THE UNIVERSITY OF LAHORE Computer Science & IT Dept. MS-Thesis Advisors & Specialization Areas – Spring-2014 Sr. No.

Specializations (Main AreaSub Area)

Name

Computer Networks & Telecommuniction (Major) Sub-Areas:

1

Dr. Arshad Ali

      

Network Performance Green Monitoring Delay Tolerant Networks Transparent Layer Protocols Routing Protocols Cognitive Radio Networks Wireless Communication

Software Engineering (Major) Sub-Areas: 2

Dr. Ahmad Salman Khan

   

Software Maintenance Software Requirement Engineering Software Process Engineering Software Requirement Improvement

Ubiquitous computing  Context Awareness / Smart Systems Pervasive computing  Network Security / Adaptable Systems 3

Naveed Ahmed Khan

Software Engineering  Formal Methods / Formal Specification Open Source Operating Systems  Kernel Development Data Mining  Algorithmic Techniques for Medical Problems Distributed Systems  Grid Computing

4

Dr. Muhammad Atif

 Formal Verification of Distributed Systems  Behavioral Analysis of Communicating Processes

Bioinformatics (Major) Sub-Areas: 5

6

Dr. Tiyabba Riaz

   

Abdul Haleem Butt

 Artificial Intelligence

Algorithm Design Sequence Database Designing Primer Design & DNA Barcoding String Algorithms

Robotics (Major) Sub Areas: 7

Dr. Qadeer Baig

8

Waqar Ali

 Perception / Computer Vision  Laser Data Processing  Multi Sensor Data Fusion

Software Engineering  Formal Methods Artificial Intelligence  Digital Image Processsing

Software Engineering Software Quality Assurance Data Mining  Market Basket Analysis 9

Saqib Raza

Software Engineering Risk and Change Management Software Project ManagementS/W Failure Reduction

Computer NetworkNetwork Planning Management 10

Syed Sarmad Ali

Computer Network Security Cloud ComputingAdoption Issues & Strategies, Traffic Predication Data CommunicationData Security, Cryptography, Steganography Database Reverse Engineering NetworkingSocial Networking Distributed SystemsParallel & Distributed Computing Software Engineering SQA MIS and its Issues (implementation etc) Software Engineering  (SDLC, Prototyping)

11

Atif Ikram

Impact of ICT on different fields (e.g. on student learning in class room teaching etc.) E.Commerce / E-Learning (Learning Process) Collaborative Learning , Tutoring System Computer Networks  Network Security

12

Shehla Saeed Database Relational Database Computer Networks Network Security Mobile Ad-Hoc Network (MANET)

13

Khizar Hayat

Vehicular Ad-Hoc Network(VANET) Wireless sensor Network Cellular Networks Internet Protocols Computer Networks  Wireless Network

14

M. Aqeel

Computer Architecture Mobile Computing

15

M. Idrees.

Computer Networks Wireless Computing

16

Abid Bashir

Wireless Communication Systems Wireless and Mobile Computing

Software Engineering Formal Methods 17

Shahid Yousaf

AlgorithmsMathematical Modeling Computer Networks Network Security

Software Engineering Software Process Engineering/ 18

Iram Noreen

Agile process Models/ Crystal Methodologies/ Software DesignSoftware Architecture Evaluation Models

Software Engineering 19

M. Saeed Akhtar

Requirement Engineering/ Software Testing

Software Engineering 20

Yasir Mahmood

Software Testing & Quality Engineering, Testing validation & verification, Software Project, Process & Quality Management

Software Engineering Aspect Oriented Programming 21

Amna Humayun Software Metrics Design Anti Patterns & Heuristics

Data Mining Pattern Recognition 22

Abdul Wahab

Human Computer Interfacing Image Processing Artificial Intelligence  Logic and Inference

23

M. Tayyab Artificial Intelligence Knowledge Representation

Computer Networks Network Security 24

M. Waseem Iqbal

Wireless Networks Satellite Networks Cloud computing

Web Cyber Security Cyber Forensic Communication SecurityGlobal Position System Security System  25

Hammad Hassan Qureshi

Information security Security system  Desfire Technology / Mifare Security IntelligenceStream Cipher

Web Applications 26

Madeeha Fatima Software Engineering Software Ethics

Databases Relational Databases 27

Marriam Daud

Software Engineering Web Engineering

Data Mining Association Rule Mining 28

Wajeeha Farooqi

Software EngineeringSoftware Quality Assurance Software EngineeringSoftware Metrics

Image Processing 29

Ghulam Farooq

Computer Vision Pattern Recognition

30

Shagufta Riaz

Databases Relational Databases

31

Yasir Sherwani

Information Systems

Computer Vision M.Zuhair Qadir 32

Network Security Web Security Image Processing

Artificial Intelligence Data Mining 33

Zishan Hussain Chohan

Artificial Intelligence Machine Learning Cloud Computing High Availability Databases Computer NetworksRoute Optimization Computer NetworksFault Tolerance Computer Networks Security Computer Networks  Wireless Networks

34

M. Mukhtar

Computer Networks  Network Security Computer Networks  QoS in Heterogeneous Networks

35

Umbreen Fatima

MS-Thesis Advisory Committee [Naveed Ahmed Khan – Head] [Muhammad Tayyab – Member] [Amna Humayun – Member]

Software Engineering

THE UNIVERSITY OF LAHORE Computer Science & IT ...

Computer Networks & Telecommuniction (Major). Sub-Areas: ... Pervasive computing → Network Security ... Cloud Computing→Adoption Issues & Strategies,.

211KB Sizes 2 Downloads 197 Views

Recommend Documents

COMPUTER SCIENCE - Pune University
Poona College of Arts, Science and Commerce, Pune 411 001. 7. 001. 070 ... Sinhagad Technical Education Society's B.C.S. College, Pune 411 041.( 878-.

Yale University Department of Computer Science
intimately related to the spherical harmonics. 3.1 GCAR graph. We assume as before that we are given K projection images. Let Λk,l, k = 1,...,K, l = 1,...,L be KL ...

Industrial Open House & Career Fair University of ... - Lahore - iohcf
Closing Ceremony. Yes along with shield. Yes along with shield. Shield only. -. Event Directory and. Graduates Resume CD. 10 copies. 5 copies. 3 copies.

Modular RADAR - UNM Computer Science - The University of New ...
The NIS searches trillions of host cells to find small amounts of spatially local- ..... Web, citation networks, and autonomous systems) [18] and arise as an ...

Department of Computer Science University College of ...
Murtaza Syed. Mian Said. 814/1050. 763/1100. BCS (Hons) Self72.63%. 5. UG-16-009076. Ihtisham Ali. Akbar Ali. 870/1100. 750/1100. BCS (Hons) Self72.55%.

Your Title - UMD Department of Computer Science - University of ...
(a) The Controller is the main kernel, which schedules different processes running inside the Rover Core and passes around the context from one module to an-.

Transactions Template - Mathematics & Computer Science - University ...
A comparison to existing work is given, and the technique presented is validated and ... database string. Many other ..... The big issue for any implementation of this type of ... exit node. (I) The final data is passed in, and the sum for the motif.

Punjab Technical University Computer Science & Engineering July ...
Punjab Technical University Computer Science & Engineering July 2010.pdf. Punjab Technical University Computer Science & Engineering July 2010.pdf. Open.

Punjab Technical University Computer Science & Engineering 2012 ...
D) Selection Sort. 28.The average waiting time for non-preemptive SJF. scheduling for the following process is. P1-1 minute P2-20 minute P3-10 minute. A) 7 minute. B) 4 minute. C) 10.6 minute. D) 11 minute. 3. Page 3 of 9. Main menu. Displaying Punja

Trampolined Style - Computer Science: Indiana University
Trampolined style is a way of writing programs such .... 3 and 4 where we describe two trampolining archi- .... it in the obvious way, because the call to fact-acc.

Punjab Technical University Applied Science (Computer Application ...
The cache hit rate is the rate of the. information that is needed in the cache. ... 17) What is the average access time in Nano. Seconds if the cache hit rate is 80%?. A) 10. B) 20 ... kept on disk in a relocatable. Page 3 of 12. Main menu. Displayin

Convention Paper - Computer Science - Northwestern University
Machine ratings generated by computing the similarity of a given curve to the weighting function are ..... [11] Richards, V.M. and S. Zhu, "Relative estimates of.

Noorul Islam University Computer Science and Engineering ...
Security issues include protecting data from unauthorized access and viruses. 3. ... Using HDB3, encode the bit stream 10000000000100. ... Displaying Noorul Islam University Computer Science and Engineering Computer Networks.pdf.

Punjab Technical University Computer Science & Engineering 2011 ...
Punjab Technical University Computer Science & Engineering 2011.pdf. Punjab Technical University Computer Science & Engineering 2011.pdf. Open. Extract.

Convention Paper - Computer Science - Northwestern University
Listeners were seated in a quiet room with a computer ... channel, there were 75 data points, where the within- .... plotted in the rightmost box plot of Figure 2.

Convention Paper - Computer Science - Northwestern University
represented as points on a grid. On each trial, the listener makes two paired preference judgments: one in which the two settings differ in high frequency gain, ...

Noorul Islam University Computer Science and Engineering ...
Name Resolution is the process of mapping a hostname to its corresponding IP Address. ... 127.0.0.1. 25. Define CGI -Common Gateway Interface. A specification for ... University Computer Science and Engineering Internet_Programming.pdf.

University of Hyderabad Ph.D - Computer Science - 2014.pdf ...
pada transaksi perdagangan online atau ... transaksi online banyak variasinya. ... Displaying University of Hyderabad Ph.D - Computer Science - 2014.pdf.

Mean Field Networks - University of Toronto Computer Science
where the energy function E(x; θ) is a sum of unary (fs) ... fs. Figure 1. Illustration of one unit in Mean Field Networks. 0. 1. 2. 3. 0. 1. 2. 3. (a). (b). Figure 2. 2-layer MFNs for a chain model 0 - 1 - 2 - 3 with (a) sequential update schedule,

Yale University Department of Computer Science
rived from a global computation of a few eigenvectors of the graph's adjacency ... Data sets typically range from 104 to 105 particle images, and refinements ...... Assemblies: Visualization of Biological Molecules in Their Native State. Oxford ...

The Future of Computer Science - Cornell Computer Science
(Cornell University, Ithaca NY 14853, USA). Abstract ... Where should I go to college? ... search engine will provide a list of automobiles ranked according to the preferences, .... Rather, members of a community, such as a computer science.

Mahatma Gandhi University M.Tech IT Sem 1 Computer Network ...
Mahatma Gandhi University M.Tech IT Sem 1 Computer Network Management -I.pdf. Mahatma Gandhi University M.Tech IT Sem 1 Computer Network ...

Mahatma Gandhi University M.Tech IT Sem 1 Computer Network ...
How in the Internet traffic is managed by using RMON. (7 marks). b. Write short note on Enterprise management solutions. (8 marks). c. Compare and contrast RMON1 and RMON2 (10 marks). 5.a. What is HFC Management and Broadband Network Management. (20