerabilities and exploit them in a controlled environment.

You would need a laptop capable of running a virtual machine.

Course Notes for Ethical Hacking:

·       Introduction to Ethical Hacking

·       Submission Guidelines

2. Special topics in applied graph theory and analytics (Dr. Minita Matthew)

Graphs are a natural representation in many applications, it is useful to pose a lot of inference questions on the graph itself. Also graph based representations are better suited in the case of heterogeneous data, since it is generally easier to incorporate new relationships. Graph analytics has rapidly evolved into a useful methodology in present day applications, given the wealth of literature both theoretical and applied. In this era of Big Data large scale graph processing is a major research topic. In fact a full solution for a growing number of data mining problems requires the convergence of techniques from various fields such as machine learning, graph theory and high performance computing.

The course will focus on special topics related to graphs which are either useful for research and/or large scale graph analytics and are normally not covered in a conventional course. The emphasis will be on providing a basic theoretical foundation related to selected special topics coupled with hands on exercises. At the end of the course the students should have exposure to topics such as graph partitioning and clustering (eg. spectral clustering), finding connected components and one or two advanced graph based algorithms.

Standard well known algorithms often do not scale well for large graphs that  arise in present day applications, hence parallel algorithms for tasks such as Breadth First Search and other common operations are an important consideration for these applications. This aspect will be covered via a mini project where the students identify existing software/libraries and apply it on a reasonably large graph. Formulating well known graph problems as discrete optimization problems will also be touched upon briefly.

3. Web Security (Professor Tom Austin)

This course will discuss some of the security challenges that plague the web today.  Among others, we will look at cross-site scripting (XSS) attacks and SQL injection vulnerabilities.  We will also cover defenses against these attacks, and counter-measures that attackers use to evade those defenses in order to better explore the cat-and-mouse game that is security on the web.

4. Agent Based Modeling (Professor Jon Pearce)

Agent-based architectures are the ultimate extension of peer-based distributed applications. In this course we will use the NetLogo platform to explore agent-based computing. A NetLogo application can be viewed as a simulated society. As an agent moves around the environment, its behavior sends waves of influence through the society, mixing with the influence waves generated by other agents and ultimately reflecting back upon the agent. This creates an influence feedback system that is typical of non-linear systems. Such systems often defy mathematical solutions, but are easy to study using computer simulations. We will use NetLogo to model self-organizing systems such as bee colonies, bird flocks, forest fires, evolution, markets, and rebellions.

Course website: SU15 Agent Based Modeling

Seminars

Seminar 1: Identifying and Selling the Brand of You. Optimizing your LinkedIn summary and profile, Debra Caires

Debra teaches technical communication in the SJSU Computer Science Department. She is also the director of the department's internship program.

Seminar  2: VCs & entrepreneurs: start-ups in 2015, Shomit Ghose

Shomit joined ONSET in 2001, and helps lead ONSET’s investments in software.  Prior to entering venture capital, Shomit was a start-up software entrepreneur for 19 years. His operating roles included three successful IPOs as SVP of Operations at Tumbleweed Communications, which IPO’d in 1999; VP of Worldwide Services at BroadVision, which IPO’d in 1996; and software engineer at Sun Microsystems, which IPO’d in 1986. Shomit was also CEO and board member of ONSET portfolio company, Truviso, for two years through its acquisition by Cisco Systems. 

Shomit has represented ONSET on the boards of Adara, AdsNative, Gridstore, Pancetera (acquired by Quantum), Truviso, Vidder and Vindicia.  In his private life he has been committed to coaching girls’ sports for almost 20 years in softball, high-level club soccer, and club and high school varsity and junior varsity lacrosse.

At the age of 15, Shomit was awarded two academic scholarships to the University of California, Berkeley, and graduated with a degree in Computer Science. He serves on the advisory boards of UC Berkeley College of Engineering’s Sutardja Center, Innovation Center Denmark’s ScaleIT program, and the Lundbeck Foundation Clinical Research Fellowship Program.

Seminar 3: To be announced