Saturday, October 17, 2009

Doctoral Examination Procedures for students

All students who enter the Doctoral Program of the Department of Computer Science starting with Fall 1999 shall follow the following procedures.
Preliminary Examination
  1. All doctoral students must pass the Preliminary Examination no later than the fourth semester after the initial registration in the doctoral program.
  2. Students are allowed to attempt the exam twice and must pass in all three subject areas in order to pass the exam.
    - Students must take the exam in all three subject areas in the first attempt.
    - To pass in the first attempt, the student must pass each of the three subject areas; otherwise, the student fails.
    - Students who fail in the first attempt are allowed a second attempt in which they need to retake the exam only in the area(s) that they failed in the first attempt. To pass the second attempt, the student must pass each of the repeated areas; otherwise, the student fails the second attempt, and will then be dismissed from the program.
    - Students may petition for a third attempt.
  3. The Preliminary Examination is a written in-class, closed-book examination, given during the fall and spring semesters typically on the last Friday before the reading period.
    - The duration of the Preliminary Examination is 6 hours plus 1½ hours of break time.
  4. The exam consists of three subject areas based on the material in the core curriculum (CS210, CS211, CS212).
    - In each subject area, students must answer two questions out of three given questions during a 2-hour period. If three answers are submitted, the best two results will be considered. Each question weighs 50%.
    - The cut-off point for passing each area is 70% without curving.
    - The examination schedule is

    9:30AM-11:30:AM: Software
    11:30AM-12:30PM: Break
    12:30PM-2:30PM: Architecture
    2:30PM-3:00PM: Break
    3:00PM-5:00PM: Algorithms
New Doctoral Qualifying Examination (DQE)
Part I
  1. The Doctoral Qualifying Examination, Part I, shall be taken after the student has successfully passed the Preliminary Examination.
  2. The student's advisor, with the approval of the department chairperson, shall appoint a committee consisting of at least 3 full-time faculty of the department. The written part of the examination shall be constructed and graded by the examination committee.
  3. The examination is a written take-home examination, which lasts for 7 days and is composed of several questions in the students major area of study and supporting minor areas. The examination is open notes and books.
  4. After assessing the student's performance on the written examination, the examining committee may administer an oral portion of the examination. The examining committee reports its findings to the faculty of the Department.
Part II: Thesis Proposal Exam
  1. After passing the DQE Part I, the student takes the DQE Part II.
  2. The student's research advisor, with the approval of the Department Chairperson, shall appoint an examining committee consisting of at least 3 full-time faculty of the Department.
  3. The student shall submit a research proposal in the style of a dissertation to the members of the committee.
  4. The examining committee shall evaluate the proposal and conduct an oral examination of the student to determine the readiness of the student to attempt such research. The committee shall convey its recommendation of pass/fail of the DQE Part II to the faculty of the Department.

Friday, October 16, 2009

Technical Reports

Browse reports by year: [ ALL 2005 2006 2007 2008 2009 2010 ]
Browse reports by authors: [ ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
Browse reports by title: [ ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
Recent technical reports


TR-GWU-CS-09-003 An information-theoretic approach for privacy protection in OLAP systems
by Nan Zhang, Wei Zhao
TR-GWU-CS-09-002 On The Establishment of Defender’s Reputation Against Insider Attacks
by Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das
TR-GWU-CS-09-001 A comprehensive explanation of quantum mechanics: the keyword is 'interactive holography'
by Simon Y Berkovich
TR-GWU-CS-08-001 An Operational Mechanism Featuring Gravity Amplification
by Simon Berkovich
TR-GWU-CS-07-006 Ultimate irreversibility in the Universe: continuous holographic recording of every event and biological memory as a part of it
by Simon Berkovich
TR-GWU-CS-07-005 On the Performance of Location-Centric Storage In Sensor Networks
by Kai Xing, Xiuzhen Cheng, Jiang Li, Min Song
TR-GWU-CS-07-004 Localized Compromised Node Detection in Wireless Sensor Networks
by Fang Liu, Xiuzhen Cheng, Liran Ma, Dechang Chen, David Hung-Chang Du
TR-GWU-CS-07-003 3D Underwater Sensor Network Localization
by Amin Y. Teymorian, Wei Cheng, Liran Ma, Xiuzhen Cheng
TR-GWU-CS-07-002 RFC: A Robust and Fast Rate Control Scheme in IEEE 802.11 Wireless Networks
by Yanxia Rong, Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng, Hyeong-Ah Choi
TR-GWU-CS-07-001 How to Migrate to Internet Voting
by Kim Lawson-Jenkins, Lance Hoffman
TR-GWU-CS-06-009 LKE: A Self-configuring Scheme for Location-aware Key Establishment in Wireless Sensor Networks
by Fang Liu, Xiuzhen Cheng
TR-GWU-CS-06-008 iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks
by Liran Ma, Xiuzhen Cheng, Fang Liu, Fengguang An, Jose Rivera
TR-GWU-CS-06-007 Connected Dominating Set
by Xiuzhen Cheng, Feng Wang, Ding-Zhu Du
TR-GWU-CS-06-006 Integrating Admission Control and Scheduling for Quality Controlled Streaming Services in HSDPA Networks
by J. S. Gomes, H.-A. Choi, J.-H. Kim, J. K. Sohn, H. I. Choi
TR-GWU-CS-06-005 Policy-Based QoS Aware Packet Scheduling for CDMA 1x Ev-DO
by J. Hwang, M. T. Rafaei, H.-A. Choi, J.-H. Kim, J. K. Sohn, H. I. Choi
TR-GWU-CS-06-004 Scheduling Algorithms for Policy Driven QoS Support in HSDPA Networks
by J. S. Gomes, M. Yun, H.-A. Choi, J.-H. Kim, J. K. Sohn, H. I. Choi
TR-GWU-CS-06-003 ARES: an Adaptively Re-optimizing Engine for Stream Query Processing
by Joseph Gomes, Hyeong-Ah Choi
TR-GWU-CS-06-002 Channel Aware Scheduling in Wireless Networks
by Amrinder Arora, Hyeong-Ah Choi
TR-GWU-CS-06-001 SeGrid: A Secure Grid Framework for Sensor Networks
by Xiuzhen Cheng, Fang Liu, Fengguang An
TR-GWU-CS-05-004 Loop Trees for Directed Graphs and their Applications
by W. Douglas Maurer

Research Groups in CS@GW

  • Ada-Related Research and Resources -
    Follow the link to Ada related resources for students, teachers and Ada enthusiasts.
  • Cyberspace Security and Policy Research Institute -
    The Emergence of Cyber Security Policy Research Institute as a global venue for communication, commerce, education and entertainment has blurred traditional political and organizational boundaries, made time zones irrelevant and erased language barriers. The Cyber Security Policy Research Institute carries out studies and hosts seminars that move society towards rational and informed discussion of these critical changes. CPI's mission is to encourage, promote, facilitate, and execute interdisciplinary research in areas related to the nexus of society and the Internet.
  • GW Center for Networks Research -
    The GW Center for Networks Research is an interdisciplinary academic center dedicated to the development of quantitative and computer-based models and methods for the analysis, design, and optimization of communication networks. Research into today's complex communication systems requires a multi-disciplinary approach that combines the knowledge and methodologies of electrical engineering, computer science, and mathematical optimization - and the Center will bring these knowledge areas together.
  • GW's Home of the 21st Century Research Lab -
    The Home of the 21st Century Research Lab is located at the Virginia Campus of The George Washington University. This lab represents an exciting partnership between private industry and a research university. It involves technical experts from industry, as well as GW professors, graduate and undergraduate students, all working together to explore new technologies that can improve the quality of everyday life.
  • GW Institute for Biomedical Engineering -
    GWIBE is composed of approximatel 30 faculty from the School of Engineering and Applied Science and the School of Medicine and Health Sciences (approximately half from each). The mission of the institute is to maximize collaborations of the diverse and interdisciplinary efforts by groups and individuals involved in biomedical engineering through consolidation of resources under one umbrella. GWIBE is committed to achieving and maintaining the leadership in cutting-edge research and innovative education. The ultimate aim of GWIBE is to advance the quality of medical treatment and clinical outcomes, improve the quality of life for health care patients, and to reduce the cost of health care through advances in engineering and scientific applications in medicine. GWIBE has been recognized as one of seven Signature Program areas of excellence by the
    George Washington University.
  • Human-Computer Interaction Group -
    View the different sub-fields being explored in Human-Computer Interaction, such as Human Interaction in Virtual Environments (HIVE), Interaction Techniquees and Devices, Eye Tracking etc. The HIVE problem is addressed using a holistic approach: Providing feedback to multiple senses in concert to improve the use of the high bandwidth that humans are capable of in real interactions. Virtual environment research is one of the areas that we see as having great promise as a technological framework for supporting simulation (e.g., surgical, military), collaboration, communication, and vizualization.
  • Institute for Computer Graphics -
    The computer graphics program at GW pursues three overriding themes: interdisciplinary collaboration, applications to real-world problems, and above all, individual creativity. Research topics have spanned the spectrum of physics-based motion control, interpolation of motion captured data, haptic interaction devices and techniques, sound synthesis and synchronization, global illumination, and information exploration and visualization. The students who have gone through the programs can be found all over the world in academia, movie production, game companies, government organizations, research institutions, and private companies.
  • Justice Information Technology Group -
    The group is dedicated to advancing research and education in the application of information technology to justice and public safety community. At the core of is a partnership between academic and industry made possible by close collaboration with IJIS Institute, a non-profit corporation dedicated to the successful implementation of integrated justice information systems nationwide. Activities of the group include research in application of information technology, evaluation of systems and technologies, demonstration of new information technologies and their integration, and education for practitioners related to justice information technology.
  • Laboratory for Advanced Computer Applications in Medicine -
    (LACAM) was established jointly by SMHS and SEAS in 1995. It is co-directed by Prof. James Hahn, who represents SEAS, and Prof. Raymond Walsh, who represents SMHS. Seed funding from the two participating schools equipped LACAM, located in Staughton Hall, with initial computing equipment. The research activities in LACAM have concentrated primarily on the use of simulation and visualization for surgical training, planning, and computer guidance. Medical students participate in research projects alongside engineering students, thus enhancing their educational experiences.
  • Motion Capture and Analysis Laboratory (MOCA) -
    The Motion Capture and Analysis (MOCA) Laboratory operates under the auspices of the Institute for Computer Graphics and in partnership with the Institute for Biomedical Engineering. MOCA provides the infrastructure, including laboratory space, equipment and support personnel, to enable researchers, educators, and clinicians across the University and the greater Washington D.C. area to capture, analyze, and apply digitized human motion for a variety of applications. The equipment consists of VICON Infrared motion capture equipment and associated computing equipment. The laboratory was made possible by the University Research Enhancement Fund and will be devoted to the study of human (and other) motion in science, art, engineering, and medicine.
  • Project ALISA: Adaptive Learning Image and Signal Analysis -
    Based on Collective Learning Systems Theory developed by Professor Bock, a network of adaptive learning cells has been applied to a difficult image-processing task: the detection and classification of textures and structures in images and signals. Known as ALISA (Adaptive Learning Image and Signal Analysis), this parallel-processing engine has been constructed and tested at the Research Institute for Applied Knowledge Processing (FAW) in Ulm, Germany, and here at The George Washington University over the last four years.
  • View Faculty Research Interests -
    Go to the Faculty listing to view individual research interests.

Tuesday, October 13, 2009

Admissions Overview for masters

Computer Science department has some of the standard rules for the admissions. 



  • Bachelor's Degree with a GPA of at least 3.0 on a scale of 4.0 for the last 60 hours of course work

  • Two courses in mathematics beyond pre-calculus

  • One year of science with laboratory

  • Courses in computer science using a structured language, discrete structures, data structures, and computer architecture

  • Transcripts from all attended institutions of higher education

  • Statement of Purpose

  • Application

  • GRE Score is not required unless applying for a fellowship or assistantship

  • Schedule of courses


    HOME
    Fall 2009 Summer 2009 Spring 2009
    Fall 2008 Summer 2008 Spring 2008

    Please report any problems or suggestions to regweb@gwu.edu
    Access Foggy Bottom and Mount Vernon campuses Registration Information.
    For Off-Campus Graduate Programs (a.k.a. GW Near You), please visit http://www.nearyou.gwu.edu/.

    Academic Integrity

    The Department and the University both have strict policies regarding academic integrity. Faculty, students and staff are strongly encouraged to read and understand these policies, linked below, as the department does not tolerate dishonesty in our academic environment.

    Professional Integrity

    Computer science is a profession governed by codes of ethics. The most pertinent of these codes is the ACM/IEEE-CS Software Engineering Code of Ethics and Professional Practice, which is adopted by the two largest professional societies in our discipline, ACM and the IEEE Computer Society.
    - Department Policy on Academic Integrity
    - GW Code of Academic Integrity
    - ACM-IEEE Software Engineering Code of Ethics and Professional Practice

    Course evaluations

    Beginning Fall 2002, the ACM Student Chapter now conducts all CS course evaluations. Prior to Fall 2002, CS @ GW conducted its own course evaluations.

    For Spring 2005 and beginning Fall 2006, evaluations were conducted by GWU on-line system. Beginning Fall 2005, the ACM Student Chapter conducted a paper survey for all or some of the courses.

    Undergraduate Archive


    Graduate Archive Booz Allen Hamilton Archive

    Sunday, October 11, 2009

    Graduate Courses

    This list is comprised of graduate-level courses and undergraduate-level courses (100's) that may be taken for graduate credit. CSci 173 - Continuous Algorithms
    CSci 174 - Introduction to Artificial Intelligence
    CSci 177 - Introduction to Bioinformatics
    CSci 180 - UNIX System Programming
    CSci 185 - Computer Graphics I
    CSci 186 - Simulation Methods
    CSci 187 - Design of User-Interface Programs
    CSci 190 - Real-Time Computer Systems
    CSci 191 - Computer Game Design and Programming
    CSci 194 - Discrete Analysis in Computer Science
    CSci 207 - Scientific Databases and Knowledge Formation
    CSci 210 - Advanced Software Paradigms
    CSci 211 - Computer Architectures
    CSci 212 - Design and Analysis of Algorithms
    CSci 220 - Theory of Computation
    CSci 221 - Advanced Data Structures
    CSci 223 - Graph Theory and Applications
    CSci 225 - Data Compression
    CSci 227 - Continuous Algorithms
    CSci 228 - Numerical Solutions of Differential Equations
    CSci 229 - Computing Technology in Justice and Public Safety
    CSci 232 - Computer Networks
    CSci 233 - Internet Protocols
    CSci 234 - Design of Internet Protocols
    CSci 235 - High-Performance Computing
    CSci 238 - Computer System Performance
    CSci 239 - Comparative Computer Systems
    CSci 241 - Database Systems I
    CSci 242 - Database Systems II
    CSci 243 - Data Mining
    CSci 244 - Information Retrieval Systems
    CSci 246 - Compiler Optimization
    CSci 251 - Distributed Operating Systems
    CSci 252 - Component Based Enterprise Software Development
    CSci 253 - Object-Oriented Design
    CSci 254 - Software Engineering
    CSci 255 - Software Engineering Development
    CSci 256 - Software Testing and Quality
    CSci 259 - Systems Programming
    CSci 260 - Design of Interactive Multimedia
    CSci 261 - Design and Implementation of Educational Software
    CSci 262 - Computer Graphics Programming Tools
    CSci 263 - Computer Graphics II
    CSci 264 - Design of Human-Computer Interface
    CSci 266 - Computer Animation
    CSci 270 - Artificial Intelligence
    CSci 271 - Adaptive Learning Systems I
    CSci 278 - Models of Cognition
    CSci 283 - Computer Security Principles
    CSci 284 - Computer Cryptography Principles
    CSci 285 - Information Policy (replaced by CSci 175)
    CSci 286 - Network Security Principles (replaces CSci 383)
    CSci 287 - Computer Network Defense
    CSci 288 - Wireless and Mobile Security
    CSci 289 - E-commerce Security
    CSci 297 - Special Topics
    CSci 298 - Research
    CSci 299 - Thesis Research
    CSci 300 - Thesis Research
    CSci 301 - Research and Evaluation Methods
    CSci 325 - Advanced Computing Algorithms
    CSci 326 - Parallel Algorithms
    CSci 338 - Mobile Computing and Wireless Networking
    CSci 339 - Advanced Topics in Computer Architecture
    CSci 342 - Advanced Topics in Programming Systems
    CSci 343 - Advanced Topics in Information Systems
    CSci 351 - Advanced Topic in Operating Systems
    CSci 355 - Advanced Topics in Software Engineering
    CSci 361 - Advanced Topics in Interactive Multimedia
    CSci 362 - Advanced Topics in Human-computer Interaction
    CSci 367 - Advanced Topics in Computer Graphics
    CSci 368 - Advanced Topics in Animation & Virtual Reality
    CSci 371 - Adaptive Learning Systems II
    CSci 372 - Natural Language Understanding
    CSci 377 - Advanced Topics in Machine Intelligence & Cognition
    CSci 381 - Advanced Cryptography
    CSci 383 - Computer Security Systems II (replaced by CSci 286)
    CSci 386 - Java Security Mechanisms
    CSci 387 - Advanced Topics in Information Assurance
    CSci 390 - Colloquium
    CSci 398 - Computer Science Research
    CSci 399 - Dissertation Research

    Undergraduate courses

    Courses Available Only to Students Who Are Not in a Computer Science Major or Secondary Field Program

    (These courses cannot normally be used to fulfill any requirement in these programs)
    • CSci 10 - Applications Software
    • CSci 30 - Introduction to Computers and the Internet
    • CSci 33 - Introduction to Internet Technology
    • CSci 35 - Introduction to Web Software Development
    • CSci 49 - Introduction to C Programming
    • CSci 50 - Introduction to FORTRAN Programming
    • CSci 100 - Introduction to Programming with C++
    • CSci 102 - Introduction to Programming with Java
    • CSci 103 - Data Structures and C++
    • CSci 105 - Introduction to Computer Security and Information Assurance

    Courses Available to Students in the BS and BA Majors and in the Secondary Field

     

    Saturday, October 10, 2009

    Application Instructions

    The Graduate Certificate Program is available in four distinct program formats. To ensure that we process your online application for the correct program, please follow the instructions below:

    First, you may take classes according to your own schedule demands, one or more per semester. You may choose this format at either the Virginia Campus in Ashburn, VA or the Main Campus in Foggy Bottom, Washington, DC. When completing your Application for Admissions, you should choose the campus option that pertains to the campus you most favor. Please keep in mind that you must be continuously enrolled each fall and spring semester until the completion of your program.


    Second, you may take classes as a cohort student, in the accelerated 22-week program at the Virginia Campus. Please check here for more information on the next cohort to be offered at that campus. When completing your Application for Admissions, you should choose the campus option labeled "Virginia". You should also include a line in your statement of purpose indicating your desire to be a part of the accelerated cohort program at the Virginia campus.

    Third, you may take classes as a cohort student, in the accelerated 22-week program at the Foggy Bottom campus. Please check here for more information on the next cohort to be offered at that campus. When completing your Application for Admissions, you should choose the campus option labeled "Main Campus/Foggy Bottom". You should also include a line in your statement of purpose indicating your desire to be a part of the accelerated cohort program at the Foggy Bottom campus.

    Finally, you may take classes as a cohort student, in the accelerated 22-week program at the Main Campus with Semi-Distance Learning. Though you are required to appear at the main campus five times during the program, you will complete the majority of your classes at a location of your convenience using a CD featuring instruction from recently presented classes. Please watch this space for more information on the next cohort to be offered with Semi-Distance Learning. When completing your Application for Admissions, you should choose the campus option labeled "Main Campus/Foggy Bottom". You should also include a line in your statement of purpose indicating your desire to be a part of the accelerated cohort program with Semi-Distance Learning at the Foggy Bottom Campus.

    Please note that the CSIA Graduate Certificate program will not satisfy F-1 or J-1 visa requirements for full-time enrollment. International students requiring student visas are eligible to apply to the Master of Science in Computer Science with an area of focus in Computer Security and Information Assurance.

    At this time, graduate certificate students are not eligible for federal loans, though we encourage you to contact your employer about the prospect of tuition reimbursement.

    You can start filling out the online application here.

    FAQs

    Frequently Asked Questions


    Admissions Requirements

    Curriculum


    Certificate Academic Requirements


    Continuation to Masters Degree Program


    Advisors


    Instructions for online application


    How do I apply to the certificate program?

    Are the certificate program credits transferable for credit in the MS in Computer Science


    I want to enroll in the accelerated certificate program but my company only reimburses me after I pass the course with a B or better. Is there any way I can avoid scrambling to find several thousand dollars up front?


    I would like to get a certificate in the certificate program but would have to schedule it over four semesters due to limited budget.

    Can I apply for federal loans for this program?

    Can I enroll in this program even if my bachelor’s degree is not in computer science?
    How much calculus is really needed?

    I’m a little rusty in my math (or computer networking) skills, and am afraid I may not have the prerequisites for this program.  What should I do?

    I’m already enrolled in another GW program. Can I enroll in this one in addition (and apply these courses to that program)?

    I can only attend the first half (10 weeks) of the cohort classes. Can I take the other courses on a regular semester schedule? How do I do this?

    My organization likes this program very much and it appears to meet our needs. However, we can't send somebody from our non-Washington location for 22 weeks.  Do you have any other suggestions?

    Q: How do I apply to the certificate program?

    A: Go to http://www.cs.gwu.edu/academics/graduate/csia_certificate/apply.html for details about applying online and tracking your own application or for other information on how to apply.  If you are applying for a summer cohort certificate program, please indicate on your application whether you want to take this in the traditional way (two ten-week sessions) or by semi-distance learning (meetings approximately once a month, all day, with CDs sent to you for the other lectures). 

    Q: Are the certificate program credits transferable for credit in the MS in Computer Science?

    A: Yes. An application must be completed to gain admission to the MS program in Computer Science.  Those accepted to the MS program may transfer their certificate credits toward the graduate degree.

    Q: I want to enroll in the accelerated certificate program but my company only reimburses me after I pass the course with a B or better. Is there any way I can avoid scrambling to find several thousand dollars up front?

    A: Since the accelerated cohort program does not follow the normal semester calendar, the answer is unfortunately no.  If you take certificate courses during the regular semester program, or continue on for a MS degree after you get a certificate in the accelerated program, you might be able to use a monthly payment program set up by GWU in conjunction with Academic Management Services.   Call 1-800-531-4300 or go to the AMS website at www.tuitionpay.com.

    Q: I would like to get a certificate in the cohort program but would have to schedule it over four semesters due to limited budget.

    A: You don't have to take the certificate option as a cohort - You can simply take one course at a time during the regular semesters as part of the non-cohort certificate program.

    Q: Can I apply for federal loans for this program?

    A: At this time, graduate certificate students are not eligible for federal loans, though we encourage you to contact your employer about the prospect of tuition reimbursement.

    Q: Can I enroll in this program even if my bachelor’s degree is not in computer science?

    A: Maybe. Each prospective student is different, and each case is individual and is evaluated on an individual basis. The admission requirements for the GWU Computer Science Department graduate program are:

    -A Bachelor's Degree, preferably in Computer Science or related field.
    -A 3.0 GPA in the last 60 hours of course work for the Bachelors Degree
    -Two courses in mathematics beyond pre-calculus
    -One year of science with a laboratory
    -A course in a structured programming language (equivalent of Csci51 or Csci49)
    -A course in Discrete Structures (equivalent of CSci 123)
    -A course in Data Structures (equivalent of CSci 131 or CSci 103)
    -A course in Computer Architecture (equivalent of CSci 52)
    -A course in Operating Systems (equivalent of CSci 156)

    A “standard” bachelor’s degree in computer science or a related field will satisfy these requirements in many cases. In some other cases, equivalent experience will substitute for some of these courses. For example, many network administrators have roughly equivalent skills to those gained from courses in computer architecture and/or operating systems. Most people who have programmed a decent amount in C++ or Java can satisfy the structured programming language course.

    Q: How much calculus is really needed?

    A: Note that the admissions requirements state “two years mathematics beyond pre-calculus” but are not more specific. What we are really looking for is enough mathematical grounding so you will be prepared when a few equations are used to describe an encryption method, the expected risk of something, or a hardware circuit.  Zero to few actual integrals or derivatives will be encountered.

    Q: I’m a little rusty in my math (or computer networking) skills, and am afraid I may not have the prerequisites for this program.  What should I do?

    A: If you know you don’t have the prerequisites, GW (and other local universities) offers the prerequisite courses, and you should take them first. If you are just a little rusty or uncertain, contact us with your questions.  The accelerated certificate programs typically offer a brush-up session free of charge a week before classes start to students who want or need it; this also can help you decide whether you might be biting off more than you can chew.

    Q: I'm already enrolled in another GW program. Can I enroll in this one in addition (and apply these courses to that program)?

    A: You can only be enrolled in one GW program at a time. “Enrolled” is different than “taking a course or two”. “Enrolled” means having applied and been accepted in a program. In some cases, you can “drop out” of one program, enroll in the CSIA program, earn your certificate, and then transfer those courses into the original program, to which you must reapply; but don’t try this without first consulting with your advisor in your current program.

    Q: I can only attend the first half (10 weeks) of the cohort classes. Can I take the other courses on a regular semester schedule? How do I do this?

    A: We would only accept you under those conditions assuming you met the other entrance requirements on a wait-list basis. That is, if we did not have a full cohort a week or so before the class, we would admit you. Our aim is to populate the cohort with people who will commit for twenty weeks of hard work.

    Q: My organization likes this program very much and it appears to meet our needs. However, we can't send somebody from our non-Washington location for 22 weeks.  Do you have any other suggestions?

    A: Our semi-distance learning option for this program is offered on the Foggy Bottom Campus, and allows the student to make four one-day trips and one two-day trip to Washington for in-person education and to do the rest of the studying anywhere in the world.  These trips are spaced about a month apart.  Even some working professionals who live in the Washington area prefer this, since they often are traveling on business or for other reasons can not commit to meeting two nights a week in person on one of our campuses.  Stay tuned for our announcement reagrding the next time this option will be offered.

    Conventional Program

    The CSIA certificate can also be earned by completing four courses in thr program, each with a minimum grade of a B, during the regular academic semesters, as described in the Certificate Requirements.

    Note: Not all courses are available each semester.  Please note that continuous enrollment in the fall and spring semesters must be maintained.  If you are not able to register for an appropriate course in fall or spring, you must register for a leave of absence in that semester.  Please see the Department of Computer Science about registration for a leave.

    CSIA Contacts

    For all inquiries regarding the certificate program, please contact either of the Program Directors:

    Prof. Joanthan stanton
    email: jstanton@gwu.edu

    Prof. Poorvi Vora
    email: poorvi@gwu.edu 

    Certificate Academic Requirements

    Students will be awarded the Graduate Certificate in Computer Security and Information Assurance after completion of four courses in the program, each with a minimum grade of a B, as described in the Certificate Requirements.

    Continuation to the Masters (MS) Program

    Many students who are enrolled in or have completed the certificate program choose to continue their graduate studies and apply to the MS program in Computer Science. Students accepted to the MS program may transfer all credits earned from the Graduate Certificate program.

    Completion of the Graduate Certificate program is not an implied acceptance into the MS program. Students who wish to become MS candidates must complete another application and will be subject to the normal requirements in effect for admission to regular graduate study in the CS department. Students may not be dually enrolled in the MS and certificate program.

    CSIA Curriculum

    The curriculum for the certificate program consists of two required courses and two elective courses in the area of Computer Security, each carrying three academic credits. The required courses are:

    Csci 283: Computer Security Systems I
    Techniques for security in computer systems. Authentication, logging, authorization, encryption, international common security criteria. Effects of operating systems and machine architecture. Countermeasures. Risk-analysis.
    Prerequisite: Csci 131

    Csci 286 (was CSci 383): Network Security Principles
    Security in local, global, and wireless networks; packet-level communication security protocols; Intrusion detection systems and firewalls; network authentication protocols; secure network applications: secure E-mail and web operations; secure mobile agents. Prerequisite: CSci 283. (Spring)
    Prerequisite: Csci 283


    Additional Elective Courses available in the Certificate or Full Masters Degree Program

    Csci 175: Information Policy
    Roles, issues, and impacts of computer-based information systems in national and international arenas, focusing on privacy, equity, freedom of speech, intellectual property, and access to personal and governmental information. Professional responsibilities, ethics, and common and best practices in information use. Design of computer systems that fit present and likely future realities and avoiding decisions likely to lead to nonadoption, costly retrofitting, or abandonment of these systems. May be taken for graduate credit. (Fall)

    Csci 284: Computer Cryptography
    Cryptography and codes. Secure communications using symmetric and public key algorithms. Key management, authentication, and signatures. Secure voice, video, and data. Use of cryptography in secure Internet transactions.
    Prerequisite: Csci 212

    Csci 381: Advanced Cryptography
    Cryptanalysis of AES. Factorization and primality. Computational and information-theoretic secrecy. Theory of secrecy. Zero-knowledge proofs. Secret sharing. Cooperative distributed cryptography. Provable security.
    Prerequisite: Csci 284

    Csci 287: Computer Network Defense
    Defending computer networks against the common methods and tools used to harm them, including network scans, viruses, worms, denial of service attacks, e-mail bombs, and buffer overflow attacks. Students attack and defend a real, full-featured network unconnected to any other network. Ethics and legal implications are also discussed.
    Prerequisite: Csci 286/383

    Csci 289: E-commerce Security
    Advanced technical topics in e-commerce security. X.500 registration systems, x.509/PKIX certification systems, secure payment methods, smart cards, authorization models in open distributed environments. Secure web systems, technologies, and applications.
    Prerequisite: Csci 383/286

    Csci 386: Java Security Mechanisms
    Theoretical overview and practical aspects of Java security solutions. Students develop individual Java security modules and integrate them into a complete Java security system.
    Prerequisite: Csci 383/286

    Csci 387: Advanced Topics in Information Assurance
    Seminar on current research and developments in information assurance. May be repeated for credit.

    Csci 288: Wireless and Mobile Security
    Security issues in wireless networks and mobile applications. Overview of wireless networks and mobile applications-Mobile Agents,Wireless Web, WAP, WEP, Peer-to-Peer Computing; secure routing; intrusion detection and authentication on wireless networks; security for handheld devices; encryption and cryptographic measures for wireless; real-time wireless security; security measures for embedded devices.
    Prerequisites: CSci 383/CSci 286

    CSIA Admission Requirements

    Graduate Certificate Program

    Applicants must meet the same admissions requirements as applicants applying for the M.S. program in Computer Science (see below). Completion of the certificate program is not an implied acceptance into the M.S. program. Because of full-time enrollment requirements, graduate certificate admission is not available to international students in need of a student visa. We encourage international students to apply to the Master of Science program instead.

    Master’s Program
    • Bachelor’s Degree with a GPA of at least 3.0 on a scale of 4.0 for the last 60 hours of course work
    • Two courses in mathematics beyond pre-calculus
    • One year of science with laboratory
    • Courses in computer science using a structured language, discrete structures, data structures, and computer architecture
    • Transcripts from all attended institutions of higher education
    • Statement of Purpose
    • Application
    Doctor of Science* Program
    • Direct Doctorate
      • Bachelor’s Degree with a GPA of at least 3.3 in the degree program
      • GRE Score
      • Two letters of recommendation
      • Transcripts from all attended institutions of higher education
      • Statement of Purpose
      • Application
      • Two courses in mathematics beyond pre-calculus
      • One year of science with a laboratory
      • Strong academic background including courses in structured programming language, discrete structures, and data structures
    • Post Master’s Degree
      • Master’s Degree in a computer related field
      • GPA of 3.5 on a scale of 4.0 in the Master’s work
      • GRE Score
      • Two letters of recommendation
      • Transcripts from all attended institutions of higher education
      • Statement of Purpose
      • Application
      • Master’s courses in advanced software paradigms, computer architectures, and design and analysis of algorithms

    * Please note, international applicants and applicants requesting consideration for a fellowship or an assistantship must also submit the following materials:
    For international applicants: a TOEFL score of at least 213 on the computer exam or 550 on the paper exam, a financial certificate and supporting financial documents. The George Washington University cannot admit you or send you a student visa document (I-20 or DS-2019) until you have submitted financial certification showing sufficient funds to pay for your educational expenses. The process to obtain a student visa from a U.S. consulate abroad usually takes at least three months. For this reason, we strongly recommend that you submit your financial certificate when you send in the rest of your application materials.
    For applicants requesting consideration for a fellowship or an assistantship: three letters of recommendation and a GRE general test score.
    More information, including deadlines and applications, is available at the SEAS Admission web site.

    Computer Security and Information Assurance Graduate Certificate

    Instructions for online application The Department of Computer Science (CS) in The George Washington University School of Engineering and Applied Science (SEAS) offers a graduate certificate program in Computer Security and Information Assurance. The objective of this certificate program is to provide a coordinated four-course sequence in computer security and information assurance that emphasizes concepts in Computer Security augmented with current industry standard techniques and challenges. It provides an alternative to the full M.S. program for practicing computer scientists and other information technology personnel who wish to extend their education beyond the B.S. level, and to those who wish to acquire up-to-date knowledge in the burgeoning field of computer and network security.

    View a photo of the recent Computer Security and Information Assurance Graduate Certificate Cohort number 7.



    Above: the graduation celebration with Prof. Michael Caloyannides, Prof. James Hahn, and Dean Tim Tong.

    Accelerated Program

    A CSIA certificate can be earned in as little as 22 weeks through the accelerated cohort option. It can also be earned through regular open enrollment classes taken during the regular fall, spring and summer semesters.

    Conventional Program

    The CSIA certificate can also be earned by completing four courses in the program, each with a minimum grade of a B, during the regular academic semesters, as described in the Certificate Requirements.

    Note: Not all courses are available each semester. Please note that continuous enrollment in the fall and spring semesters must be maintained.  If you are not able to register for an appropriate course in fall or spring, you must register for a leave of absence in that semester.  Please see the Department of Computer Science about registration for a leave.

    MS in Genomics and Bioinformatics

    About Admissions Academics Research Directory


    M.S. Degree in Genomics & Bioinformatics

    Contact

    Director
    Dr. Jack Vanderhoek
    Dept. of Biochemistry & Molecular Biology
    Ross Hall, Room 230
    2300 Eye Street NW
    Washington DC. 20037
    (202)-994-2929
    bcmjyv@gwumc.edu


    Co-Director
    Dr. Sidney W. Fu
    Director, The Genomics Core Facility
    Associate Director, The McCormick Genomics Center
    Dept. of Biochemistry and Molecular Biology & of Surgery
    Ross Hall, Room 522A
    2300 Eye Street NW
    Washington DC. 20037
    (202)-994-4767
     sfu@gwu.ed
    u
     
    Apply Now
    Spring and Fall Application 2010
     

    Core And Other Relevant Courses
    Biochemistry 236, 237
    Fundamentals of Genomics and Proteomics
    Biochemistry 238
    Experimental Genomics

    Research and Assistantships