July 7 – July 24
This summer the SJSU Computer Science Department will be hosting the 2015 Summer University Program. This annual summer program gives SJSU Computer Science and Software Engineering majors an opportunity to network with peers from Switzerland and India. There will be short courses, presentations, excursions to local companies, and social events. SJSU students can receive academic credit (CS180) for the course in the Fall 2015 semester. (See the Summer University web page for an overview of the program and descriptions and photos from past programs.)
2013 Summer University students posing in front of Google/Android Lab
· Excursions & Events (Tentative)
· FaceBook page: 2015 Summer University @ SJSU
For students requiring accommodation the cost will be $880 ($44/night x 20 nights). This must be paid in advance. This does not include meals, airport transfer, or parking ($63). In addition, SJSU and PESIT students must pay a $300 program fee. This fee includes excursions, short courses, and social events for the entire three week period. Normal tuition fees apply for SJSU students wanting credit in the Fall 2015 CS 180 course, but this is optional.
Participants are required to attend all scheduled classes,
seminars, excursions, and events.
Time |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
Saturday |
Sunday |
|
6-Jul |
7-Jul |
8-Jul |
9-Jul |
10-Jul |
11-Jul |
12-Jul |
900 -
1200 |
|
Free |
Course 1 |
Seminar 1 |
Course 1 |
Free |
|
1300 -
1600 |
|
1:00 Opening meeting |
Course 2 |
Pinger |
Course 2 |
||
|
arrivals |
2:30 The Tech |
|
City tour |
|
||
|
|
|
|
|
|
||
|
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
Saturday |
Sunday |
|
13-Jul |
14-Jul |
15-Jul |
16-Jul |
17-Jul |
18-Jul |
19-Jul |
900 -
1200 |
Course 1 |
Computer
Museum |
Course 1 |
IBM |
Course 3 |
Free |
Angel
Island |
1300 -
1600 |
Course 2 |
LinkedIn |
Course 3 |
Course 2 |
Course 4 |
||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
Saturday |
Sunday |
|
20-Jul |
21-Jul |
22-Jul |
23-Jul |
24-Jul |
25-Jul |
26-Jul |
900 -
1200 |
Course 3 |
Seminar 2 |
Seminar 3 |
Course 3 |
Free |
Free |
|
1300 -
1600 |
Course 4 |
Facebook |
Course 4 |
Course 4 |
Closing Ceremony |
||
|
|
|
|
|
|
|
departures |
Note: All courses will be held in room 225 of MacQuarrie Hall except for the Friday morning courses, which will be held in room 450 of Duncan Hall.
1. Introduction to
Ethical Hacking (Professor Alex Karlov)
Another day and another bank is being hacked. Another big media company has its
data exfiltrated and exposed. The number and complexity of hacking attacks is
constantly growing. In order to protect our websites, computer networks and
infrastructure, we need first to learn how to think and act like a hacker as
well as master a constantly evolving set of hacking tools and methods.
In this short course an introduction to the hacking techniques, tools and overall hacker mindset will be provided. Participants would have an opportunity to perform labs – search for vulnerabilities and exploit them in a controlled environment.
You would need a laptop capable of running a virtual machine.
Course Notes for Ethical Hacking:
· Introduction to Ethical Hacking
Graphs are a natural representation in many applications, it is useful to pose a lot of inference questions on the graph itself. Also graph based representations are better suited in the case of heterogeneous data, since it is generally easier to incorporate new relationships. Graph analytics has rapidly evolved into a useful methodology in present day applications, given the wealth of literature both theoretical and applied. In this era of Big Data large scale graph processing is a major research topic. In fact a full solution for a growing number of data mining problems requires the convergence of techniques from various fields such as machine learning, graph theory and high performance computing.
The course will focus on special topics related to graphs which are either useful for research and/or large scale graph analytics and are normally not covered in a conventional course. The emphasis will be on providing a basic theoretical foundation related to selected special topics coupled with hands on exercises. At the end of the course the students should have exposure to topics such as graph partitioning and clustering (eg. spectral clustering), finding connected components and one or two advanced graph based algorithms.
Standard well known algorithms often do not scale well for large graphs that arise in present day applications, hence parallel algorithms for tasks such as Breadth First Search and other common operations are an important consideration for these applications. This aspect will be covered via a mini project where the students identify existing software/libraries and apply it on a reasonably large graph. Formulating well known graph problems as discrete optimization problems will also be touched upon briefly.
This course will discuss some of the security challenges that plague the web today. Among others, we will look at cross-site scripting (XSS) attacks and SQL injection vulnerabilities. We will also cover defenses against these attacks, and counter-measures that attackers use to evade those defenses in order to better explore the cat-and-mouse game that is security on the web.
Agent-based architectures are the ultimate extension of peer-based distributed applications. In this course we will use the NetLogo platform to explore agent-based computing. A NetLogo application can be viewed as a simulated society. As an agent moves around the environment, its behavior sends waves of influence through the society, mixing with the influence waves generated by other agents and ultimately reflecting back upon the agent. This creates an influence feedback system that is typical of non-linear systems. Such systems often defy mathematical solutions, but are easy to study using computer simulations. We will use NetLogo to model self-organizing systems such as bee colonies, bird flocks, forest fires, evolution, markets, and rebellions.
Course website: SU15 Agent Based Modeling
Debra teaches technical communication in the SJSU Computer Science Department. She is also the director of the department's internship program.
Shomit joined ONSET in 2001, and helps lead ONSET’s
investments in software. Prior to entering venture capital, Shomit was a
start-up software entrepreneur for 19 years. His operating roles included three
successful IPOs as SVP of Operations at Tumbleweed Communications, which IPO’d
in 1999; VP of Worldwide Services at BroadVision, which IPO’d in 1996; and
software engineer at Sun Microsystems, which IPO’d in 1986. Shomit was
also CEO and board member of ONSET portfolio company, Truviso, for two years
through its acquisition by Cisco Systems.
Shomit has represented ONSET on the boards of Adara,
AdsNative, Gridstore, Pancetera (acquired by Quantum), Truviso, Vidder and
Vindicia. In his private life he has been committed to coaching girls’
sports for almost 20 years in softball, high-level club soccer, and club and
high school varsity and junior varsity lacrosse.
At the age of 15, Shomit was awarded two academic scholarships to the University of California, Berkeley, and graduated with a degree in Computer Science. He serves on the advisory boards of UC Berkeley College of Engineering’s Sutardja Center, Innovation Center Denmark’s ScaleIT program, and the Lundbeck Foundation Clinical Research Fellowship Program.