COURSE DETAIL
In this course, students apply their background in linguistics to the field of machine learning. The course provides an overview of the machine learning sub-field of natural language processing. Students delve into mathematical/computer science aspects of the topic and learn about different types of machine learning, neural networks, how to work with data, and specific implementations to the field of linguistics. Students may complete a final coding project that relates to the field of linguistics. The course also covers philosophical/ethical aspects of the field, and students discuss issues like ChatGPT and its implications on higher education, the job market, and more. Because this course is in the linguistics department, there will be a heavy emphasis on syntax/semantics, and students should have a strong linguistic knowledge.
COURSE DETAIL
This course studies how the internal structure of operating systems is designed and implemented for management of resources and provision of services. Topics include process and thread creation and management; communication in processes and threads; process synchronization and deadlocks; memory-management strategies; and protection and security.
COURSE DETAIL
The course introduces computational approaches to model human behavior and social phenomena. Core concepts in computational social science are covered, such as observational studies (what types of data exist, possible biases, and how to use data for modeling), basic concepts and techniques for running experiments (asking vs. observing, natural experiments, simulations, validity, and generalization) and discuss key issues such as ethical considerations. The course has both a theoretical and a practical perspective, where you learn basic principles and also how to apply them in practice in three main areas: social network analysis; text analysis; agent-based modeling, and simulation.
COURSE DETAIL
This course examines the role of data abstraction to solve problems. It discusses data structures, their characteristics, and implementation in object-oriented programming language. Topics include: arrays; recursions; lists; batteries; tails; trees; binary trees; binary search trees; balanced search trees; functions and hash tables; heaps; sorting algorithms; algorithms in graphs.
COURSE DETAIL
Database management systems are at the core of computer applications that need to store, manipulate, and query data. This course takes a deep dive into how modern database systems function internally, from studying their high-level design to understanding the underlying data structures and algorithms used for efficient data processing. The course covers a range of data management techniques from both commercial systems and cutting-edge research literature, enabling students to apply these techniques to other fields of computer science. This is the undergraduate version of INFR11199
COURSE DETAIL
Main topics include the design of parallel computers and parallel programming models; shared memory architecture; message passing and distributed memory architecture; parallel programming of computer clusters using MPI and multicore programming using OpenMP; parallel algorithms for sorting, searching, linear algebra, and various graph problems.
COURSE DETAIL
This course introduces students to the fundamental theory and practice of the social, political, legal, and ethical implications of computer technologies in Japan and abroad. Through in-class activities, group assignments, and reflection work, students will gain a basic understanding of essential concepts, modern and historical cases, and guidelines for best practice. Key concepts include AI bias; privacy in the social media era; personal data and digital behavior tracking; vectors of misinformation; stereotypes in design, digital inclusion, and more. The main objective is to inform and encourage critical thinking in students who will be playing key roles in deciding, creating, marketing, governing, and disseminating computer technologies in Japan.
Typically, the first class each week will introduce a new topic, with interactive activities (e.g., hands-on demos, brainstorming, quick activities), individual reflection, and group discussion. Students will be given a homework assignment to be completed before the second class that week. That second class will start with a discussion of the homework and introduce the next topic for that week. Students will be expected to complete readings from the text and/or other sources before the next week of classes. Attendance is taken randomly in every class.
COURSE DETAIL
This course is to systematically introduce the knowledge related to the ethics and governance of artificial intelligence technology, improve students' moral sensitivity to the ethical issues of artificial intelligence, and jointly explore the possible strategies of AI governance.
The course will first systematically introduce the technical principles and development history of artificial intelligence, discuss the technical nature of artificial intelligence from a philosophical perspective, and analyze the safety and ethical issues of artificial intelligence. On this basis, it will further explain the path and strategy of artificial intelligence safety and ethical governance from three aspects: technical norms, ethical guidance and institutional regulations.
COURSE DETAIL
This course includes knowledge of common methods in asymmetric encryption, as well as possible attacks in faulty implementations of these methods: RSA, El-Gamal, Diffie-Hellman-Key-Exchange, elliptic curves, and selected methods of Post-Quantum-Cryptography. Students who completed this course possess profound knowledge of cryptographic methods. They are able to correctly and securely use cryptographic protocols. They are proficient in verifying the security of One-Way-Functions and (Pseudo-)Random-Number-Generators. Furthermore, they are able to recognize and avoid typical mistakes in asymmetric encryption.
COURSE DETAIL
This course provides an introduction to the key concepts, issues, and methods in human-computer interaction and interaction design. Through a combination of lectures and exercises, it covers usability, designing user-friendly systems, and evaluating user interfaces. The course discusses theories of human-computer interaction, the special challenges associated with the design of user-friendly interactive systems, advantages and disadvantages of different forms of interaction, building user interfaces and prototypes of user interfaces, and how to examine the usability of IT systems in a rigorous way.
Pagination
- Previous page
- Page 61
- Next page