{"@odata.context":"http://api.purdue.io/odata/$metadata#Courses","value":[{"Id":"97744585-87e3-4616-8a1f-bff2ab88471b","Number":"09200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Professional Practice II","CreditHours":0.0,"Description":""},{"Id":"631d471f-f14b-47b1-a43f-1efae5ec584a","Number":"09300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Professional Practice III","CreditHours":0.0,"Description":""},{"Id":"5237a73f-f2db-4130-8cc8-33f03a1bab55","Number":"09400","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Professional Practice IV","CreditHours":0.0,"Description":""},{"Id":"1782c85f-49f5-4b08-ad99-62910a6794bd","Number":"09500","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Professional Practice V","CreditHours":0.0,"Description":""},{"Id":"5f26945a-ff4b-429a-8cb7-37cdba96e319","Number":"10100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Digital Literacy","CreditHours":3.0,"Description":""},{"Id":"702c11e3-90fd-4d93-862b-b38c8fbcb6a0","Number":"11000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Computers","CreditHours":3.0,"Description":""},{"Id":"fe18ad80-74c4-4144-b37f-7c7966ca95cd","Number":"15800","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"C Programming","CreditHours":3.0,"Description":"Labs meet with CS 15900 labs."},{"Id":"95617dcd-7e7f-459f-bff5-f6e6b4aba7b1","Number":"15900","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Programming Applications For Engineers","CreditHours":3.0,"Description":""},{"Id":"9a2ffab0-3616-46fe-994e-24a935ba6d9a","Number":"15900","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"C Programming","CreditHours":3.0,"Description":"Supplemental Instruction (SI) study sessions are available for students in this course. Evening Exams Required."},{"Id":"d4d8ed19-ee18-45ca-8204-b7028897b033","Number":"15900","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Prog Appl For Enginrs-Honors","CreditHours":3.0,"Description":""},{"Id":"d0ef5af6-42a4-4162-bbfa-7ac8d1f88911","Number":"17300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Competency","CreditHours":1.0,"Description":""},{"Id":"3c614547-a115-4ad1-a586-519ad9f47773","Number":"17600","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Engineering In Python","CreditHours":3.0,"Description":""},{"Id":"e98afbee-2811-4521-9088-aeffd9829bbb","Number":"17700","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Programming With Multimedia Objects","CreditHours":4.0,"Description":""},{"Id":"24508954-e0bc-407f-a823-ff348a51ac99","Number":"18000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Problem Solving And Object-Oriented Programming","CreditHours":4.0,"Description":"Students registering for this course must be in the CS BS program.  Newly admitted CS-BS students must enroll in linked sections. Supplemental Instruction (SI) study sessions are available for students in this course., Supplemental Instruction (SI) study sessions are available for students in this course."},{"Id":"69dd67ff-3bca-459c-9411-310b95a90568","Number":"18200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Foundations Of Computer Science","CreditHours":3.0,"Description":""},{"Id":"54528632-9b62-4976-8d11-a338f5320f74","Number":"18300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Professional Practice I","CreditHours":0.0,"Description":""},{"Id":"d40c67e4-45d4-4e4e-a46a-027b73795a6f","Number":"18400","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Professional Practice II","CreditHours":0.0,"Description":""},{"Id":"40c4b46c-f793-435a-aa64-8ddfc40c0090","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intro To Professional Practice","CreditHours":1.0,"Description":""},{"Id":"3b7e72f6-9b2d-412e-a9af-e75c6dd5dd6f","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Engineering In Python","CreditHours":3.0,"Description":""},{"Id":"3643d85d-2ee2-4c6c-a8b0-d0025a8e1e72","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Learning Community Seminar","CreditHours":1.0,"Description":""},{"Id":"4672a97b-d10b-4519-8d19-d778d8b796b0","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Crowdsourcing Dataset Bias","CreditHours":1.0,"Description":""},{"Id":"11d767b3-eaf2-4c98-9293-a636fc5344d5","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Digital Literacy","CreditHours":3.0,"Description":"This course is a comprehensive introduction to the digital world. It removes the mystery and dispels myths about smart phones, computers, and the Internet. It concentrates on how computing affects students' lives. This course contains no programming. There will be no Evening Exams., This course is a comprehensive introduction to the digital world. It removes the mystery and dispels myths about smart phones, computers, and the Internet. It concentrates on how computing affects students' lives. This course contains no programming. There will be no Evening Exams. CS students may take this course for elective credit only."},{"Id":"44cfe247-5040-4690-b8c2-3e431d579fdd","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Struct &  Interp Computer Prog","CreditHours":3.0,"Description":""},{"Id":"52b188e1-4065-4ada-9862-b38fb327e8eb","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Computer Sciences","CreditHours":1.0,"Description":""},{"Id":"70627787-f5e7-44d4-bbac-b97c691aa96c","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Computer Science","CreditHours":0.0,"Description":""},{"Id":"d67c8e2b-317b-4460-bde7-af8f3e13500c","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Plagiarism Detection Research","CreditHours":0.0,"Description":""},{"Id":"fc7b21b8-daa7-4e0f-a147-32141f42b752","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Tools","CreditHours":1.0,"Description":"\"This course introduces students to various programming tools which will aid them in their Computer Science classes, personal projects, and software development job experiences. After successfully completing this course a student will understand how to (1) use Unix/Linux commands for navigating directories and files and manipulating files and folders (2) use terminal commands for searching and input/output redirection (3) use shells such as sh, csh, ksh, tcsh, bash, zsh (4) do debugging via print statements and general debugger concepts (5) use version control via Git and Github, source control, workflow, commit, collaboration, pull, push, create and pushing a new repository, cloning, branches, merging, and conflicts (6) use vim including mouseless navigation, normal/insert mode, copy/paste, search/replace, and saving/quitting. \""},{"Id":"3d7af442-8add-46e4-bf88-b66903f7cc14","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Security Research","CreditHours":3.0,"Description":""},{"Id":"93d64a99-88ef-4d5c-b15a-a1754fdd39df","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In CS","CreditHours":0.0,"Description":""},{"Id":"157ed947-73a3-4e05-b98f-89cc00e820c5","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Aut Algo Run Res","CreditHours":0.0,"Description":""},{"Id":"2c8bb8b3-6b13-47bb-85ec-3675bf7a470a","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"College Career Community In CS","CreditHours":1.0,"Description":"This course is a co-requisite with CS 17600 or CS 18000"},{"Id":"cf4f83cd-34d3-495e-aaa2-a710545a53c2","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Contempory Issues Computing","CreditHours":1.0,"Description":""},{"Id":"18ba90ad-59dc-4365-90af-214c80a66dd9","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Page Design","CreditHours":3.0,"Description":""},{"Id":"1bc4496e-781b-46da-a9a6-e35cb08e8e88","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intro To Visual Programming","CreditHours":3.0,"Description":""},{"Id":"d8feb05e-29af-4f00-9de6-98c487dbbdbe","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intro To Web Page Design","CreditHours":3.0,"Description":""},{"Id":"4a67c989-44fe-44ab-b35c-5bf4fe9d868d","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Forest Inventory Analysis","CreditHours":1.0,"Description":""},{"Id":"c58b896d-d81a-4699-a1e3-52b56f388353","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Programming","CreditHours":2.0,"Description":"Distance Learning"},{"Id":"428c9f43-6dd5-4839-bef2-4c90cdc7b67c","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intro to Professional Practice","CreditHours":1.0,"Description":""},{"Id":"16a20b48-394c-4e78-9bde-c2edb66a1a53","Number":"19000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Code Assistants Sec/Priv","CreditHours":0.0,"Description":""},{"Id":"dbc374e3-94e3-458d-a6a0-b5b3b3a2e348","Number":"19100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Freshman Resources Seminar","CreditHours":1.0,"Description":"Students registering for this course must be in the CS BS program, and take the CS19100 section associated with their CS18000 (or 17700 or 18200/24000) lab and CS19300 PSO."},{"Id":"70e36f93-1547-4d97-a288-626a64e5f011","Number":"19300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Tools","CreditHours":1.0,"Description":""},{"Id":"ad3395c1-d35f-40aa-ae3a-dff10cbf9e5c","Number":"19700","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Freshman Honors Seminar","CreditHours":1.0,"Description":""},{"Id":"76c22f09-6015-4d43-9c0f-cc079313b686","Number":"21100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Competitive Programming I","CreditHours":2.0,"Description":"C or better in CS 25100 OR Instructor Permission."},{"Id":"b7fd9228-9116-45f0-a8d4-b4232f3e488f","Number":"23500","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Organizational Computing","CreditHours":3.0,"Description":""},{"Id":"5f5bca19-ae4b-469b-8a75-63755d99c369","Number":"24000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Programming In C","CreditHours":3.0,"Description":"Supplemental Instruction (SI) study sessions are available for students in this course. Evening Exams Required."},{"Id":"5653a2d8-fcd8-4328-b127-88a1cdd7117b","Number":"24200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Data Science","CreditHours":3.0,"Description":""},{"Id":"3d61ecae-eec2-4240-a636-ef08206e1648","Number":"24300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Artificial Intelligence Basics","CreditHours":3.0,"Description":""},{"Id":"7c87d734-e56b-4858-ae96-46e8f4459dfc","Number":"25000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer Architecture","CreditHours":4.0,"Description":""},{"Id":"c8ec4929-6173-4b25-b0c8-6333f44c1ab2","Number":"25100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Structures And Algorithms","CreditHours":3.0,"Description":"Evening Exams Required."},{"Id":"000dc2fb-9a26-418e-9c01-3bc5e4763421","Number":"25200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Systems Programming","CreditHours":4.0,"Description":"Evening Exams Required."},{"Id":"620a4291-c878-44d9-b10f-01bbb584d2aa","Number":"25300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Structures And Algorithms For DS/AI","CreditHours":3.0,"Description":"Evening Exams Required."},{"Id":"51076fdc-2997-444e-a097-48134bb4e4eb","Number":"28400","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Professional Practice III","CreditHours":0.0,"Description":""},{"Id":"12e29dfc-9f38-4150-bb0e-20136b930ef0","Number":"28401","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Professional Practice Part-Time","CreditHours":0.0,"Description":""},{"Id":"89d16dc5-bf23-4fbf-a9c7-656a20174c87","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"VIBE Vibe Coding","CreditHours":0.0,"Description":""},{"Id":"93d05110-900d-436a-b10c-aa5133419591","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Science & Society: ELSI","CreditHours":1.0,"Description":""},{"Id":"84cf68fb-b72e-45b1-b334-855430be6795","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Auto Runtime Algo Research","CreditHours":0.0,"Description":""},{"Id":"20b3b39e-1f02-440c-9bbf-89feb2c30005","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Efficient Distributed Systems","CreditHours":3.0,"Description":"This course has been identified for the Spring 2021 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Spring 2021."},{"Id":"c61eb13f-f813-49fa-8635-39316bc6e44f","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Automated Plagiarism Detection","CreditHours":0.0,"Description":""},{"Id":"7679b3da-b3ed-4431-a489-38431a9f1eef","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Protein Shape Analysis II","CreditHours":2.0,"Description":""},{"Id":"ad069edb-9115-48af-87e4-b3af10aeabe4","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"C/C++/C#","CreditHours":3.0,"Description":""},{"Id":"14a8cc5f-0924-4b19-b8af-c7cce688ab20","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Computer Sciences","CreditHours":0.0,"Description":""},{"Id":"1347f0ca-e910-4996-bde7-6321f5091bdc","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Systems Programming","CreditHours":4.0,"Description":""},{"Id":"9f920c16-ec79-409f-abc8-24baa2535fb0","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Comp Protein Data Analysis","CreditHours":2.0,"Description":""},{"Id":"0e603030-ac92-489e-b755-d0741f522f1e","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Biological Database Management","CreditHours":1.0,"Description":""},{"Id":"a4110020-c572-47e9-8aa7-fa2471c55b63","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Errors In Software Security","CreditHours":1.0,"Description":""},{"Id":"5ab2ec05-3a34-4713-8ae7-1124b5b766f0","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Protein Sequence Analysis","CreditHours":2.0,"Description":""},{"Id":"cd12b10f-3737-4e5e-a3a5-e01a55fa3ac8","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Vibe Coding","CreditHours":0.0,"Description":""},{"Id":"00c9087b-2185-4dc1-a50a-9e8ad96766aa","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Systems Research","CreditHours":2.0,"Description":""},{"Id":"e5b6a03e-fffc-4cc7-849f-24fcbd3c68dd","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Tracking Browsing Behavior","CreditHours":2.0,"Description":""},{"Id":"3559f2cd-61df-4f3f-9819-d8eee174419e","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Basics","CreditHours":3.0,"Description":"Evening Exams Required."},{"Id":"5a167ad1-d441-4ff4-971d-7e380378fe64","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Contempry Issues/Digital World","CreditHours":3.0,"Description":""},{"Id":"fbd7622f-37d1-42b3-8be0-3a0f6bf92b8d","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ShortTerm Professional Pract","CreditHours":1.0,"Description":""},{"Id":"eb71d92a-0faf-46d8-bc20-9afb5f340845","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Service Learning Outreach","CreditHours":1.0,"Description":""},{"Id":"9f1037c0-15e4-43d7-8b26-f4ebe7a99a0c","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"UG RSH Password Coping Mech","CreditHours":3.0,"Description":""},{"Id":"21079a0a-693b-4152-9b17-2d86b00ad81e","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Aut Algo Run Res","CreditHours":0.0,"Description":""},{"Id":"5ab19be7-34f1-41b4-96bd-df86aad77a35","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Article Analysis Using NLP","CreditHours":3.0,"Description":""},{"Id":"eeb5d8d9-adbc-40af-88a7-f1e785d3e96e","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Service Learn Outreach","CreditHours":1.0,"Description":""},{"Id":"ed27ecb9-9865-4f40-84b3-74824ec2c301","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinformatics Research","CreditHours":1.0,"Description":""},{"Id":"0dc3fda5-4751-43da-aca3-b1f806a26b70","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Optimizing Compilers","CreditHours":0.0,"Description":""},{"Id":"391bb4c5-dd95-41bd-8f07-217d754031a9","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In CS","CreditHours":0.0,"Description":""},{"Id":"c4ea4142-5450-4d0d-a092-9ed3ee96c0f4","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Usable S&P","CreditHours":0.0,"Description":""},{"Id":"a378e6a2-f602-4a10-97b4-95fa443aefd2","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Mining Functnal Genomics","CreditHours":3.0,"Description":""},{"Id":"98c644f9-4a87-43d3-aa90-067967135471","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Gene Function Prediction","CreditHours":2.0,"Description":""},{"Id":"94d6eb5a-2b5e-466e-9cb5-c2ef127c2ab7","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Competitive Programming I","CreditHours":2.0,"Description":""},{"Id":"bb5e6596-5603-420c-89c9-5aa8b830667e","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Al Basics","CreditHours":3.0,"Description":""},{"Id":"d5dbb4cf-5d16-4015-8689-6f217367be09","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bio Image Processing","CreditHours":1.0,"Description":""},{"Id":"e81ff277-fe70-4e8f-9d7f-69614c0444d4","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer Science Tch Asst Exp","CreditHours":2.0,"Description":""},{"Id":"6cfce924-0b10-431e-81bf-f58445af717d","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Wireless Intrnet Protocol Proj","CreditHours":2.0,"Description":""},{"Id":"76f738f5-0aa9-410c-affd-5841538cc703","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Compbio Protien Analysis","CreditHours":0.0,"Description":""},{"Id":"d29a6676-9c9c-4558-80e0-b3da566c34d8","Number":"29000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Eleven Week Practical Training","CreditHours":1.0,"Description":""},{"Id":"6017d900-5e63-48e1-a87e-9932bd6bdac0","Number":"29100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sophomore Development Seminar","CreditHours":1.0,"Description":""},{"Id":"35f81218-c061-460a-a942-63ed71c0c6f0","Number":"29199","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cooperative Experience I","CreditHours":0.0,"Description":""},{"Id":"788f3e9f-e4bc-4e52-a990-2ffb0ea4c277","Number":"29299","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cooperative Experience II","CreditHours":0.0,"Description":""},{"Id":"183cc992-8f00-4cdb-bee1-d10b2874d22e","Number":"30700","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Engineering I","CreditHours":3.0,"Description":""},{"Id":"8f367862-9a2d-4dc1-85f5-4bb2bb4388b6","Number":"31100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Competitive Programming II","CreditHours":2.0,"Description":""},{"Id":"8c115f71-5c35-4a8f-ab0a-df74905b20c4","Number":"31400","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Numerical Methods","CreditHours":3.0,"Description":""},{"Id":"3e78c8c2-d291-4443-9bc8-3520365cf177","Number":"33400","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Fundamentals Of Computer Graphics","CreditHours":3.0,"Description":""},{"Id":"6085700c-287f-4700-a055-b9a8ec26d76c","Number":"34800","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Information Systems","CreditHours":3.0,"Description":""},{"Id":"4a51ed4d-9b4a-44ed-9c95-a855e79044d2","Number":"35100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Computing","CreditHours":3.0,"Description":""},{"Id":"114931bf-ef80-4664-b103-acd82145c344","Number":"35200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Compilers: Principles And Practice","CreditHours":3.0,"Description":""},{"Id":"c3473564-3788-4de2-a6a2-d66bb920429a","Number":"35300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Principles Of Concurrency And Parallelism","CreditHours":3.0,"Description":""},{"Id":"f0a4b39b-7fa7-46b3-aa5f-7a9fb5da1ee5","Number":"35400","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Operating Systems","CreditHours":3.0,"Description":""},{"Id":"fc6b79af-779b-4806-ada1-e22e9f582c3e","Number":"35500","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Cryptography","CreditHours":3.0,"Description":""},{"Id":"aac6f0d7-ffdc-4a88-beed-09d61e5dfc2a","Number":"36100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Great Issues In Computer Science","CreditHours":3.0,"Description":""},{"Id":"d0a6c00c-3b2c-4db6-9c87-2b284d8af2a2","Number":"37300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Mining And Machine Learning","CreditHours":3.0,"Description":""},{"Id":"8c17dea4-ec3b-4955-b4e2-b5e0bf897bd3","Number":"38003","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Python Programming","CreditHours":1.0,"Description":""},{"Id":"d834f136-4366-4d65-b34d-3fefdc51a684","Number":"38100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To The Analysis Of Algorithms","CreditHours":3.0,"Description":""},{"Id":"e629249b-6856-489f-ae0c-65d929e36211","Number":"38600","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Professional Practice IV","CreditHours":0.0,"Description":""},{"Id":"fedbca7c-520c-48d6-8bd2-cd647a4c186d","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Tools II","CreditHours":0.0,"Description":""},{"Id":"90b29e32-2332-4424-9aa1-188552063b1a","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Competitive Programming I","CreditHours":1.0,"Description":""},{"Id":"9b6983f2-ef8c-4650-a253-9843183b05f7","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Competitive Programming IV","CreditHours":1.0,"Description":"For students who have completed CS 39000 Competitive Programming II"},{"Id":"03c4b9ed-9b4d-48d2-8546-4a6be8c92d99","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Aut Algo Run Res","CreditHours":0.0,"Description":""},{"Id":"a8b97aca-baa9-4a9b-afc5-87fe22c92b65","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IOT Applications III","CreditHours":3.0,"Description":""},{"Id":"a0fc5453-9f18-4a92-b29c-f24dd8f719a8","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Memory Management II","CreditHours":3.0,"Description":""},{"Id":"acc32581-a5ea-4c49-ae4b-75da27433be7","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Just In Time Compilation","CreditHours":3.0,"Description":""},{"Id":"a68c1cbc-35cc-4b2a-8d4e-f00f59adbee9","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deep Neural Network Perf Anly","CreditHours":3.0,"Description":""},{"Id":"9fcd8a81-0552-40f3-9a00-926f817dcafd","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinfornotics Research","CreditHours":3.0,"Description":""},{"Id":"3b79a2e2-fe25-4ad8-a437-83cf1be98780","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computational Drug Design","CreditHours":1.0,"Description":""},{"Id":"3e148d1d-1037-4cd8-aa62-ff555050c046","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Benchmarking Serverless FAAS","CreditHours":3.0,"Description":""},{"Id":"ceed790c-607b-4e32-a335-fb5ba4f5a756","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Topics On Computer Ar","CreditHours":0.0,"Description":""},{"Id":"60a283d5-182f-405d-94e8-b1470ff3d8c3","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IDEAS Lab Research","CreditHours":0.0,"Description":""},{"Id":"d790729e-79f5-4886-b734-f5abd3c52c45","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Computer Sciences","CreditHours":0.0,"Description":""},{"Id":"d80d0246-66d0-4e6c-b1c6-c8743935fb4f","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deep Learning For Bio Data","CreditHours":1.0,"Description":""},{"Id":"c87d40a5-a71f-4f65-8110-1aa11d0bedd3","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Topics In Algorithms","CreditHours":3.0,"Description":""},{"Id":"122b8bbf-674f-4557-b7e3-886a99fe5c6f","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Big Data Systems","CreditHours":3.0,"Description":""},{"Id":"c0568160-5b8a-4cbf-8df7-4708ffb3f443","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topology-Hiding Computation","CreditHours":0.0,"Description":""},{"Id":"747a721d-b3d0-4a40-8f47-a38a15f855ee","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Double Equivariant Adaptation","CreditHours":0.0,"Description":""},{"Id":"3d756785-b7c5-4520-a357-21fa630326f6","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"GPU Arch For Diff Privacy","CreditHours":0.0,"Description":""},{"Id":"253b99e1-d7ff-4884-b90f-4423371a4ded","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML Based Learned Data Indexing","CreditHours":3.0,"Description":""},{"Id":"8cd9b1f4-66ce-4fe1-8faf-6b9466131f34","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Forge","CreditHours":3.0,"Description":"Covers GenAI topics. Python programming skills, basic probability & statistics, and basic linear algebra knowledge expected."},{"Id":"36323965-0789-4310-9ac6-91a58763798a","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Of GenAI Systems","CreditHours":0.0,"Description":""},{"Id":"c4628686-023c-4638-89d7-fccdafe3defd","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Of ML Systems","CreditHours":0.0,"Description":""},{"Id":"312400bd-0f65-45fa-a5d8-f5b851f7423b","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Auto Runtime Algo Research","CreditHours":0.0,"Description":""},{"Id":"6967573e-42b6-458e-9549-304c89578686","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer Networks Res","CreditHours":3.0,"Description":""},{"Id":"2534efa7-b04d-47d9-9d02-58a4a5c0f711","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML Research @ IDEAS Lab","CreditHours":0.0,"Description":""},{"Id":"b2e6afeb-e1b0-4ec3-8db8-d104697d6ccc","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Res Rendering Techniques","CreditHours":3.0,"Description":"This course has been identified for the Spring 2021 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Spring 2021"},{"Id":"6d509217-d8e1-422c-ac55-160b55345e71","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research Project","CreditHours":4.0,"Description":""},{"Id":"2aab3f17-f225-4485-a117-c851d44db015","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Neural Image Processing","CreditHours":0.0,"Description":""},{"Id":"316bcb99-a716-4043-9886-80f93987dc98","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Test Cases For Stat Models","CreditHours":3.0,"Description":""},{"Id":"9c5be263-7ab4-411b-a2a0-6e16bd9ee984","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"UG Research ML At IDEAS Lab","CreditHours":0.0,"Description":""},{"Id":"60ec954f-e979-4a97-a367-fe2315642988","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Service Learning Outreach","CreditHours":1.0,"Description":"The course has two sections, each focused on unique problems in K-12 education. The “Reach Out for Computer Science” (ROCS) section prepares students to lead instructional sessions for students throughout the K-12 system, and provides a wide variety of interactive sessions for students to participate in throughout the semester. The “Mentors for Aspiring Girls in Computing” (MAGIC) section prepares students to mentor young women interested in technology and computing career pathways through after-school coding clubs. While MAGIC involves a near-peer role modeling system aimed at young women, students of any gender identification are encouraged to participate."},{"Id":"550b59f2-8495-4e1d-9de5-d8db22b64339","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Service Learn Outreach","CreditHours":1.0,"Description":"This course has been identified for the Spring 2021 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Spring 2021."},{"Id":"b97a1c79-8144-48c6-b2b4-34ac3aba36f2","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced GC Techniques","CreditHours":0.0,"Description":""},{"Id":"72625749-4154-42ac-9141-d8395ad95cda","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adv Topics Comp Architecture I","CreditHours":0.0,"Description":""},{"Id":"1f5045bf-fced-479a-a263-6e2a221e0fb5","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Evaluating Serverless Compting","CreditHours":3.0,"Description":""},{"Id":"034a71fe-b8c9-412e-8454-7bc29b3f6249","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Secure Distributed Compting II","CreditHours":0.0,"Description":""},{"Id":"df923ef9-bc49-427b-9ba4-3e052ded8f15","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Of CPS","CreditHours":3.0,"Description":""},{"Id":"a5b44471-8b63-4e91-8edb-debe94f70344","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research In Cybersecurity","CreditHours":3.0,"Description":""},{"Id":"de5185ff-6c29-4fc6-9c03-4ca199708a1f","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Robotics Operating System I","CreditHours":0.0,"Description":""},{"Id":"cb1d3503-de0d-4f00-af60-20e48e4db2ca","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Rsrch Mthds For Verifiable ML","CreditHours":3.0,"Description":""},{"Id":"b41e6224-db39-4c48-a2c3-27db83dcf7bd","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Robotic Operating Systems I","CreditHours":0.0,"Description":""},{"Id":"a8561ff7-0810-436b-8932-20a9ab1a10f1","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Res Advanced Rendering","CreditHours":0.0,"Description":""},{"Id":"a0fe67cf-e35e-4b4e-9566-12d428069ac2","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Great Issues In Computer Sci","CreditHours":3.0,"Description":""},{"Id":"a53f4ba0-ec70-4c8d-84fa-ec435df47ebd","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Memory Allocation II","CreditHours":0.0,"Description":""},{"Id":"9f120bb4-18a1-472b-bf4d-62c7f78499c1","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Football Space Time Analysis","CreditHours":0.0,"Description":""},{"Id":"79912cfe-626e-4179-96fb-d4eb557011cd","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"CoMMA Lab Research","CreditHours":0.0,"Description":""},{"Id":"9bec24b2-d14c-4f3e-a6ba-b395ed9a3903","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Computer Graphics","CreditHours":0.0,"Description":""},{"Id":"20ee0437-e273-41ff-becc-104c4c1f36f7","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Secure Distributed Computing","CreditHours":0.0,"Description":""},{"Id":"c6bf3e70-ce91-42bd-90b3-ec298681fcd9","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Res Ray Tracing Acceleration","CreditHours":2.0,"Description":"This course has been identified for the Fall 2020 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Fall 2020"},{"Id":"2b41080a-d625-4e63-9586-289e4162ef85","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Competitive Programming","CreditHours":1.0,"Description":"Requires a “B” or better in CS18000, or instructor permission."},{"Id":"66b51b44-ad10-49d8-b2ee-e71f6ef2fab9","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Service Outreach Learning","CreditHours":1.0,"Description":""},{"Id":"76df656c-234e-4ab0-aced-324117f37765","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IOT Applications","CreditHours":3.0,"Description":""},{"Id":"eb8a6d24-8718-437b-9800-e77b0036629c","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multicore Programming","CreditHours":3.0,"Description":""},{"Id":"c7c0feb3-25fd-4dc5-91da-09e63de6c2ef","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Prgram Auralization","CreditHours":3.0,"Description":""},{"Id":"8266dcbf-0ac2-4378-b7c2-c38a084b336d","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded Operating Systems","CreditHours":0.0,"Description":""},{"Id":"5762f735-9797-45ab-acb9-70c2d2874733","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Detect Image Dataset Bias","CreditHours":3.0,"Description":""},{"Id":"30d2d040-c71b-4a44-bd95-9489a49808f5","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Application Development","CreditHours":2.0,"Description":""},{"Id":"9d951b1a-1c96-44c2-b8fd-4dab68e998e0","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"High Quality Vol Visualization","CreditHours":2.0,"Description":""},{"Id":"693c2f93-514c-41be-8efa-e677e853e32e","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Systems","CreditHours":3.0,"Description":""},{"Id":"625db865-4b55-443c-8aa0-5fe5b370e916","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Detecting Genuinty Of Objects","CreditHours":3.0,"Description":""},{"Id":"5cc89cc9-6e1a-4e7d-a9ab-7aee3a051fc6","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI In CS Education Project","CreditHours":0.0,"Description":""},{"Id":"52309a6f-619b-4007-a788-5c5fb5d9a11b","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinformatics EM Mapping","CreditHours":3.0,"Description":""},{"Id":"ed58e419-e2f6-44f1-abcc-99b25e341558","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Competitive Programming III","CreditHours":1.0,"Description":"Requires completion of CS 39000CP or instructor permission."},{"Id":"493866b1-1ec9-42f3-8ed9-0ede3cdfe6e1","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Global Scale CallerID Spoofing","CreditHours":3.0,"Description":""},{"Id":"4dbb69d1-c336-4e43-8018-6488da1d583d","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Comp Chem Molecule Comparison","CreditHours":2.0,"Description":""},{"Id":"3a4f74b8-f585-4ac8-997a-9c8c6a6e3c00","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Architecture","CreditHours":3.0,"Description":""},{"Id":"9269ec54-a9c0-423f-9b10-95696ab2c9cf","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Comp Biophysics Project","CreditHours":0.0,"Description":""},{"Id":"b14549cb-7111-4987-b425-71f4a4d590f9","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Physical Computing","CreditHours":3.0,"Description":""},{"Id":"9a4f671b-4683-4ff9-8477-d526dbe261cb","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Comp Protein Str Analysis","CreditHours":2.0,"Description":""},{"Id":"4c2e5b9b-ba26-48d1-8681-1addbc2f32a0","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Prncpls Concurrncy&Parallelism","CreditHours":3.0,"Description":""},{"Id":"25aa7edc-e521-43cc-ab99-400d09be78da","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intro To Human Cmptr Intrctn","CreditHours":3.0,"Description":""},{"Id":"12b97d6e-4de2-48d8-842e-a7ae6102268e","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML Independent Study","CreditHours":3.0,"Description":""},{"Id":"0939f420-c0c0-43db-86c8-965c83a80c15","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"BIOL Data Visualization","CreditHours":1.0,"Description":""},{"Id":"9c89419a-0513-4eba-859c-f840ce90cefd","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Interactive Visual Analytics","CreditHours":3.0,"Description":""},{"Id":"84c42a53-c4d0-4b89-a986-f77bcd99645a","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research Topics In XR","CreditHours":0.0,"Description":""},{"Id":"fcef7495-e8e9-4cc8-a546-acbe4903cc17","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Twitter Data Analysis","CreditHours":3.0,"Description":""},{"Id":"642e449a-5347-4545-91c8-dc9cad335339","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"VR In AI","CreditHours":0.0,"Description":""},{"Id":"f5a14896-f5ea-41e3-9ec9-6849a5b8541c","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Studies In Distributed System","CreditHours":3.0,"Description":""},{"Id":"a446210f-780e-4979-b7e7-37e57656678d","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Comp Genome Anacrsis","CreditHours":2.0,"Description":""},{"Id":"94b03d24-bcc2-4430-a2a4-66693c0bb3d6","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Comp Methods For Bio Networks","CreditHours":2.0,"Description":""},{"Id":"b775f704-ba10-4437-b2d7-e8d34812a54b","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Virtual Reality Applications","CreditHours":3.0,"Description":"Requires a “C” or better in CS 25100, or instructor permission."},{"Id":"6c9cb769-b2a8-48e9-97e8-a532bd6512c8","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Project Management","CreditHours":3.0,"Description":""},{"Id":"ee273f8c-d5cc-4a8c-b0d0-4c85d28db599","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Memory Allocation III","CreditHours":3.0,"Description":""},{"Id":"7d198a45-29cf-4078-b7d0-3fb2fc1033cd","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Interface For Scheduling","CreditHours":3.0,"Description":""},{"Id":"4a1793b9-8556-4758-9196-e7ed7ec55432","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Vision On Embedded Systems","CreditHours":3.0,"Description":""},{"Id":"5b20c04b-173c-4ddc-8a11-ab51e8065780","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Scrum Software Dev Research","CreditHours":5.0,"Description":""},{"Id":"f5d53473-3d85-4090-bd82-865330a06576","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multi Core Operating Systems","CreditHours":3.0,"Description":""},{"Id":"e257a6cb-0dd1-4e6f-a575-fc1b43e4492f","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI In Programming Courses","CreditHours":0.0,"Description":""},{"Id":"4dd223a0-7774-42ee-8c03-0adc9e60587c","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Systems Management","CreditHours":3.0,"Description":""},{"Id":"a539bd89-c92d-4b0d-81b4-fe8ee0f62fbd","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Robotics & Community","CreditHours":0.0,"Description":""},{"Id":"ea1f8b4e-8dc8-4778-bb90-e5a33096b4f9","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Security","CreditHours":1.0,"Description":""},{"Id":"17572ae2-fd22-422d-bcb6-44745d16830f","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Applications Software Techno","CreditHours":1.0,"Description":""},{"Id":"05456578-aa43-4383-a170-3d184dbe0234","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Automatic Algo Runtime Res","CreditHours":0.0,"Description":""},{"Id":"f052915f-13d2-4067-b925-2fa181cff12e","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deep Learning For Audio Data","CreditHours":1.0,"Description":""},{"Id":"2fda09c9-f7f4-4aa0-bae1-c326d6a6f15c","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Tools","CreditHours":0.0,"Description":""},{"Id":"1111965c-2f62-4c91-b0d7-363421ab4718","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Building ARM64 Learning System","CreditHours":0.0,"Description":""},{"Id":"f52f1bf1-5d7f-4a4a-8dcd-0edbbfe288c0","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IOT Networking Project","CreditHours":1.0,"Description":""},{"Id":"1bbcfc85-5bed-4e63-8a6c-3676b9305692","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Games And Learning","CreditHours":0.0,"Description":""},{"Id":"0f6d22ce-338f-4e7e-9d0d-55a42b810df7","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Aut Plag Detection","CreditHours":0.0,"Description":""},{"Id":"d83404ed-ca3f-4a88-9c0b-01fef381e08c","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Discovery Of Network Cameras","CreditHours":3.0,"Description":""},{"Id":"068e4119-95f0-4580-b61f-9b4261473e3f","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Internet Of Things Research","CreditHours":3.0,"Description":""},{"Id":"fb71b98a-5c74-451e-8e21-07d9d64de3c0","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Scalable MPC And Applications","CreditHours":0.0,"Description":""},{"Id":"ac6a3a09-b0fe-4c4a-b441-dbea95812f5d","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"NLP In Bioinformatics","CreditHours":1.0,"Description":""},{"Id":"2e553e3b-6ba7-482f-8a2d-7f9d880db805","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Robotic Operating Systems II","CreditHours":0.0,"Description":""},{"Id":"450b8222-1db8-45d0-9015-a78b6cc83fb3","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded System Applications I","CreditHours":0.0,"Description":""},{"Id":"ac546d79-ade3-4bf8-86d4-0a0c04483cda","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Blockchain Research","CreditHours":3.0,"Description":""},{"Id":"43c0eac1-2c24-4d92-be53-9f6c468a89f7","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Generative AI In Education","CreditHours":0.0,"Description":""},{"Id":"7d551124-db4f-4c5f-b2b0-c19ec9cb8e27","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Memory Allocation & GC","CreditHours":3.0,"Description":""},{"Id":"32a03c76-839d-420a-83f4-03606e8f3d31","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Blockchain Based Systems","CreditHours":0.0,"Description":""},{"Id":"f1e4c0ee-3bb6-4398-bd17-1b5ea8aab0eb","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Memory Allocation And GC","CreditHours":3.0,"Description":""},{"Id":"a51c6b4c-2d57-4b3c-a2d3-065ea4cc9309","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI, Robotics, And Community","CreditHours":0.0,"Description":""},{"Id":"4e862216-bf1b-4ec0-9d97-2aca77c83b39","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Neural Projects","CreditHours":0.0,"Description":""},{"Id":"842d9f01-ade5-4c8f-8141-b427a75e944d","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Robotics And Community","CreditHours":0.0,"Description":""},{"Id":"9b70bd5b-76e8-4a1b-86d2-e99e7801b342","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Learning Community Assistant","CreditHours":1.0,"Description":""},{"Id":"7a5855bf-0b89-4f4f-be5d-62ada6cd685c","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Wave Func Diff Growth","CreditHours":0.0,"Description":""},{"Id":"58fda3a5-33cc-424f-b1a5-894a667e65a4","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Immersive Visualization Challe","CreditHours":0.0,"Description":""},{"Id":"286de106-4b4c-4f40-8474-3744a2be0cf3","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research In NLP","CreditHours":3.0,"Description":""},{"Id":"171bedff-a118-4391-babd-2e99d9d174c6","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mach Learn For Func Genomics","CreditHours":3.0,"Description":""},{"Id":"8089aab5-955b-4d1d-bd77-92020faa5bf6","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Forge III","CreditHours":1.0,"Description":""},{"Id":"14f76b91-0134-470b-a67f-26459352aff7","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded Systems And Iot","CreditHours":3.0,"Description":""},{"Id":"cdccca71-24e9-4377-b1a5-bebe80c5c94d","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Internet Of Things Design","CreditHours":3.0,"Description":""},{"Id":"68f6ba38-4079-4efd-80a1-364fabee6f82","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Linux Security","CreditHours":0.0,"Description":""},{"Id":"c21f0dd1-1608-402d-9ab7-e8a702726531","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"C++ Programming","CreditHours":1.0,"Description":"This course assumes that you have already taken a C programming course like CS240.  The course explains C++ for C programmers. C++ is an Object Oriented language that is used when performance is important. High Performance applications such as Chrome and the Java Virtual Machine are written in C++."},{"Id":"d621c339-7de4-486f-bc22-aad4fc35608f","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adv Memory Allocation","CreditHours":3.0,"Description":""},{"Id":"85cfd0fb-b6ad-49a4-baed-248ee08e681a","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced GC Techniques II","CreditHours":0.0,"Description":""},{"Id":"4e565f89-fe76-41c5-afa4-20091851dd7e","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Python Programming","CreditHours":1.0,"Description":"This course teaches you the Python programming language. It is required that you have already taken a programming course such as CS18000. The course covers the Python syntax, Exceptions, Built-in modules, strings, files, SQLite, and CGI-Scripting. We put emphasis in the implementation of web applications using Python."},{"Id":"d00837ff-0a26-444a-909e-4a48d9c457ef","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinformatics Research","CreditHours":4.0,"Description":""},{"Id":"329399dd-f876-4af1-a634-8555152efa87","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Virtual Reality Technologies","CreditHours":1.0,"Description":"“Requires a “C” or better in CS 25100.”"},{"Id":"649bfede-597c-40c3-8a98-f3da2dbe4cb7","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Robotics AI And Community","CreditHours":0.0,"Description":""},{"Id":"31464875-53ec-4302-af29-6cf43b4c080c","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Forge I","CreditHours":1.0,"Description":""},{"Id":"a0a2a666-191c-4990-a4fe-0a47dd7f21dd","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Automatic Plagiarism Detection","CreditHours":0.0,"Description":""},{"Id":"474e3f5c-4f50-4ba3-b395-2c5ad3f4ff29","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Scalable ML For Genomics","CreditHours":3.0,"Description":""},{"Id":"375c0057-02cf-4302-a118-3df29968e546","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Java Programming","CreditHours":1.0,"Description":"This course assumes that you have taken a Java Programming course such as CS180 and it builds on top of that to teach you advanced topics in Java. You will learn how to write networking and web applications in Java as well as how to write applications that interact with SQL databases. The course also teaches JNI (Java Native Interface) and Reflection."},{"Id":"af52593a-e281-46f8-9702-65c62941fb16","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Memory Security Tools II","CreditHours":0.0,"Description":""},{"Id":"18a619d1-9741-45c2-9686-4e147ef382c8","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Computing Security","CreditHours":3.0,"Description":""},{"Id":"9d6268db-fa90-48fd-8d76-a2c9e3fd5c14","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Porting Systems Software","CreditHours":3.0,"Description":""},{"Id":"fdddd167-fb43-44b1-891d-af4937673a55","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Leaning Community Assistant","CreditHours":1.0,"Description":""},{"Id":"5aacc8ca-2a3e-4252-9ad9-13309c133f55","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Graphics Research","CreditHours":0.0,"Description":""},{"Id":"c2a15ae1-cee6-4709-8100-4b8ca00c7676","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Memory Management","CreditHours":0.0,"Description":""},{"Id":"d604b3c7-fb6d-4250-88da-fba3dea484ba","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mathematics Of Cryptography","CreditHours":2.0,"Description":""},{"Id":"3a130f12-b506-43f3-aa30-a0582665d071","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"DB Concurrency Control Algs","CreditHours":3.0,"Description":""},{"Id":"ca47392c-9d0b-4cb3-a149-52645875667d","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Internet Of Things Application","CreditHours":3.0,"Description":""},{"Id":"c1fce3c2-3a40-41ab-9e1a-b1ef9a9446c2","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Mining & Machine Learning","CreditHours":3.0,"Description":""},{"Id":"afd02c2e-1a80-4737-b06d-20b88f7c265d","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Stream Mgmt Systems","CreditHours":3.0,"Description":""},{"Id":"f50f878f-8323-4ac6-b751-11361592e7d6","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Memory Allocation","CreditHours":0.0,"Description":""},{"Id":"5265d3bd-5d0b-4271-9140-cec8cb038e81","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Res Advanced Rendering Cont","CreditHours":0.0,"Description":""},{"Id":"948e02e5-a7e5-4ac4-ba1a-0d77772882ac","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Automatic Avatar Instructor","CreditHours":3.0,"Description":""},{"Id":"fb91d1a9-3f89-419a-b49a-cbfbff0e5d4c","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Competitive Programming II","CreditHours":2.0,"Description":""},{"Id":"0fd9ba79-71b9-49fe-82a4-4a1afdbd3922","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Forge II","CreditHours":1.0,"Description":""},{"Id":"92275941-c3ab-4c9e-9dfe-f21b9cdfe05e","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Privacy Research","CreditHours":2.0,"Description":""},{"Id":"3e52967d-baba-4b3e-9e58-4877f9712fa0","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IOT Project","CreditHours":2.0,"Description":""},{"Id":"7f15a3f8-8348-436b-ac08-837a1dc749f5","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adv Memory Management","CreditHours":3.0,"Description":""},{"Id":"5d160099-2ac6-4b61-a151-6f03f0b76cc1","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Computer Science","CreditHours":0.0,"Description":""},{"Id":"499cc8b4-a007-492b-92da-b01c6addea82","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Social Network Analysis","CreditHours":3.0,"Description":""},{"Id":"24c51456-d1ea-47dc-8635-7bbef791263a","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Memory Security Tools","CreditHours":0.0,"Description":""},{"Id":"3b028981-a312-4b76-8b3d-6e69a7c28db5","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adv Neural Proj- Med Deep Lrng","CreditHours":0.0,"Description":""},{"Id":"3ec36f78-c4b0-41aa-81cd-90272c9bde5b","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Internet Of Value Research","CreditHours":2.0,"Description":""},{"Id":"0be6c54c-6445-4505-a12b-43432f633825","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Crowdsourcing","CreditHours":3.0,"Description":""},{"Id":"02b95680-484e-49f9-b070-3041f24001f2","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Big Spatial Data Systems","CreditHours":3.0,"Description":""},{"Id":"0c018b9f-5e2d-4198-94c6-4bb0e7024e45","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer Science Research","CreditHours":2.0,"Description":""},{"Id":"043bcac2-f164-49b0-aa9d-5d360f8d3826","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded Systems For Robotics","CreditHours":2.0,"Description":""},{"Id":"853fc34a-7914-4e0d-a7ea-3e52514cf575","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bike Sharing Data Collection","CreditHours":2.0,"Description":""},{"Id":"46e539e0-772d-49d6-a29b-b063fba6f1ca","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Dist Location Data Streaming","CreditHours":3.0,"Description":""},{"Id":"67c750d0-661e-40ce-81c1-b2ec585cd8b7","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deep Leaning Systems","CreditHours":0.0,"Description":""},{"Id":"f5641a34-9e0f-453e-a6fa-1e834d610850","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Quantum Computing Research","CreditHours":2.0,"Description":""},{"Id":"9aea9efc-34c2-4f19-8295-031b4c434cc0","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Wellbeing Assessment Agent","CreditHours":0.0,"Description":""},{"Id":"6bc06a2c-0f3b-42a3-a17e-652be1b64118","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Res Computer Graphics","CreditHours":0.0,"Description":""},{"Id":"c95d42f1-410e-4dad-9ac7-f9f6e3609535","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Genetic Data Analysis Tools","CreditHours":3.0,"Description":""},{"Id":"af79c4fb-bfb1-4dd3-a10c-1b3a0a6b1733","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Debate Stance Analysis","CreditHours":3.0,"Description":""},{"Id":"ae546f2f-2db8-47e2-a91a-630071e9c955","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deep Learning In Bioinfo Res","CreditHours":2.0,"Description":""},{"Id":"a8e2a8a4-1965-4d83-9b3a-e3a6817beea5","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IOT Applications II","CreditHours":3.0,"Description":""},{"Id":"62c475d8-633b-417e-afab-b95bd2f50b18","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Virtual Reality App","CreditHours":3.0,"Description":""},{"Id":"8274a89f-4cc0-44c7-b3c4-0c2375469054","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deep Learning Systems","CreditHours":0.0,"Description":""},{"Id":"62b96f40-d880-4647-9c4c-53a67f822637","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Big Data Systems Project","CreditHours":3.0,"Description":""},{"Id":"58c2036d-7773-46d3-b760-c9d2ca585d93","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Systems Independent Study","CreditHours":3.0,"Description":""},{"Id":"31de66c1-d528-4cde-9866-d28c8cb50ea8","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinfo Db Research","CreditHours":1.0,"Description":""},{"Id":"1bd5da0e-b205-4791-839c-ffaf87acfabb","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Analyze Video Data","CreditHours":3.0,"Description":""},{"Id":"18af793e-30bc-470f-b9e7-4f0641591e76","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Robotics Operating Systems II","CreditHours":3.0,"Description":""},{"Id":"055842fb-388c-46c6-bded-d73267944e16","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Measuring Azure Performance","CreditHours":3.0,"Description":""},{"Id":"f82bab3f-3b10-44a1-a521-eb7a1063c6ac","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"CS Assignment Development","CreditHours":0.0,"Description":""},{"Id":"ea2b4daa-8aaf-4dad-ab7a-491783e7f13b","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intro To Comp Kinematics","CreditHours":1.0,"Description":""},{"Id":"d17becad-409f-4e44-8358-2e3d7a9dfac5","Number":"39000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Compiler Optimization ISP","CreditHours":2.0,"Description":"This course has been identified for the Spring 2021 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Spring 2021"},{"Id":"c8d972d7-8601-4098-a099-6980998990f0","Number":"39100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Junior Resources Seminar","CreditHours":1.0,"Description":""},{"Id":"74511484-678e-4a33-b4b1-268e39862c81","Number":"39399","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cooperative Experience III","CreditHours":0.0,"Description":""},{"Id":"ef26c6f0-8ded-48b2-83a0-1624af72317c","Number":"39699","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Professional Practice Internship","CreditHours":0.0,"Description":""},{"Id":"353a4790-6466-43e8-a614-894ca9384b35","Number":"39700","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Honors Seminar","CreditHours":0.0,"Description":""},{"Id":"bc9b89de-24b4-446b-b829-1495f9896d63","Number":"40700","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Engineering Senior Project","CreditHours":3.0,"Description":""},{"Id":"2b5d0aaa-b41d-4ebd-bd86-8c0f79595b6b","Number":"40800","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Testing","CreditHours":3.0,"Description":""},{"Id":"32e745bd-5a2e-4d73-a8dc-6df1dccfb352","Number":"41100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Competitive Programming III","CreditHours":2.0,"Description":""},{"Id":"afefb444-5c35-427c-ac21-03555a265d42","Number":"42200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer Networks","CreditHours":3.0,"Description":""},{"Id":"f937c4ca-da28-421b-8f70-3f3c96becb93","Number":"42600","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer Security","CreditHours":3.0,"Description":""},{"Id":"f03138c4-61a6-4392-833c-93b0f9feb6d7","Number":"43400","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Computer Graphics","CreditHours":3.0,"Description":""},{"Id":"de69b983-8739-49ee-98e4-d1743b290d31","Number":"43900","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Data Visualization","CreditHours":3.0,"Description":""},{"Id":"97ff916a-f794-40f5-8ef5-1f2f51155f6d","Number":"44000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Large Scale Data Analytics","CreditHours":3.0,"Description":""},{"Id":"31af27d6-3454-4f18-a8b3-19d4c9f203b1","Number":"44100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Science Capstone","CreditHours":3.0,"Description":""},{"Id":"cb7ef9ec-f750-40cb-a310-736f976eb71c","Number":"44800","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Relational Database Systems","CreditHours":3.0,"Description":""},{"Id":"d7825858-db31-4714-98ca-6b29f36adcae","Number":"45600","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Programming Languages","CreditHours":3.0,"Description":""},{"Id":"c73dc6f6-f144-426a-9348-7650bfff3102","Number":"45800","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Robotics","CreditHours":3.0,"Description":""},{"Id":"50aa732c-53ba-48d6-b3be-c974004ce391","Number":"47100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Artificial Intelligence","CreditHours":3.0,"Description":""},{"Id":"d620b3ff-2b6d-4fce-8d01-6974747e9247","Number":"47300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Information Search And Management","CreditHours":3.0,"Description":""},{"Id":"4d62df17-d8ee-40f7-93d2-970668169a09","Number":"47500","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Human-Computer Interaction","CreditHours":3.0,"Description":""},{"Id":"62f8d853-d9b5-40d2-8722-fed417ea9ad9","Number":"47800","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Bioinformatics","CreditHours":3.0,"Description":""},{"Id":"42e56758-dd66-44f8-8d19-b536603dd8aa","Number":"47800","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction to Bioinformatics","CreditHours":3.0,"Description":""},{"Id":"7f5f3c35-10ec-42b3-a56e-703b96e746cc","Number":"48300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To The Theory Of Computation","CreditHours":3.0,"Description":""},{"Id":"f4e2ad0b-9818-4bc5-acd7-6a3e713b42fc","Number":"48700","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Professional Practice V","CreditHours":0.0,"Description":""},{"Id":"6d0cef37-b31d-4cc5-b8e8-fd864f4478ae","Number":"48900","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded Systems","CreditHours":3.0,"Description":""},{"Id":"7774cf78-73f3-4d80-ba8f-81a60dcb125a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research In GNNs","CreditHours":0.0,"Description":""},{"Id":"20c31b32-647d-4d1b-a6dc-3709bd6a0fdc","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Systems Research","CreditHours":0.0,"Description":""},{"Id":"2cfaf640-628c-4d8b-b7a8-7bb20ca7e5a7","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Undergraduate Research","CreditHours":0.0,"Description":""},{"Id":"3502378f-1f25-44ed-b929-b30d1447e201","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Auto Algo Analysis","CreditHours":0.0,"Description":""},{"Id":"60df80f3-8138-4491-9fa3-030a58e25dee","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computational Genomics","CreditHours":3.0,"Description":"“This course introduces students to the basics of modern genomics and computational tools that will be used for screening. We will review the notion of gene, genome, transcriptome, and epigenome, and show how next generation sequencing technologies are utilized to measure these within cells.”"},{"Id":"62b48687-1f9c-448a-9547-dbefb2936a5d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Security","CreditHours":3.0,"Description":"This course focuses on software security fundamentals, secure coding guidelines and principles, and advanced software security concepts. Prerequisites: CS252 Systems Programming, with minimum grade B C."},{"Id":"666c42ad-dfb7-4db0-8039-c97c625c1b75","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Science Capstone","CreditHours":3.0,"Description":""},{"Id":"6be0c370-75a3-4b16-8157-10b0f04d0c60","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded Systems","CreditHours":0.0,"Description":""},{"Id":"709303e4-0742-42b5-8d3f-536f06a14b85","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Automatic Algo Runtime Res","CreditHours":0.0,"Description":""},{"Id":"7891adbe-7cf3-41b0-91be-eba74ef4069f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Graphics Research","CreditHours":0.0,"Description":""},{"Id":"79364060-f331-47d2-b280-cf0da471eff9","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Tools And Language Models","CreditHours":0.0,"Description":""},{"Id":"86732eb2-b71c-4b47-8bf8-e3d5e684e934","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"HCI Research","CreditHours":0.0,"Description":""},{"Id":"ac7bd295-7de1-4aa3-8f9f-f3ca54c6c18f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Empathy AI And Robotics","CreditHours":0.0,"Description":""},{"Id":"b01f4092-5336-4c8f-92be-e41a0611753a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deterministic Big Data Systems","CreditHours":0.0,"Description":""},{"Id":"b63e9639-0f89-4b60-a6c5-804d95572d42","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Auto Plagiarism Analysis","CreditHours":0.0,"Description":""},{"Id":"df1a00f2-e2e7-4900-9f10-0dd96748e93c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introductions To Robotics","CreditHours":3.0,"Description":"Students are required to have strong familiarity with Data Structures & Algorithms, basic Calculus, and Linear Algebra, i.e., CS 25100 and [MA 26100 or MA 27101] and [MA 26500 or MA 35100]."},{"Id":"e7123d3b-e8e5-477e-9a79-420a315ef054","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"5G Research","CreditHours":0.0,"Description":""},{"Id":"fb8e33e8-2df1-4b56-9ba6-0a0904fd35ce","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Generative AI","CreditHours":0.0,"Description":""},{"Id":"ff298541-ea9f-4257-8dad-1c90716e3db9","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer Networks Research","CreditHours":0.0,"Description":""},{"Id":"71bff347-a30f-4b90-a9ae-529ce8fbeaa0","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"iOS Development In Swift","CreditHours":3.0,"Description":""},{"Id":"bb6e1540-1bf8-43e2-a1ac-a464fe091c3c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To VR/AR","CreditHours":3.0,"Description":""},{"Id":"2bf5f738-c124-4652-8cb3-676672132fc9","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mixed Game Theory Research","CreditHours":3.0,"Description":""},{"Id":"7c8408ef-1045-4678-a21d-55419a4df99d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Operating Systems Project","CreditHours":0.0,"Description":""},{"Id":"86ba807a-d18b-452c-a119-fb443149fada","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"NLP-based Graph DB Querying","CreditHours":0.0,"Description":""},{"Id":"8b40a1bf-7bf0-4a44-8035-a540eef77910","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Summer Security Research","CreditHours":0.0,"Description":""},{"Id":"d12f53b0-36ba-4917-b84d-78de780ecb8a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Kihara Lab","CreditHours":0.0,"Description":""},{"Id":"f5980125-8eb8-4b38-86d6-6ad29b2f0a1c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mixed Reality Dis Learning","CreditHours":3.0,"Description":""},{"Id":"0ea44ee7-78e8-4582-8fa1-b46149ab3a12","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Automated Machine Learning","CreditHours":0.0,"Description":""},{"Id":"23c44bc0-2e6b-4585-9cc3-d29891aae6c8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning And HCI","CreditHours":0.0,"Description":""},{"Id":"3b61c2ed-484f-448c-aa29-c09ce776d1e3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multipath Routing","CreditHours":0.0,"Description":""},{"Id":"43ca37d9-15b2-47fd-b877-34d4254227bb","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Dynamic Scaling Of 5G Services","CreditHours":0.0,"Description":""},{"Id":"46b6ef40-3d5b-4258-8a40-d0a432cdccb6","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Research","CreditHours":0.0,"Description":""},{"Id":"4c3caab7-c89c-4493-884a-1e5cbe68044d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinformatics","CreditHours":0.0,"Description":""},{"Id":"52e8f49c-c2ad-4b37-a834-cc55307aa397","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Rendering","CreditHours":0.0,"Description":""},{"Id":"5ed87b69-112c-44f4-b818-73e99bc81a69","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research In TCS","CreditHours":0.0,"Description":""},{"Id":"98210f60-9367-42ce-9158-0e2483212eab","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Simulated Users Of VR Apps","CreditHours":0.0,"Description":""},{"Id":"98c54f23-fdeb-4a2a-b5ea-2bce8dc3eab5","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Res CGVLAB","CreditHours":0.0,"Description":""},{"Id":"9aeef333-b51d-4887-b77c-6ab48d60c1ef","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Updating The Purdue IOS App","CreditHours":0.0,"Description":""},{"Id":"9b12d524-70f6-465a-9715-5af7e32fab5e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Real-Time Headset Inpainting","CreditHours":0.0,"Description":""},{"Id":"a4c70395-b638-4273-9c7a-3b6e98aea2c8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Eye Contact In Videoconf","CreditHours":0.0,"Description":""},{"Id":"f55fdd2e-4b44-418a-9c54-1e37300c0092","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Competitive Programming III","CreditHours":2.0,"Description":"Requires a “B” or better in CS18000, or instructor permission. Evening Course."},{"Id":"fcfb412d-3ee5-42e1-a93b-ac45e15a72c6","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinformatics Research","CreditHours":0.0,"Description":""},{"Id":"150f1db1-977e-4f7a-a28e-2eca1a84301d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Tor Security Research","CreditHours":0.0,"Description":""},{"Id":"18b16db1-649e-476d-be9f-e355c3ce211e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Xinu Remote Disk/File Testing","CreditHours":0.0,"Description":""},{"Id":"26343a60-30f5-435e-9ca1-bbe24f40b850","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Collaboration In VR","CreditHours":0.0,"Description":""},{"Id":"693e3cf3-22e0-4f22-ac38-86537b2be09f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Operating Systems Sr Project","CreditHours":0.0,"Description":""},{"Id":"6a788eaa-0aba-4722-8d16-e6fa96dbcb1f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Prefiltered Font For Motion","CreditHours":0.0,"Description":""},{"Id":"bdf8475b-ca88-49b7-9a0e-96e63b6b017a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"UG Robotics Project","CreditHours":1.0,"Description":""},{"Id":"e73f2384-b751-43af-a8bf-b7dca2f94136","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research In Cloud Computing","CreditHours":0.0,"Description":""},{"Id":"871a79fe-60ab-4a21-9d15-5cf9df921233","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Lossy Fabric For DL Training","CreditHours":0.0,"Description":""},{"Id":"9be69702-dc6c-46b2-aaa7-2aac05e6fbe7","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Building A Cloud-Native DSA","CreditHours":0.0,"Description":""},{"Id":"0c88ffb6-9f1f-491b-81e3-41dfba3ea982","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reliable And Secure Systems","CreditHours":0.0,"Description":""},{"Id":"0ddaa9b0-3831-43d5-8e0e-1d587b3232bc","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"3D Image Processing","CreditHours":0.0,"Description":""},{"Id":"1eecfb82-e8df-4ffa-b5c4-7d126d6a3ce8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced ML For Graphs","CreditHours":0.0,"Description":""},{"Id":"3443edce-2508-4624-8328-4c60395b29fe","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bio Image Processing","CreditHours":0.0,"Description":""},{"Id":"3eaaf008-16d8-4ef7-9656-8f3043fbd0f9","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"MPC Protocol Mixing Optimizati","CreditHours":0.0,"Description":""},{"Id":"3f843098-a333-4260-8f49-7ec914f146e2","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Systems Security","CreditHours":0.0,"Description":""},{"Id":"4e333c15-4af6-4595-810b-2c2678aa2bed","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"VR Neurovision","CreditHours":0.0,"Description":""},{"Id":"5daa7b48-aee0-4a52-9c9d-7f49491f93d6","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Xinu Optimization Research","CreditHours":0.0,"Description":""},{"Id":"723e31e8-bf60-4a98-989b-1023bebc508c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Computing","CreditHours":3.0,"Description":""},{"Id":"73735c5b-c740-4c1b-9e20-baf35590022c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Networking Bridge Project","CreditHours":0.0,"Description":""},{"Id":"8772c981-4788-4dc1-99e2-6f71bc69a86c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Developing Cross-Platform Apps","CreditHours":0.0,"Description":""},{"Id":"8a1929bd-788e-4f29-93f7-28dd4da67928","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research In Operating Systems","CreditHours":0.0,"Description":""},{"Id":"9e5e575a-1b1b-4846-8bae-4a17b52c454b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Robotics Research","CreditHours":0.0,"Description":""},{"Id":"b4781fb6-ece8-4e9c-ab18-212dd4df9646","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security For Advertising","CreditHours":0.0,"Description":""},{"Id":"be831982-228c-4a4a-8f60-448d5a1d154c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Link Prediction","CreditHours":0.0,"Description":""},{"Id":"ca68cba3-d13a-4435-b208-3d04821123c6","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Cloud Computing","CreditHours":0.0,"Description":""},{"Id":"d34576ff-80aa-4619-9472-f8208a6f58b1","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bio Data Visualization","CreditHours":0.0,"Description":""},{"Id":"dab4bc6e-748c-4b26-a3e5-f4b732e1a00b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"TrustZone For Device Integrity","CreditHours":0.0,"Description":""},{"Id":"f1b4f447-2c1e-4a4c-939c-43ba6bc37bb3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded Systems For Space","CreditHours":0.0,"Description":""},{"Id":"f55d310f-c752-488a-8f8b-6021bc90dd6b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Networking Senior Project","CreditHours":0.0,"Description":""},{"Id":"fc92a36e-efcb-404c-88cb-eb84e714b091","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinformatic Image Processing","CreditHours":0.0,"Description":""},{"Id":"0d3db4cb-e68a-457f-b275-8fe690ea4da2","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Neuroscience In VR","CreditHours":0.0,"Description":""},{"Id":"145b4a7f-b4cc-4890-bb44-91c74bad2cf9","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Exploring Socially Grounded LM","CreditHours":3.0,"Description":""},{"Id":"2ba64cf1-7757-4653-816b-b4fbf275675a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intro To Data Visualization","CreditHours":3.0,"Description":"The course offers an introduction to the basic principles, strategies, and techniques needed to visually explore and analyze data. The course focuses primarily on information visualization, whose goal is to create spatial representations of inherently non-spatial data. Typical examples of such data include tables, graphs, trees, text, maps, time series, etc... The lectures will present various techniques and discuss their strengths and limitations in practical scenarios. Students will gain hands-on experience by visualizing real world using advanced visualization software. The course material is self-contained and no graphics background is assumed.  Basic programming experience required."},{"Id":"31dec9c0-3a54-434f-ab24-4cd961345375","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Graphical Language Design","CreditHours":3.0,"Description":""},{"Id":"51045058-0a20-4cd1-af1f-973fd0b4abcf","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Networks Research Project","CreditHours":0.0,"Description":""},{"Id":"554cad51-488e-4e26-aa41-5d39877126cc","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Test Drive","CreditHours":0.0,"Description":""},{"Id":"75ebe21d-12b3-40ec-978a-e69b9cc3c8c6","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Programmable Tor Middleboxes","CreditHours":0.0,"Description":""},{"Id":"989f848b-1dc7-4d4c-a310-9e803169296a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded Software Security","CreditHours":0.0,"Description":""},{"Id":"a7f4ab66-1e47-449b-9cfb-72057f23ce54","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Decentralized App Encryption","CreditHours":0.0,"Description":""},{"Id":"ca0198ad-e0c4-4512-88f4-5a8038f099a9","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Socially Grounded LM","CreditHours":0.0,"Description":""},{"Id":"d8707ecb-2585-436a-84e1-2f792e506f70","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Interactive Language Learning","CreditHours":0.0,"Description":""},{"Id":"d9885b74-9485-46b3-9ffe-24635c201a3f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Large Scale Data Analytics","CreditHours":3.0,"Description":"This course is restricted to Data Science majors"},{"Id":"e94a40e3-377b-4f53-9ddc-77bf9ec790fe","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Networking","CreditHours":0.0,"Description":""},{"Id":"fc1d3f9d-32fe-43f8-9573-e3fa923213a5","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Analyzing Mutli-Cloud Services","CreditHours":0.0,"Description":""},{"Id":"84d05643-0917-4320-bf38-e0e3ca19ba04","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Undergrad Research In AI & ML","CreditHours":3.0,"Description":""},{"Id":"c5716cdd-1dfe-4dd9-a2bb-b52613484930","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Improving Onion Services","CreditHours":3.0,"Description":""},{"Id":"0f8b0f23-59a5-43e5-8de7-97f7ca772213","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Res In Artificial Intelligence","CreditHours":3.0,"Description":""},{"Id":"10693482-b641-45ea-9715-6ca5cc560efa","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sec Analysis Of Wearable Tech","CreditHours":3.0,"Description":""},{"Id":"29957d54-1063-478b-86a9-08dc543ebdaa","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Undergrad Res In AI And ML","CreditHours":3.0,"Description":""},{"Id":"46539f5b-6b4c-42a6-8440-1529bce6f4dd","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Graphics & CS Tch Asst","CreditHours":3.0,"Description":"This course has been identified for the Spring 2021 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Spring 2021."},{"Id":"7a82f08b-e076-46d1-8eaf-e3e8e51d2a45","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Staged Symbolic Execution","CreditHours":3.0,"Description":"This course has been identified for the Spring 2021 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Spring 2021."},{"Id":"aa84af7d-a46d-477d-86c8-2380461146a9","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"MPEG-7 For Video Analytics","CreditHours":1.0,"Description":""},{"Id":"c15de655-bc3f-4f8e-babc-4656a5b8eb5f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Remote File Systems Research","CreditHours":3.0,"Description":""},{"Id":"cf804d2d-3b13-41c4-8488-93bcf0c9250f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Leak-Resilient Secret Sharing","CreditHours":3.0,"Description":""},{"Id":"f6b62e9b-06d5-4ee9-9207-d285001bc8e1","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"4G & 5G Data Visualization","CreditHours":3.0,"Description":""},{"Id":"fc7c390a-70f1-4062-b524-c5502beb94d5","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research In VR & HCI","CreditHours":3.0,"Description":"This course has been identified for the Spring 2021 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Spring 2021."},{"Id":"1c7c4020-631d-4399-ad2c-70464233d971","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mach Lrng & Tchng Asst","CreditHours":3.0,"Description":"This course has been identified for the Fall 2020 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Fall 2020."},{"Id":"310b49bb-29a5-4b66-b02e-8659509eab79","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mach Lrng Libraries & Tch Asst","CreditHours":3.0,"Description":"This course has been identified for the Fall 2020 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Fall 2020"},{"Id":"39cd0d09-84eb-4071-bf03-fab598f47bdf","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Enrgy Eficnt Rendrng 360 Video","CreditHours":3.0,"Description":""},{"Id":"4dd2114d-143d-4032-9e44-e206ca66d758","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sftwre Dev Models&180 Tch Asst","CreditHours":3.0,"Description":"This course has been identified for the Fall 2020 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Fall 2020"},{"Id":"5a126fab-5ccd-4885-b1c5-5b6986e81f17","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Detecting Dataset Blas In AI","CreditHours":3.0,"Description":""},{"Id":"5db13d82-6260-446c-a214-a9d9765dede1","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Detecting Crypto In Binaries","CreditHours":3.0,"Description":""},{"Id":"5f608583-9a34-4a83-b7b3-36fdba0ea32f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Survey Of ML Based Indexing","CreditHours":3.0,"Description":""},{"Id":"7aa1010b-68e4-4782-94c5-fab5f593b287","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Systems & Networking Research","CreditHours":3.0,"Description":""},{"Id":"ac88feaf-3022-4ccc-952e-7cd487d35593","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Code Style Analysis","CreditHours":1.0,"Description":"This course has been identified for the Fall 2020 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Fall 2020."},{"Id":"b0c54212-ef65-48a8-8159-e5309190a358","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Fair Vision","CreditHours":3.0,"Description":""},{"Id":"d8679dda-6e10-4572-8a4a-f4786c34bc57","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"MEAN MERN Stacks Teach Asst","CreditHours":3.0,"Description":"This course has been identified for the Fall 2020 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Fall 2020"},{"Id":"e5135284-dc6c-4740-8c0b-115c117cf674","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Efficient Forking For Linux","CreditHours":1.0,"Description":""},{"Id":"ee9c893e-f12a-4e1c-b591-da782a56b0cb","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Practical Binary Analysis","CreditHours":3.0,"Description":"This course has been identified for the Fall 2020 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Fall 2020."},{"Id":"f39740e0-426e-40ad-95c8-96ee9da8bc8f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Control Program Security","CreditHours":3.0,"Description":""},{"Id":"6d41b2aa-421e-4c5d-bf78-f66cf6cc4586","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Systems Senior Project","CreditHours":3.0,"Description":""},{"Id":"bc6fbafc-f83a-4414-b6b0-daea92baaeec","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Analyze Drone Video","CreditHours":2.0,"Description":""},{"Id":"f0fc4500-519e-4f8a-94dc-9108a03eabf3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Video Data Labeling & ML","CreditHours":3.0,"Description":""},{"Id":"f587bc8c-b94e-4f95-bb5c-ef6f25c67797","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Practical Program Analysis","CreditHours":3.0,"Description":""},{"Id":"2467388c-86a0-4fb4-84bb-1067d483e245","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"NLP In Bioinformatics III","CreditHours":1.0,"Description":""},{"Id":"2d7add0e-5c5c-4091-b113-6e68c6a09787","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bias Finding By Crowdsourcing","CreditHours":2.0,"Description":""},{"Id":"41af3686-735b-47af-8282-04e3a8e2d273","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Crowdsource For Vision","CreditHours":3.0,"Description":""},{"Id":"444e1e5c-cde7-4fc5-a4ab-4eef08dfa224","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Automated Software Engineering","CreditHours":2.0,"Description":""},{"Id":"45dae188-0f02-45e5-a99c-31a137288998","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Virtual Dataset Generation","CreditHours":3.0,"Description":""},{"Id":"4c6b2bbe-9eaf-4fac-8e17-07dd50d08755","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"3D Plant Competition","CreditHours":3.0,"Description":""},{"Id":"504a72a5-1bb1-464a-8717-802be1001298","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Depth Robust Graphs","CreditHours":3.0,"Description":""},{"Id":"51afad2c-1de4-4963-ae24-b2641c182e14","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reinforced Learning In AV","CreditHours":3.0,"Description":""},{"Id":"59901d62-7fc0-4d6e-a36e-8d84552cebc2","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"LLVM Based Program Analysis","CreditHours":3.0,"Description":""},{"Id":"67026fb1-e73e-488c-be84-005827ad7bf1","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Learning From Set Inputs","CreditHours":3.0,"Description":""},{"Id":"813632f4-d307-49c6-804b-05462cd1600d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinformatics Research I","CreditHours":1.0,"Description":""},{"Id":"a95cbf64-c659-4e03-b6f5-413430c1c692","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Engineering Research","CreditHours":3.0,"Description":""},{"Id":"aca19cfe-523d-49be-b342-6bdae804801d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Detect Bias Via Casual Infernc","CreditHours":3.0,"Description":""},{"Id":"adb249e4-8a71-4397-a6c7-5adfee31f968","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Procedural City Generation","CreditHours":3.0,"Description":""},{"Id":"c0d08551-85aa-4aee-8a7f-adef36bb44ab","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deep Learning Research","CreditHours":5.0,"Description":""},{"Id":"d36d00ab-99dd-43a4-9b0a-ff71cc2f0f32","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinfo Research Project","CreditHours":2.0,"Description":""},{"Id":"d410131d-3aa9-4b0a-a269-c895c9591de3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Build Drone Video Datatset","CreditHours":0.0,"Description":""},{"Id":"dcd6015f-d1db-4221-99a3-8539cfe97913","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Stance Prediction In Debates","CreditHours":3.0,"Description":""},{"Id":"e446160b-5238-4516-8abb-5e4d5de796b7","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mathematical Toolkit In CS","CreditHours":3.0,"Description":""},{"Id":"f14a2de9-20e3-4620-9fe0-245eb8db7c12","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Auto Reason For Rel Prog Prop","CreditHours":3.0,"Description":""},{"Id":"1f963b5e-e4fd-4a2f-af51-2df699d8c75b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Zero Knowledge Proofs","CreditHours":3.0,"Description":""},{"Id":"2afa46d5-51e8-4a4c-826f-18d159a73cb3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multiparty Computation","CreditHours":3.0,"Description":""},{"Id":"521bf280-482a-4894-bf2e-8b19b5defa14","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Graph Partitioning Algorithims","CreditHours":3.0,"Description":""},{"Id":"7510e57f-9569-4d82-a562-faf6b4d3a993","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Video Drone Annotation","CreditHours":3.0,"Description":""},{"Id":"92b3649e-939d-4d1d-afb4-1dc45d625cee","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Create Visual Dataset","CreditHours":3.0,"Description":""},{"Id":"9350f1a4-d98e-4c9a-9418-0f5c13146501","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"NLP In Bioinformatics II","CreditHours":1.0,"Description":""},{"Id":"aa2595ea-b7c2-43ab-afa7-f18f1428d904","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Independent CRYPTO Research","CreditHours":3.0,"Description":""},{"Id":"ab135370-a897-46c7-9697-f6e5c0545ee5","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Animation","CreditHours":3.0,"Description":""},{"Id":"abaefc63-0f56-40cf-a803-e891a3497f89","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Object Detection","CreditHours":3.0,"Description":""},{"Id":"bd092849-2055-4813-b596-341257a6c89b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Collection And Labelling","CreditHours":3.0,"Description":""},{"Id":"cab8f07c-b584-4b50-a786-985f09776fd3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Big Spatial Data Systems","CreditHours":3.0,"Description":""},{"Id":"dba706f0-a05c-41c1-b799-c80c23b9fb3a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Undergraduate Research Project","CreditHours":3.0,"Description":""},{"Id":"ea966d83-5abe-4aa9-8699-c2cf996c0112","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Automated Code Review","CreditHours":3.0,"Description":""},{"Id":"fe38aa15-0a88-42fa-b915-7e342a05ed82","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Studies In Bias In AI","CreditHours":1.0,"Description":""},{"Id":"0cb4e9e6-d109-49b2-8761-ae8f05ce72c5","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Graph Embedding","CreditHours":3.0,"Description":""},{"Id":"27eacbc1-b61d-45e0-a01f-a6e7d38455ed","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Internet Of Things","CreditHours":3.0,"Description":""},{"Id":"35a9856a-56de-48ec-8ef1-0a4743b642e4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML In Autonomous Vehicles","CreditHours":1.0,"Description":""},{"Id":"8c5d7172-1c2b-47f6-93d4-062ef8ba3837","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Vulnerability Identification","CreditHours":3.0,"Description":""},{"Id":"0025a455-9629-4b2e-8a73-316b9b96ba86","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"NLP In Bioinformatics","CreditHours":1.0,"Description":""},{"Id":"09fa609b-2acb-4a5b-baa7-5596e1e1bbcd","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Porting System Software","CreditHours":3.0,"Description":""},{"Id":"1882d064-368d-4e37-a65b-69d6c8e4f48d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Malware & Vulnerablilty Anlys","CreditHours":3.0,"Description":""},{"Id":"1d453f40-3415-4426-a350-adcfa6a7fbd3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Vision For Network Camera","CreditHours":3.0,"Description":""},{"Id":"1db763fb-e8b3-4e75-815e-a0f68c5fb137","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Camera Discovery & Reliability","CreditHours":3.0,"Description":""},{"Id":"29fdf00c-6216-47e5-8441-b57ad3ff2931","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Binary Analysis","CreditHours":3.0,"Description":""},{"Id":"2ba1b67b-e67f-4a10-8cef-70bfd06f1af8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Social Media Analytics Project","CreditHours":3.0,"Description":""},{"Id":"3a7c9055-73e4-4b9b-b11e-ff4b95ce3b2a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Fairness In Machine Learning","CreditHours":3.0,"Description":""},{"Id":"41fe50ae-1d91-4103-bdf6-318d4256b486","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Crowdsource Machine Learning","CreditHours":3.0,"Description":""},{"Id":"52b689c6-a942-4725-bd3d-bc21e19e9401","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Expermntl Study Of Trust In ML","CreditHours":3.0,"Description":""},{"Id":"57353303-b1c8-418c-ae59-13619c0c06b3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Res In Machine Learning","CreditHours":3.0,"Description":""},{"Id":"591f4f63-bbb5-438f-8633-9b01fbaa2611","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reliability Of Deep Nets","CreditHours":3.0,"Description":""},{"Id":"61de2aea-f5e2-4f19-a808-4b0f18e293a7","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Operating Systems Research","CreditHours":3.0,"Description":""},{"Id":"74dab7b0-cddd-406f-86ed-6500c8afbbdd","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Structured Machine Learning","CreditHours":0.0,"Description":""},{"Id":"7b0dc606-511e-4bfe-a567-0dbd87593c17","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Malware Detection Machine Lrng","CreditHours":3.0,"Description":""},{"Id":"7efae70e-bd92-4ec8-b05c-bdfa9c852ff7","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Applying ML To Fuzzy Matching","CreditHours":1.0,"Description":""},{"Id":"806ecd28-6d00-4f12-b90e-68f20178dcaa","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning Applications","CreditHours":3.0,"Description":""},{"Id":"839a8bb2-275e-4a06-9004-9d41b5c502d8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Randomized Matrix Methods","CreditHours":3.0,"Description":""},{"Id":"90d98c4f-de7f-4ff9-9a8a-5990da9083b6","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Cryptography II","CreditHours":3.0,"Description":""},{"Id":"91f8227b-2ccf-4491-8d99-61ca53a047c9","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research In Program Analysis","CreditHours":3.0,"Description":""},{"Id":"98c7a2f3-c55d-49ce-90f0-03bb2bcd1f0b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Image Database","CreditHours":0.0,"Description":""},{"Id":"9ea7549e-c993-4c34-8471-e7e83012c758","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI System Dev","CreditHours":4.0,"Description":""},{"Id":"b2c893fd-604b-4314-b68f-4edab8ae3fd9","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Street View To 3D Model Bldgs","CreditHours":3.0,"Description":""},{"Id":"b5f05eba-3f38-42f0-a205-0794a7cffd6e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reflective Protocol Fuzzing","CreditHours":5.0,"Description":""},{"Id":"bdfad3d0-f6f7-4d1a-81d9-b5f1feecf4a4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Collective PDF Annotation Sys","CreditHours":3.0,"Description":""},{"Id":"db965bab-d90e-46f1-8a00-0cdbf8107db3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Spatiotexual Indexing","CreditHours":3.0,"Description":""},{"Id":"e0c057ca-8025-4883-bc04-6e7ebdab9220","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer Vision","CreditHours":3.0,"Description":""},{"Id":"e393f64c-a7a4-41f1-8aaf-cdc62935bba1","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Generating Password Mnemonics","CreditHours":3.0,"Description":""},{"Id":"e9b8410b-9b0c-4c27-87ec-98319428fd01","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Virtual Network Function Impl","CreditHours":3.0,"Description":""},{"Id":"fe988298-9301-49e8-8269-36844a2a3a57","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Metrics II","CreditHours":3.0,"Description":""},{"Id":"034e7b13-7db2-4be2-874b-3923777afd7a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Protein Bioinfo Research","CreditHours":1.0,"Description":""},{"Id":"04f1e242-d7db-434c-83b5-397d10d75fd1","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Database Of Network Cameras","CreditHours":3.0,"Description":""},{"Id":"136e0317-2093-466d-9a6c-e1241418437b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"In Memory Big Spatial Data Sys","CreditHours":3.0,"Description":""},{"Id":"16f86dbd-c56a-4456-8ef3-455c2164546a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Quantum Computing","CreditHours":0.0,"Description":""},{"Id":"25b450a4-94f2-4f42-b0ba-79b4ae6fe59c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computational Protein Modeling","CreditHours":2.0,"Description":""},{"Id":"32bc2a9e-5433-4f01-aca3-168485935c6b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Twitter Sentiment Analysis II","CreditHours":3.0,"Description":""},{"Id":"4015b221-46b1-484f-b0c3-04f50cb32d29","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Virtualized Network Functions","CreditHours":3.0,"Description":""},{"Id":"4dd56ea6-f5b1-4cf9-bdf0-b6cc00245ab2","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Crowdsourcing Cellular Data","CreditHours":3.0,"Description":""},{"Id":"50cae242-c8d3-4830-8a1e-45e87c19031a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Metrics","CreditHours":3.0,"Description":""},{"Id":"5bd00029-e13d-496c-8500-7bb561760014","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deep Neural Network","CreditHours":5.0,"Description":""},{"Id":"65137921-04ca-445d-94b2-8fa9a5b302a6","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sfwr Engng For Bioinformatics","CreditHours":1.0,"Description":""},{"Id":"6632c892-26ef-4454-bd72-e8f32b4c85d8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Detecting Bias In News","CreditHours":3.0,"Description":""},{"Id":"6c207e66-0b45-4a66-9665-96fa111a6ada","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Ml Based Spatial Indexing","CreditHours":3.0,"Description":""},{"Id":"72da2f60-9ca1-4bd9-8489-bb57e6878756","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Discover Network Cameras","CreditHours":3.0,"Description":""},{"Id":"78ef5370-7018-4edd-a616-2abe3743ff7c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Decentralized AI","CreditHours":3.0,"Description":""},{"Id":"80167b1c-9970-4077-a3b5-96be4d9070a9","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Engineering Metrics","CreditHours":3.0,"Description":""},{"Id":"8420a517-9968-43c6-927f-b0a58e86db15","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Large Scale Image Recognition","CreditHours":4.0,"Description":""},{"Id":"8af09c42-f402-4f76-9ab9-6320298c5f50","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"GPU Testing & Security","CreditHours":5.0,"Description":""},{"Id":"9d96a467-27e6-4677-b758-834028cfc34c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"1st Yr CS Mentoring Retention","CreditHours":5.0,"Description":""},{"Id":"c75bf219-71bc-4f5d-a80f-dc6af599d4b8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Camera Discovery","CreditHours":0.0,"Description":""},{"Id":"d4c18f6b-ec66-4f9c-b092-4c91479e2dcf","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"News Authenticity Analysis","CreditHours":3.0,"Description":""},{"Id":"d610c3a3-c888-4ce1-bfa1-476cfca6cee3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Eng For Bioinformatcs","CreditHours":1.0,"Description":""},{"Id":"e0d2767a-0b9b-4f08-afea-e7dfa4b6f4ec","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Cryptography","CreditHours":3.0,"Description":""},{"Id":"e6665c37-1772-4835-9957-74aff5843d9a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reliability Of Network Cameras","CreditHours":3.0,"Description":""},{"Id":"f45fee0f-82e4-4cdf-a86e-26a734604d21","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Parallel Computer Vision","CreditHours":0.0,"Description":""},{"Id":"f922ab04-2576-4d65-9abc-ce0ae014f1b5","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Compilers","CreditHours":3.0,"Description":""},{"Id":"34dc1614-f0b8-46e6-80ef-a91c073b64db","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Transformational Fuzzing","CreditHours":3.0,"Description":""},{"Id":"34e57896-2be5-44f6-ab49-80921fbeaaf7","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Nlp Finding Abstract Patterns","CreditHours":3.0,"Description":""},{"Id":"ba6b87bb-1ecd-4e71-a7e7-84cbb9f5362c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Computer Sciences For Undergraduates","CreditHours":0.0,"Description":""},{"Id":"e3edc316-2c15-4ed7-a174-2d3a8aca09c2","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Dist Db Mgmt Using Blockchain","CreditHours":3.0,"Description":""},{"Id":"f284d06a-e23e-4a37-b6d7-24a3c43e8ecf","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Objects Detection In Images","CreditHours":2.0,"Description":""},{"Id":"e69abf6a-6f82-42e3-920a-3feb60285fa4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research In NLP","CreditHours":3.0,"Description":""},{"Id":"0137eb6d-ed58-484a-b85b-39b37183fd38","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Healthcare Data Analysis","CreditHours":3.0,"Description":""},{"Id":"08c4c621-696d-4ea2-84e4-c9d8bc911387","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Neural Network","CreditHours":4.0,"Description":""},{"Id":"199c4020-fe01-46ed-9dd1-e35dad4329bd","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web User Interface","CreditHours":0.0,"Description":""},{"Id":"22e7d99d-cb75-4d48-ae10-d0a3702a5cd4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Automatic Security Testing","CreditHours":3.0,"Description":""},{"Id":"24202195-8fbc-4fce-9728-0df6b7f93b3a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Common Sense Evaluation","CreditHours":3.0,"Description":""},{"Id":"489dcfb7-654e-4c06-9446-c2350949b7b0","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Database For Network Cameras","CreditHours":3.0,"Description":""},{"Id":"4f827348-fcc0-4d40-9966-b35176cf3dac","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deep Learning Bioinfo Res II","CreditHours":1.0,"Description":""},{"Id":"5cf42c87-0877-446e-b3e4-9362421c6390","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reliable Crowdsensing","CreditHours":3.0,"Description":""},{"Id":"66764278-29bd-4d3b-a4bc-260207f483b0","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Protein Bioinformantic Project","CreditHours":1.0,"Description":""},{"Id":"726979e4-8ea3-4ff9-8392-841b59e1b454","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Balls And Bins Problems","CreditHours":1.0,"Description":""},{"Id":"73ffbefb-d3b1-432e-96a7-d882aa554752","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Camera Analysis","CreditHours":2.0,"Description":""},{"Id":"7a1e24c3-d2e4-4517-8cd1-a390f94ad9ca","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"V@V Security","CreditHours":3.0,"Description":""},{"Id":"7f7a682b-7f37-4e01-89d1-154bf45a5eb7","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Eval Common Sense AI Systems","CreditHours":4.0,"Description":""},{"Id":"8ecf6315-a41d-4cda-849c-620d8f0688d6","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Visual Data For Smart Cities","CreditHours":3.0,"Description":""},{"Id":"949549dd-133f-4bd4-a69f-f8e51fbac597","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research Experience Ugrad","CreditHours":3.0,"Description":""},{"Id":"9d49c21c-e931-4ba7-a29f-3dd92cd31cc4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML Based Spatial Indexing","CreditHours":3.0,"Description":""},{"Id":"b5e8a38a-2e6d-4a78-b3ba-644a08f2bf40","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Evaluating Discourse Analysis","CreditHours":4.0,"Description":""},{"Id":"bb036744-8bd2-4106-ad72-b7dc1e6e1905","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Camera Database","CreditHours":3.0,"Description":""},{"Id":"bbab2325-794a-4cf4-a554-9145f027006a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Twitter Sentiment Analysis","CreditHours":3.0,"Description":""},{"Id":"bc8227fc-a629-4f8f-adf7-8c439255a92f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IoT Project","CreditHours":1.0,"Description":""},{"Id":"c4ab20bb-dbf7-43f5-a80a-5a4b127e5ee2","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Website For Network Cameras","CreditHours":3.0,"Description":""},{"Id":"c912a6cd-dbee-4cf1-afb8-e2a120a482a4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Preventing ROP With Intel MPK","CreditHours":3.0,"Description":""},{"Id":"cf9a29c0-66bb-4b45-859a-571f12cdd1e1","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Text Network ML Embeddings II","CreditHours":2.0,"Description":""},{"Id":"fc8e1646-5969-4005-a753-a8032ef35d83","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Parallel Video Processing","CreditHours":3.0,"Description":""},{"Id":"fd3e1ad2-0efd-4f68-b315-23a9451b8fa9","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Trends In Big Data Systems","CreditHours":3.0,"Description":""},{"Id":"fef538d9-85a3-44da-a56d-380f8619f7cb","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Applied Mach Lrng In Sports","CreditHours":3.0,"Description":""},{"Id":"0fdcb616-aa9c-4621-948b-1b6f5877edc0","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Location Data Management","CreditHours":3.0,"Description":""},{"Id":"3b95c64e-e895-4f8f-9552-3af9c5c1eedd","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Using Natural Language In ML","CreditHours":3.0,"Description":""},{"Id":"3c5d4635-0c4e-4ff7-8d00-d8112315d98d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Privacy In Public Databases","CreditHours":3.0,"Description":""},{"Id":"3d5e5194-e4b5-480b-9946-34fa59de1639","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Study Of Balls-And-Bins Probs","CreditHours":1.0,"Description":""},{"Id":"459ab227-aeb5-44cb-9455-1f7c0e892243","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Twitter Network Mining","CreditHours":3.0,"Description":""},{"Id":"4d624c9f-6263-4da1-962e-a636ac05187a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Dependable Wireless Networks","CreditHours":3.0,"Description":""},{"Id":"79a7708f-c310-46e9-95be-0d807c7407eb","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Big Data Management","CreditHours":3.0,"Description":""},{"Id":"97cb4786-56ad-4e6f-9f58-6fc6aaf97d82","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Emerging Technologies In CS","CreditHours":3.0,"Description":""},{"Id":"98f0bfcb-fce5-4edc-b97b-0d40cdec6149","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Indoor Localization II","CreditHours":3.0,"Description":""},{"Id":"a25f66ec-59cf-4a31-9175-5d8bdb8bb60e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer Networks","CreditHours":3.0,"Description":""},{"Id":"a4c2c26d-c652-4baa-8851-8ac05111a013","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Text Network ML Embeddings","CreditHours":3.0,"Description":""},{"Id":"b01db2b3-7dea-4473-835e-8373cfc841ee","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Mobile Development","CreditHours":3.0,"Description":""},{"Id":"b15daaa1-dc98-46f9-a46b-44fa6912d4d9","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Lean Scrum For Entrepreneurs","CreditHours":3.0,"Description":""},{"Id":"b8d64a42-9b78-483a-ac36-a23198c59767","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Evaluation Framework","CreditHours":3.0,"Description":""},{"Id":"bf92a57c-5ece-4656-8f88-00b6cb4fcbff","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Image Analysis For Phenology","CreditHours":2.0,"Description":""},{"Id":"c71eeb94-5843-4fcb-b3cf-9f6f85dc5149","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Methods Matrix And Networks","CreditHours":4.0,"Description":""},{"Id":"ce8bd69f-c8da-4184-b216-9b291ced47b5","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bounded Recoverability Codes","CreditHours":3.0,"Description":""},{"Id":"de37ed93-669e-4039-8c8c-ce9171c556f2","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Proof Theory","CreditHours":3.0,"Description":""},{"Id":"f896356d-a0d5-4a56-9937-09c216a637fd","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Crowd User Interface","CreditHours":3.0,"Description":""},{"Id":"69937e8f-7324-41c2-b007-b7d72d607fa8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"BIo Information","CreditHours":0.0,"Description":""},{"Id":"11a07eab-8c49-4983-a96c-ea355bd714b5","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"App Desgn & Analy For Ev Users","CreditHours":2.0,"Description":""},{"Id":"2971d850-8e9c-48a2-a464-b19daf5e9e01","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Web Development","CreditHours":3.0,"Description":""},{"Id":"5c2d7688-6a67-4ba8-8293-ef59b691999b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cross Platform App Development","CreditHours":3.0,"Description":""},{"Id":"ac4fcfd7-bac6-4882-a322-c6c11fb0e04e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cam II Data Retrieval","CreditHours":2.0,"Description":""},{"Id":"b63d6274-0243-4666-869d-48e1ef520869","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Predicting DDI","CreditHours":3.0,"Description":""},{"Id":"f741140c-e7f5-42c3-8a2a-ed7cdb83ad3c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Predict Drug-Drug Interaction","CreditHours":3.0,"Description":""},{"Id":"055176ac-e1a3-41d9-8599-14f69ef1d6b3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Automatic Side Channel Eval","CreditHours":3.0,"Description":""},{"Id":"095ea608-9549-461b-b6d3-9094af88ba5d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Camera Database","CreditHours":1.0,"Description":""},{"Id":"1fd021c6-0b5c-4a2c-9240-8bc4b21ad055","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Crowdsourcing Data Anotation","CreditHours":3.0,"Description":""},{"Id":"208801d3-eeda-47c7-b2ed-e6492df12f4e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Tanzania Virtual Svc Learning","CreditHours":1.0,"Description":""},{"Id":"22e4b1f0-3963-4528-8b1a-89f3e008ef45","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Modern Web Development Res","CreditHours":2.0,"Description":""},{"Id":"54a07726-ee97-420f-836f-e6a3df54b416","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Joint Embed Of Text & Networks","CreditHours":3.0,"Description":""},{"Id":"567a854d-7e3c-4be7-8a02-181ae75dd390","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Indoor Localization","CreditHours":3.0,"Description":""},{"Id":"70ea7851-4d3d-4657-bd82-90d56a25c3a0","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Stance & Reason Classification","CreditHours":3.0,"Description":""},{"Id":"7b012362-7e8c-4955-b586-aedb3e74bede","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Social Media Content Check","CreditHours":3.0,"Description":""},{"Id":"84692bb5-5296-4d3e-81b4-ef369c7932bb","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Driven Apprch/Polcy Mking","CreditHours":3.0,"Description":""},{"Id":"86dadcbe-2756-49b0-8fd0-8c45bb6c10fe","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinformatics Using Python","CreditHours":2.0,"Description":""},{"Id":"a792d874-9b96-4520-8745-558ad20e2f25","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Job Info Visualization","CreditHours":3.0,"Description":""},{"Id":"be4be1ff-181a-40c6-935f-63a56eb6001c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Emerging Topics & Basics Of CS","CreditHours":3.0,"Description":""},{"Id":"cc60e077-f2ed-4c6b-9398-96787174d3e0","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Learning Sentence Representat","CreditHours":2.0,"Description":""},{"Id":"0e0b5d85-5775-4854-9461-5edd241a89f1","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Systems Programming Project","CreditHours":3.0,"Description":""},{"Id":"144e81b0-db8d-40cf-8332-e7e122094f5a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Scalable ML For Genomics","CreditHours":3.0,"Description":""},{"Id":"1aefc32f-215f-40cf-908c-cc3aed4b2050","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Automated Fact Checking","CreditHours":3.0,"Description":""},{"Id":"1f619c49-29c7-4914-bf45-15f77a6ce0f4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Auto Input Gen For Mob Testing","CreditHours":3.0,"Description":""},{"Id":"33e817b1-1a54-4101-b0e1-91f3a477c984","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Development Techniques Res","CreditHours":3.0,"Description":""},{"Id":"345a8447-b205-4ae3-b7b7-22ec1050ea34","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Latch Free Data Structures","CreditHours":4.0,"Description":""},{"Id":"656e3c9d-cafa-45fa-a93a-db6f25d9860e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Systems Project","CreditHours":3.0,"Description":""},{"Id":"7237e60d-e1b8-436e-b867-cf7cba0e494b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinformatics Systems Project","CreditHours":3.0,"Description":""},{"Id":"7ef24dfa-b952-490d-97e1-de0c1309c8b6","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Identifying Events On Twitter","CreditHours":3.0,"Description":""},{"Id":"85aacb74-dcb8-4da0-9376-9d4722fedccd","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning For Genomics","CreditHours":3.0,"Description":""},{"Id":"be5152e3-1c17-4594-a5fd-8fbbb004aab0","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Aviation Machine Learning","CreditHours":3.0,"Description":""},{"Id":"cc6926c9-0cd7-4b08-ab75-4cdfdb6677e4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Engr Senior Project","CreditHours":3.0,"Description":""},{"Id":"fb6928f5-9598-4a9d-82e9-96020c8f3a2b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"NLP Research","CreditHours":3.0,"Description":""},{"Id":"ffb3607f-5090-439d-8f7a-85a921a4ba86","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Systems Language Project","CreditHours":3.0,"Description":""},{"Id":"4f82b059-0a33-46c6-b432-babb58df1f3b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Washington DC Practicum","CreditHours":3.0,"Description":""},{"Id":"f758b1c4-c176-43cf-9b62-39c3086132ee","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Health Info System","CreditHours":1.0,"Description":""},{"Id":"06b9ec6c-dfde-49fd-8cef-7ac2083c0217","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Comp Geometry","CreditHours":2.0,"Description":""},{"Id":"1d5682ee-4021-4af8-84a7-d4b2961d211c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security In Cloud Computing","CreditHours":3.0,"Description":""},{"Id":"3084347e-74e0-4d01-a8b8-0c4e4d71728d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Business App Development","CreditHours":3.0,"Description":""},{"Id":"43912468-c6b6-4d65-98ef-0edd29d3a117","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cluster Based Graph Data Mgmt","CreditHours":3.0,"Description":""},{"Id":"4c293fd3-00f8-462a-90ed-d2060b47e7cf","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning Embedded Comp","CreditHours":0.0,"Description":""},{"Id":"504e984d-2a8f-4069-8e74-b2a65e36ca5b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IoT Internet Of Things","CreditHours":3.0,"Description":""},{"Id":"531e37d2-4bfe-4927-b234-1e2382cb2a09","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IoT Research Project","CreditHours":3.0,"Description":""},{"Id":"77bbc082-f8a8-404b-85e5-f0d31baf5b66","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Ethics And Philosophy Of Info","CreditHours":3.0,"Description":""},{"Id":"7e23a3df-9dea-4fe9-8406-0181041ded64","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mach Learning On Financial Mkt","CreditHours":3.0,"Description":""},{"Id":"ab7d702f-5434-4030-9f37-e9a23ecc5126","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Health Information System","CreditHours":0.0,"Description":""},{"Id":"b63aba60-387e-49a8-9d8b-8bec1d27f785","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"NLP Rrsch With Prof Goldwasser","CreditHours":3.0,"Description":""},{"Id":"b82773bd-4775-4c27-aa88-36eaecbf1e3a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded Visn & Mach Learning","CreditHours":3.0,"Description":""},{"Id":"b92bb501-6abf-426f-b517-d060ba13f2e4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security In Crowd Sourced Sys","CreditHours":3.0,"Description":""},{"Id":"c8cfac74-c462-433c-8b5a-187bac192322","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Universal Handsfree","CreditHours":1.0,"Description":""},{"Id":"df92ce5b-f69b-4f78-a5f3-4df300974dea","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Wireless Mesh Network Design","CreditHours":3.0,"Description":""},{"Id":"f376bfa8-655a-4ca3-96dc-71cf462f554a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Neurological Pattern Research","CreditHours":2.0,"Description":""},{"Id":"06f9524f-6cd8-4735-8a2f-bdc70ae51d2f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Facebook Open Academy","CreditHours":3.0,"Description":""},{"Id":"14ac938c-a9db-4c6c-bc71-c8338f86146b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Object & Movement Detection","CreditHours":0.0,"Description":""},{"Id":"6810ef73-4876-4a3d-ab13-ebd2a674509d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Approach To Humanlike AI Voice","CreditHours":3.0,"Description":""},{"Id":"76e2212b-44ec-44b8-a002-0eb40c56bf25","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Big Data Sys Senior Design Prj","CreditHours":3.0,"Description":""},{"Id":"98aa688d-ba2b-4368-a51f-053721e07ad9","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Social Network Mining","CreditHours":3.0,"Description":""},{"Id":"98c0fd10-b69a-4d8c-9ca6-9847ef763cd0","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Image Assn With iOS Calendars","CreditHours":4.0,"Description":""},{"Id":"a9ff86ec-dd20-4806-83e8-40088559ad43","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Principles Of Web Development","CreditHours":1.0,"Description":""},{"Id":"b03c5109-92d3-4b5f-9b18-f307ff83e461","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Object Identification","CreditHours":3.0,"Description":""},{"Id":"c42c960c-885d-40b0-bb2a-efb982446d8e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Using EEG To Assess Workload","CreditHours":3.0,"Description":""},{"Id":"df1a3373-ce95-4404-90d4-bcd5449595c4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning For Fmri","CreditHours":3.0,"Description":""},{"Id":"fae67653-e8cb-4dca-9634-c7003b711d06","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Big Spatial Data Processing","CreditHours":3.0,"Description":""},{"Id":"9ac0e3b4-fa5f-4ff8-8567-f53fdf4f030f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Patient Provider Communication","CreditHours":3.0,"Description":""},{"Id":"bfdeb62e-e9a6-45d2-9170-1d3e72399472","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Fluid Simulator","CreditHours":3.0,"Description":""},{"Id":"08536e0a-6eac-467d-8b0a-ea0c07855cf5","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Physically Based Simulations","CreditHours":3.0,"Description":""},{"Id":"3b33043d-3c12-42ce-a7c9-e54b8aa4a7c4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded System Project","CreditHours":3.0,"Description":""},{"Id":"64526bea-d017-4d6f-b0e5-cf6db486282d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Systems","CreditHours":3.0,"Description":""},{"Id":"699dbb66-4b1b-4ee1-81c9-6fd52434f029","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"An Educational Password Game","CreditHours":3.0,"Description":""},{"Id":"6f25986e-6083-49b4-90a7-b59fb3c382ff","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Protein Modeling III","CreditHours":3.0,"Description":""},{"Id":"75e5f470-d0e9-407e-8232-e7acbe88c2c5","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"3D Sketching Tool","CreditHours":3.0,"Description":""},{"Id":"78cbbb04-b4dd-4cb1-a3c8-9b9765366a82","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Agile Proj Coord And Peer Eval","CreditHours":3.0,"Description":""},{"Id":"8dbcdd41-78bd-4ff0-aab4-539b47238e3d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Senior Project","CreditHours":3.0,"Description":""},{"Id":"8ff182cf-4387-45ca-b711-501dd6b08e1e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Iseek Game Development","CreditHours":4.0,"Description":""},{"Id":"97b4cfa4-9cc7-417b-8206-0b1d25d8e350","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Semantic Web Data Management","CreditHours":3.0,"Description":""},{"Id":"9c0499d4-bba0-4407-b4b0-5b31d428dd80","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Digital Literacy","CreditHours":0.0,"Description":""},{"Id":"a9614b96-0a4f-4379-bc79-c6589901d87e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Inter-Datacenter Communication","CreditHours":3.0,"Description":""},{"Id":"cdf5e9bc-d327-4e6a-8c47-f5bc540fd9d2","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Real-Time Hackathon Platform","CreditHours":1.0,"Description":""},{"Id":"d771d8ec-88ec-44f8-82cf-72d6e1288d56","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Transfer Learning In Networks","CreditHours":3.0,"Description":""},{"Id":"11fb9399-af4f-4cbd-b39a-653a1f15cd14","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Testing","CreditHours":3.0,"Description":""},{"Id":"30fa98df-074b-49d3-aab6-da5626826033","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computational Proteomics","CreditHours":2.0,"Description":""},{"Id":"34a9fbac-c1af-4695-a227-7611867e0365","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Biol Appl Information Theory","CreditHours":2.0,"Description":""},{"Id":"5cde210f-12d5-43dd-b4c1-9f4923a4f352","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Embedded Systems","CreditHours":3.0,"Description":""},{"Id":"99ff49dc-7efd-46f5-8399-7c29b2df6541","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Discovery Of Network Sensors","CreditHours":3.0,"Description":""},{"Id":"b29f6b46-611f-400e-820f-cbbe1a1e8b39","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adaptive Publish Subscribe","CreditHours":3.0,"Description":""},{"Id":"dd82ee0e-bbb1-4be6-867b-e3bfbba1968f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Open Stack Deployment","CreditHours":1.0,"Description":""},{"Id":"ec81f65e-3472-418f-8117-4be654a0d255","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Shared Shadow Maps","CreditHours":3.0,"Description":""},{"Id":"f0b48bd9-335f-4812-a470-d3f150b46f10","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Extract Patterns From Big Data","CreditHours":3.0,"Description":""},{"Id":"0b16ec89-b722-4905-a4fa-f48ea5cc7fdc","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Spatiotemporal DB Benchmarking","CreditHours":3.0,"Description":""},{"Id":"464c423f-ee10-4837-8ae3-54daf67c7dd1","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Networked Embedded Systems","CreditHours":2.0,"Description":""},{"Id":"642a5610-bfd5-4b36-a568-fee462969ef2","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Protein Modeling II","CreditHours":3.0,"Description":""},{"Id":"82d948e2-3be1-4334-99c4-d59ad2b59574","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer Security Topics","CreditHours":3.0,"Description":""},{"Id":"95fa33ed-786c-4dfe-b6e4-1747fcb97820","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Granular Dynamics Simulation","CreditHours":3.0,"Description":""},{"Id":"c6dfcbfb-68dc-42bf-9f44-a61317197efc","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Failure Aware Programming","CreditHours":3.0,"Description":""},{"Id":"06b37030-27f6-4228-80c3-3339a8ef41e3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Networking Research Project","CreditHours":3.0,"Description":""},{"Id":"25cdc68a-6a5c-4daa-960c-654d7bfbc37e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Predicate Switch Technique","CreditHours":2.0,"Description":""},{"Id":"40e7bd74-2921-4fbb-b90e-eb8aa716d551","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Networking Design","CreditHours":3.0,"Description":""},{"Id":"529f7a8b-dd6a-47dd-b04f-fd009dcbcf26","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Software Testing Res","CreditHours":3.0,"Description":""},{"Id":"72ac0d4e-41af-4f2e-8d37-20fe3ced59ce","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Probabilistic Graphical Models","CreditHours":3.0,"Description":""},{"Id":"7c2d7911-6b6b-4c32-9812-278a22142485","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Apple Security Protocols IOS","CreditHours":1.0,"Description":""},{"Id":"1589dc94-512e-46c0-892f-2419efeb72cf","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"International Software Engr","CreditHours":3.0,"Description":""},{"Id":"1e04e553-ef78-4e24-acf1-2d9842967825","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Enhancement Sr Proj","CreditHours":3.0,"Description":""},{"Id":"2043fff1-a527-46ae-9d6a-62708c96fe0c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Winterization Dms Senior Proj","CreditHours":3.0,"Description":""},{"Id":"3270e16f-4bcf-4285-bb8c-b2271fd55895","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Authority Publishing Platform","CreditHours":3.0,"Description":""},{"Id":"49bc800a-d470-4605-8147-166f55c4dc82","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In CS","CreditHours":0.0,"Description":""},{"Id":"516fb1ad-097b-470f-b80f-3e04ff8cda5c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Predicate Switching Technique","CreditHours":3.0,"Description":""},{"Id":"5709ca9e-d18d-4bb3-bb3f-ef68dddf7506","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Campus Information System","CreditHours":3.0,"Description":""},{"Id":"69637207-398f-44d8-8df6-62ae9d910140","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Android Social Networking App","CreditHours":3.0,"Description":""},{"Id":"939db717-df6c-414e-8fa1-7324a71e282e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Time Service For Turret","CreditHours":2.0,"Description":""},{"Id":"a8fdad80-30c3-4a58-b65d-4639d4eb6801","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Scrum Software Dev Research","CreditHours":3.0,"Description":""},{"Id":"b2f2860a-ab64-4030-8625-b898add75244","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web And Mobile Startups","CreditHours":3.0,"Description":""},{"Id":"b4d11d68-4d60-4c6b-acb1-598a92b99441","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Media Sharing Visualization","CreditHours":3.0,"Description":""},{"Id":"f374dac9-5e2c-413e-986a-c4523d47ae35","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Comp Protein Analysis","CreditHours":3.0,"Description":""},{"Id":"f5646181-234f-4fb3-93b1-89e6b42125fe","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Molecular Modeling","CreditHours":2.0,"Description":""},{"Id":"aa8d07dc-cb60-4638-9c57-4b76ea214d82","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile App Using Version Crl","CreditHours":3.0,"Description":""},{"Id":"d525fc47-e45f-42d2-a30f-56ce4b9aae50","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Testing & Inspection","CreditHours":1.0,"Description":""},{"Id":"0031d823-b734-49d1-93ca-f9d004af9dcc","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Text Mining","CreditHours":3.0,"Description":""},{"Id":"06c38a91-9633-4f69-a26a-22a5e41c4fd5","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Home Automation Senior Project","CreditHours":3.0,"Description":""},{"Id":"0d713902-d5f5-40d5-be78-0d25a1e9e9b6","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Ide For Android Devices","CreditHours":3.0,"Description":""},{"Id":"0f4ad352-be98-4ed9-a167-ad49824ef18b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Finding Attacks With Gatling","CreditHours":3.0,"Description":""},{"Id":"1a602dac-cfd8-4942-b2eb-3f2c74347080","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Tag","CreditHours":3.0,"Description":""},{"Id":"1dcdf0ee-cdbc-4a6d-ad64-2e4fb66b7e68","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Item Locn Finder App Sr Proj","CreditHours":3.0,"Description":""},{"Id":"23f3e3f6-3880-4c7d-80b3-961dd4737e73","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Crossplatform Multiplayer Game","CreditHours":3.0,"Description":""},{"Id":"41e9f929-4d75-4744-bed5-dba9864913c2","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Julia For Scientific Computing","CreditHours":3.0,"Description":""},{"Id":"4634c172-97ae-44dc-b2c6-a88abde34921","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Platform Indep Dynamic Game","CreditHours":3.0,"Description":""},{"Id":"512399eb-8209-4768-86b8-af94cdd13dae","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cert-less Encryption Schemes","CreditHours":3.0,"Description":""},{"Id":"52306a52-fddd-43d5-b316-4d8d74e22096","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Soft Specialized Parallel Arch","CreditHours":3.0,"Description":""},{"Id":"58778543-2f75-45e3-825f-14567d39090d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sw Engr Testing & Inspection","CreditHours":3.0,"Description":""},{"Id":"7e5c543e-cb35-4add-97cb-6211b02ae8ad","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mathematical Software Devpment","CreditHours":3.0,"Description":""},{"Id":"927f6d53-e80f-4dc0-9b72-0750f5ea145a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Engr Scrum Mgmt","CreditHours":3.0,"Description":""},{"Id":"9dda3944-5a0c-4dad-ab5e-24ba59e74bb5","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Comp Molecular Geometry","CreditHours":1.0,"Description":""},{"Id":"b00206fd-6129-4512-9b63-03bfb2537cac","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Vehicle Performance Analysis","CreditHours":3.0,"Description":""},{"Id":"b349f3df-40c2-4cf0-968b-f4fc207daf9b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Synchronized Progress Mgmt","CreditHours":3.0,"Description":""},{"Id":"b4d35944-51d9-452a-b496-be9d3e6f3302","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Analyzing Webcam Streams","CreditHours":3.0,"Description":""},{"Id":"b726ed47-ff2b-4408-96c7-9b6c0fd6844e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Customizable Data Senior Proj","CreditHours":3.0,"Description":""},{"Id":"d7710bd9-e303-458a-bdb4-c12565f0e0de","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Interactive Appearance Editing","CreditHours":3.0,"Description":""},{"Id":"d7a0d5da-2afa-4526-8522-a811fd2712c4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Based Application System","CreditHours":3.0,"Description":""},{"Id":"e6b9827b-d892-4346-9982-ab0d7cbb0807","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reverse Engineering","CreditHours":3.0,"Description":""},{"Id":"181fce1e-c3ce-43fc-9ffa-eb42514e4d1e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Information Retrieval","CreditHours":3.0,"Description":""},{"Id":"215f05b6-4794-482d-8cb0-945f5e2a0353","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Procedural Urban Modeling Lod","CreditHours":1.0,"Description":""},{"Id":"325438f7-106a-47a3-9ad0-2d27ac6d5e59","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Part-Time Prof Experience-CS","CreditHours":1.0,"Description":""},{"Id":"474ead86-32d3-4c4d-b6e8-d79521633ca0","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Detecting SW Vulnerabilities","CreditHours":2.0,"Description":""},{"Id":"5bf59bab-9bba-4479-b507-4fd27b59d4a6","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sw Engr Sr Proj Agile Method","CreditHours":3.0,"Description":""},{"Id":"63513daf-6597-410a-aed5-311c1726f56d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Comp Protein Str Study","CreditHours":3.0,"Description":""},{"Id":"7265ca1b-0086-401c-9b94-caeb83c0c5ad","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Program/Data Sonification","CreditHours":3.0,"Description":""},{"Id":"b19c6caa-fa2d-421a-af5b-cc51a0a7b96e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile And Cloud Tech Sr Proj","CreditHours":3.0,"Description":""},{"Id":"c72dcf32-b600-4f2e-84d0-88f38bc307bd","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile App Development","CreditHours":2.0,"Description":""},{"Id":"d3eae64f-fe69-4d26-9eca-7acae6efaf9a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Stat Network Bioinformatics","CreditHours":3.0,"Description":""},{"Id":"e4918e22-4b1c-40b9-a094-d05eecc95647","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Automatic Differentiation","CreditHours":3.0,"Description":""},{"Id":"0c4e803a-e9e7-4c02-9c4f-8e6fb6139d23","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"HCI: New Approach To Education","CreditHours":3.0,"Description":""},{"Id":"2a51eec4-bd42-457a-8a6a-61ecfdd1e0e0","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multi-Tier Application Design","CreditHours":3.0,"Description":""},{"Id":"4b94533d-9ea4-43c5-a7c1-a0379e34fbd0","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Rendering Large Uran Models","CreditHours":3.0,"Description":""},{"Id":"7dd474be-25c1-4e7b-a5a3-1ad254d022b9","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Spatial Data Management","CreditHours":3.0,"Description":""},{"Id":"d57ce825-95b3-40c3-834b-6c59c82a3b6a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Eng Sr Project","CreditHours":3.0,"Description":""},{"Id":"06c7ef4c-5929-4a0a-afe2-0f042c04bbb5","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Part-Time Prof Exp-CS","CreditHours":1.0,"Description":""},{"Id":"0bf36c12-a490-490a-a847-2ef1e1f0d3d6","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Human-Computer Interaction","CreditHours":3.0,"Description":""},{"Id":"4163a81d-91dd-4d6a-9d30-c70dfc9bcf8c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Edu Music Game Development","CreditHours":3.0,"Description":""},{"Id":"559092d5-ecb3-49e1-829c-504d6c50cb5d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Secure Image Repository","CreditHours":3.0,"Description":""},{"Id":"5591e43f-8f03-47db-8c9e-1e0076d23c73","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Relational Vs OODBMS","CreditHours":3.0,"Description":""},{"Id":"67e95c6f-0770-42da-8feb-fba3fb3bfd7e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intl Development Project Teams","CreditHours":3.0,"Description":""},{"Id":"94d92f21-fece-4a45-bde0-e8a0185f23a8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Undergrad Research","CreditHours":0.0,"Description":""},{"Id":"99115439-8044-4068-8e3c-a4a1737437c3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Gesture Based Contrl Interface","CreditHours":3.0,"Description":""},{"Id":"abaac3ac-c055-4f78-b4b7-a964755f0bd0","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Voronoi Tessellation Project","CreditHours":3.0,"Description":""},{"Id":"abafed19-a0a3-48a6-b1d2-cb54e7b2bcf4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Senior Software Engr Project","CreditHours":3.0,"Description":""},{"Id":"b90b7d7c-35ef-4773-b84a-753398584637","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software For Embedded Systems","CreditHours":3.0,"Description":""},{"Id":"d63c9e07-1ca9-4be9-8176-ab22733b9ee2","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"E-Ledger Money Manager Plugin","CreditHours":3.0,"Description":""},{"Id":"0de5398b-11bf-4559-98dc-91bbf4845df4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Structural Bioinformatics","CreditHours":2.0,"Description":""},{"Id":"1847a1a4-580e-4c1b-8faa-508f9a8192a4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Tablet PC Computing","CreditHours":3.0,"Description":""},{"Id":"1d771798-463c-47e4-b8d3-02bf6aa20ce8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"HCI Projects","CreditHours":3.0,"Description":""},{"Id":"265564ff-92f7-4362-a689-340754a62087","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Tablet Pc Computing","CreditHours":2.0,"Description":""},{"Id":"6182cec7-7b09-4f99-ae19-12022db9bc28","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multicore Programming","CreditHours":3.0,"Description":""},{"Id":"7d088885-5367-4685-8a8e-74f72b510c36","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Vulnerability Detection System","CreditHours":3.0,"Description":""},{"Id":"7ee1ffcc-3e70-4e96-9347-72d53b2d99da","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Interactive Web Widget Builder","CreditHours":3.0,"Description":""},{"Id":"9e53670d-d385-45a5-b2d2-2bb0bba8079a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Android For Freshman","CreditHours":1.0,"Description":""},{"Id":"a53bc3f4-d4a7-461a-a268-d5c6b2f0bdd7","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer Security","CreditHours":3.0,"Description":""},{"Id":"a8d5ae78-cc13-4043-abed-5657715dbb99","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Protein Structure Database","CreditHours":2.0,"Description":""},{"Id":"b3fb5ee6-3068-4736-bb17-06cb811d9370","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning For Twitter","CreditHours":3.0,"Description":""},{"Id":"c7dbc539-a884-479a-838c-b6089801e5e8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Style Mining","CreditHours":3.0,"Description":""},{"Id":"c90734bc-9062-4255-a761-76a87c6909f8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Interactive App Development","CreditHours":3.0,"Description":""},{"Id":"0c255a69-1166-4e6d-8f3a-8c72f4463cd1","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Architecture","CreditHours":3.0,"Description":""},{"Id":"7a2f7247-ff50-412a-9924-641c8abdc866","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Interfaces & Hardware Sensors","CreditHours":3.0,"Description":""},{"Id":"87a560f0-90a9-4e8a-8f6a-bbacaae3461b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Part-Time Prof Experience","CreditHours":1.0,"Description":""},{"Id":"d2c83172-c14c-4596-8469-cb578a632242","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Comp Protein STR Analysis","CreditHours":3.0,"Description":""},{"Id":"d2ed40f5-6ea5-4a22-a60f-cf63f0bd3eea","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Indep Study Systems Servers","CreditHours":4.0,"Description":""},{"Id":"f67f54c7-9fde-4fb4-8468-37a714f8d185","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning In Bioinfo II","CreditHours":2.0,"Description":""},{"Id":"09370dd9-ae3b-40df-8489-033620b8e04f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Ios Multimedia App","CreditHours":4.0,"Description":""},{"Id":"0c1ca8ca-70ef-413b-bffa-ec552fe05388","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"HCI Issues And Implementation","CreditHours":3.0,"Description":""},{"Id":"2f140433-8370-453b-bbcd-5f2cbd4b136b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Protein Str Bioin For Matics","CreditHours":2.0,"Description":""},{"Id":"441067ab-2d2b-42ed-84e5-4e87b98e726f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Image Based Vision Correction","CreditHours":3.0,"Description":""},{"Id":"4862e6fe-7d7f-4e10-8a17-3419a2115264","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"SAN Over UDP Design Analysis","CreditHours":5.0,"Description":""},{"Id":"63150dc1-f404-46e2-ba4e-7fcca7e7e8b8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Java Persistence Frameworks","CreditHours":3.0,"Description":""},{"Id":"726f7e4d-5c84-43df-aea0-7b2655ee2491","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Robust Computational Geometry","CreditHours":3.0,"Description":""},{"Id":"77ec28f5-87b6-4d16-bce9-96a1294131eb","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Relational VS OODBMS","CreditHours":3.0,"Description":""},{"Id":"8a4d6f6f-9576-48fd-920e-caffd2c5b85d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Relational Vs Oodbms","CreditHours":2.0,"Description":""},{"Id":"9a3b2b6f-f547-4eaa-81a4-9e5fc33d9a9d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Security","CreditHours":5.0,"Description":""},{"Id":"a9909331-3b88-4779-80ab-7c90d62fe4cd","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Prog Cluster Computing","CreditHours":3.0,"Description":""},{"Id":"b18a36da-4ae1-4876-ba42-174860990886","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Docking Quality Assesment","CreditHours":2.0,"Description":""},{"Id":"eac0f467-bca6-44b2-8058-108a1b4c9b08","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Methods Tchg Computer Science","CreditHours":3.0,"Description":""},{"Id":"f2184c4b-d762-4ce5-b8a4-cce86cc3b19f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Fast Tree Rendering","CreditHours":1.0,"Description":""},{"Id":"11207c2e-acfa-435c-9dbd-b6a9ed360e6f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer Graphics Research","CreditHours":3.0,"Description":""},{"Id":"3d078c0e-4e28-4779-ad24-2e41320f712f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Location Based Access Control","CreditHours":3.0,"Description":""},{"Id":"3ee562a9-9f98-4b3f-a57b-c365c0b2e500","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Syst Blind/Hrng","CreditHours":3.0,"Description":""},{"Id":"6bb54503-343d-45e5-9a46-e35d0116e883","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Parallel Processing Research","CreditHours":4.0,"Description":""},{"Id":"6e1ba11f-42ca-4deb-8f2f-dd713f592bd4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Comp Protein Docking","CreditHours":2.0,"Description":""},{"Id":"6f2b085e-aa99-4960-8897-817e16a76c3c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Educational Graphics Droids","CreditHours":3.0,"Description":""},{"Id":"773c6059-5293-4416-8f23-5e5b72a7c7ac","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Xinu Os Dev Project","CreditHours":3.0,"Description":""},{"Id":"7ffac87f-e72e-4956-83f0-c2bdaa44c707","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Gene Function Prediction","CreditHours":4.0,"Description":""},{"Id":"806a9863-59e2-42a8-963e-e2b729a88c6b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Protein Shape Analysis","CreditHours":3.0,"Description":""},{"Id":"9555f7f6-328f-46e1-acbf-d41ee4cee55f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Oblivious Access Control","CreditHours":3.0,"Description":""},{"Id":"a32539c6-91f1-4bb4-bb48-64935a71583b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinformatics Project","CreditHours":3.0,"Description":""},{"Id":"c9d0a3ce-ff85-433d-9838-e3b663fa5662","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Comp Gene Functn Prediction","CreditHours":3.0,"Description":""},{"Id":"cbfd6311-e769-4f61-a587-ffeada92bf84","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Interactive Cities & Trees","CreditHours":3.0,"Description":""},{"Id":"d1efcd93-7616-4b4b-9545-0ba37c3bca9b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Computer Graphics","CreditHours":2.0,"Description":""},{"Id":"e4dbb934-6b9b-476f-95e2-97be5dfbdf34","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learing In Bioinfo","CreditHours":2.0,"Description":""},{"Id":"ff955837-cfa5-4714-93d0-eb7cba1166f3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Image-Based Vision Connection","CreditHours":3.0,"Description":""},{"Id":"296c8bd3-9108-410b-96bb-d0c6c8dbdd38","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Using Persistent Java","CreditHours":3.0,"Description":""},{"Id":"3afd9716-3d8b-440d-a3cc-efe27cb585f9","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Gene Sequence Analysis","CreditHours":3.0,"Description":""},{"Id":"5fcefec4-f743-424a-a831-44fa7c470573","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Simmetry Game Web Service","CreditHours":3.0,"Description":""},{"Id":"614324f2-4a45-47b6-959c-ad9646327f21","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Interaction Types","CreditHours":3.0,"Description":""},{"Id":"9fae2e95-6bc5-4b61-91bc-035410118004","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Pgmg & Sw Architecture","CreditHours":3.0,"Description":""},{"Id":"b52eb8f9-7ea1-49a2-899a-74bc651a7dac","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Development Scripting","CreditHours":3.0,"Description":""},{"Id":"6c8e0309-1780-4fda-914d-4eeb014f6b64","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"View Splicing For AR Collab.","CreditHours":0.0,"Description":""},{"Id":"4ab38b24-8147-4e1e-92ad-bda5a21c9c85","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"View Splicing For AR Collab","CreditHours":0.0,"Description":""},{"Id":"bdb0718e-0e14-425e-84f1-350e77214129","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"MITRE Embedded CTF","CreditHours":0.0,"Description":""},{"Id":"d2f349a3-b3bb-409a-b6e3-f719145d6eeb","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Undergraduate AI Research","CreditHours":0.0,"Description":""},{"Id":"e47147ed-6b0d-4fa3-991a-6c2a3fa4f602","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Independent Study","CreditHours":0.0,"Description":""},{"Id":"a5b74842-269a-4d13-a601-6632ae3f1662","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ERD Diagrams","CreditHours":0.0,"Description":""},{"Id":"884d571b-fe00-45a6-ad5e-6bcef9028571","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Programming Languages Research","CreditHours":0.0,"Description":""},{"Id":"aaa4db13-ad93-4e20-84dd-78532c0e75f8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Automatic Plagiarism Analysis","CreditHours":0.0,"Description":""},{"Id":"9f1478b5-0e98-4d01-a8cd-ed197a767777","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Text Visualization","CreditHours":0.0,"Description":""},{"Id":"7a74d57b-aacb-4b1e-99f7-bc9f2df3c178","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"NextGen Mobile Core Research","CreditHours":0.0,"Description":""},{"Id":"77be60e7-f8fc-4859-a973-ac9b1f42e7a9","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"BLE Health Profile Security","CreditHours":0.0,"Description":""},{"Id":"80e793c0-e0c3-4523-91e0-72bd1978fba3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Research","CreditHours":0.0,"Description":""},{"Id":"a451a5b3-6f4b-4b8a-b9eb-012d5fc3cfa7","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research AI For Software Engr","CreditHours":0.0,"Description":""},{"Id":"ae930640-fc6f-4a13-b3ed-b742a3008586","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"UG Mentored Research","CreditHours":0.0,"Description":""},{"Id":"b755a985-8f32-4d75-abb5-84c0769e4003","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML For Disease Diagnosis","CreditHours":0.0,"Description":""},{"Id":"35eefa31-6ef5-461d-ad5e-5f614d65350c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Collision Detection RT Cores","CreditHours":0.0,"Description":""},{"Id":"4d25c242-f5f2-4f92-b5e9-7a40f3b79b32","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Plagarism Detection Research","CreditHours":0.0,"Description":""},{"Id":"702791d0-fb4c-47fc-b1be-ea43df7e2294","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI/ML Research","CreditHours":0.0,"Description":""},{"Id":"8b0c36f8-4251-47bf-a51d-f6a29f765506","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Generative AI In Education","CreditHours":0.0,"Description":""},{"Id":"93fc7a96-4fe8-47b9-a366-557dc5f95bb3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Analyzing In Class Quizzes","CreditHours":0.0,"Description":""},{"Id":"c12cf2aa-dff0-45d5-be30-5572915407be","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Traffic Analysis","CreditHours":0.0,"Description":""},{"Id":"268205a2-606e-4bdb-9725-d44b4ec4cd01","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Undergraduate Research In AI","CreditHours":0.0,"Description":""},{"Id":"2203a2ed-093f-4397-8d21-7d2790b4f6f6","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"NoSQL And Cloud Databases","CreditHours":3.0,"Description":""},{"Id":"06b08ae9-a8b2-4064-9bc2-11d371126b5d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Coverage Types In PBT","CreditHours":0.0,"Description":""},{"Id":"6332faf4-d236-49da-83c9-54e6409d344d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intelligent Robotics Research","CreditHours":0.0,"Description":""},{"Id":"74893647-2a1d-4c2e-9c2d-50e331df32b8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning Research","CreditHours":0.0,"Description":""},{"Id":"97e72415-3dc1-4e6b-9cb5-3a185ff1ff50","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Binary Hardening","CreditHours":0.0,"Description":""},{"Id":"83157932-a41a-45f0-9eef-28c0b97b51ac","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Robot Learning Research","CreditHours":0.0,"Description":""},{"Id":"aca55f4b-359f-49f5-9715-63b71546c566","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI For Amyloid Str Prediction","CreditHours":0.0,"Description":""},{"Id":"10a880f1-6d87-4ddc-8b1f-da2c057654f4","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Generative AI Research","CreditHours":0.0,"Description":""},{"Id":"c357bb61-fad6-44a2-baea-83e2d26edf70","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Studies In Theoretical ML","CreditHours":0.0,"Description":""},{"Id":"fed399c4-5ea5-46e6-a330-e401b185044b","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Undergrad Research Assistant","CreditHours":0.0,"Description":""},{"Id":"0c6a90d8-03f3-47f3-ba9e-c1b60d209062","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"LLMs For Software Security","CreditHours":0.0,"Description":""},{"Id":"7d8b073e-bf76-4701-a0ef-2654f0cf6ba0","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"User Interfaces Using React","CreditHours":0.0,"Description":""},{"Id":"e36b23e2-6821-44e0-b4ec-2d1e20910c8e","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Congestion Control Analysis","CreditHours":0.0,"Description":""},{"Id":"6f0186d2-b129-44ed-a4cb-5e499afef377","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Independent Study/Research","CreditHours":0.0,"Description":""},{"Id":"d4d5154b-8b56-413c-959f-2602f54f6aa0","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"HoloGNN Research","CreditHours":0.0,"Description":""},{"Id":"d762cf8e-7c1d-4236-a820-4e792938cac1","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded System Applications I","CreditHours":0.0,"Description":""},{"Id":"92347ba7-34e5-4d35-b157-94a2abdd9be1","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer Vision Research","CreditHours":0.0,"Description":""},{"Id":"f9b77453-8761-4e34-af3f-75264ddbaa73","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"CoMMA Lab Research","CreditHours":0.0,"Description":""},{"Id":"377b0268-b212-4cbf-aac3-f736a5bf84c0","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Stock Market LLM Interaction","CreditHours":0.0,"Description":""},{"Id":"53b51c30-1289-473b-ba72-72ef8251211f","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computing Education Research","CreditHours":0.0,"Description":""},{"Id":"5e7d0a06-c856-4a40-aa1a-ea698465b084","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Applied GenAI Research","CreditHours":3.0,"Description":""},{"Id":"83fb6cb6-03f6-4652-a43e-b0aec6121667","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"KiharaLabs B Amyloid Research","CreditHours":0.0,"Description":""},{"Id":"db912ab7-2a79-40c7-9180-9745144b17d2","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Digital Twins In Agriculture","CreditHours":0.0,"Description":""},{"Id":"3164f34a-465c-4b39-8c4a-9d3bcae48ea3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Generation & Processing Of ERD","CreditHours":0.0,"Description":""},{"Id":"916c6a35-52eb-4f57-8214-eb39590ad2bc","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"UG Menotored Research","CreditHours":0.0,"Description":""},{"Id":"2504e745-261d-4a45-ad42-75815abe492a","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Language Modeling Research","CreditHours":0.0,"Description":""},{"Id":"d9949bbc-9004-489b-81f6-019737ce49ee","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"RLHF Research","CreditHours":0.0,"Description":""},{"Id":"e99ff284-2f92-4046-a61d-54de7dceaa9d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Location Aware LLM Data System","CreditHours":0.0,"Description":""},{"Id":"da6ac136-4eb0-4264-b01b-cc2c6928c093","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Extended Reality","CreditHours":0.0,"Description":""},{"Id":"af586c10-272a-4aca-8498-b1e8b1dcbc60","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"RLHF In LLMS","CreditHours":0.0,"Description":""},{"Id":"fbf0b5a0-a8f4-4998-a688-8acb62800fbc","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Human-Centered AI Agents","CreditHours":0.0,"Description":""},{"Id":"9b7b79a6-9300-44af-ba0a-414836249a9d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Natural Language Processing","CreditHours":3.0,"Description":""},{"Id":"e29c2378-fff8-4554-9f52-f374760b4ed1","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Security Research","CreditHours":0.0,"Description":""},{"Id":"a8a7775b-da81-4c5c-85c9-f1b5d79ffbe8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Based Molecular Modeling","CreditHours":0.0,"Description":""},{"Id":"0cfc052f-d4ae-4f05-a42b-b141fdaff5fe","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Computer Graphics","CreditHours":0.0,"Description":""},{"Id":"a3793abe-abd4-4bc6-846b-fa9cf29d856d","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Human AI Partnership Models","CreditHours":0.0,"Description":""},{"Id":"edab5fa5-575b-44f6-bb96-59355a2c0059","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Model Based RL Research","CreditHours":0.0,"Description":""},{"Id":"76f267de-5f5b-4750-b49a-b2ba62680b21","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded CTF","CreditHours":0.0,"Description":""},{"Id":"bb7cb307-331d-43e4-b2e3-7c40770a6bd3","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Independent Research","CreditHours":0.0,"Description":""},{"Id":"6ac4476d-557a-4aae-beaf-aa7073376e5c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"CoRAL Lab Research","CreditHours":0.0,"Description":""},{"Id":"30b1caf3-eb76-4543-9054-e098e45aedcc","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multi Agent SAR Research","CreditHours":0.0,"Description":""},{"Id":"05a075c1-6a59-45b6-88ae-ad3ae0ba83bb","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multi Agent Robotics","CreditHours":0.0,"Description":""},{"Id":"c7d77d28-6825-4dec-8195-b4cb785928f2","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Vector Database Research","CreditHours":0.0,"Description":""},{"Id":"cef642bf-17ed-4194-836c-f36c0d7ca280","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Physics-Informed ML For Drones","CreditHours":0.0,"Description":""},{"Id":"9bcd4d2a-82d1-429f-a83f-94bf33c66b0c","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research In Machine Learning","CreditHours":0.0,"Description":""},{"Id":"a8dddff2-db5f-46f0-ad61-a99cdba8ab27","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deep Learning Peptides","CreditHours":0.0,"Description":""},{"Id":"b16d283e-585a-4450-9f22-419e1533f807","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"STyGIANet Networking Research","CreditHours":0.0,"Description":""},{"Id":"dd22bd22-524d-445e-98a5-592f5dc4dff8","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Language Modeling","CreditHours":0.0,"Description":""},{"Id":"ff7f746c-49d8-4370-a4de-3ee6ce6113df","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IDEAS Lab Research","CreditHours":0.0,"Description":""},{"Id":"14b279d3-35f7-49a3-9196-adcfa2134d03","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Time Management Voice Agent","CreditHours":0.0,"Description":""},{"Id":"2b35b7d2-f6f9-43e7-9beb-bafe824bdac2","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research In Databases And AI","CreditHours":0.0,"Description":""},{"Id":"9cf3ee95-0208-4b39-a779-cbed06bfdaa5","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Science Capstone Research","CreditHours":0.0,"Description":""},{"Id":"4bf37b6f-4b26-4f3a-95b1-ce7c3491ba55","Number":"49000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research Course","CreditHours":0.0,"Description":""},{"Id":"4a2119ab-8e4b-45cd-ad02-fbf65512ad6b","Number":"49700","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Honors Research Project","CreditHours":3.0,"Description":""},{"Id":"efb13bba-8033-4246-860e-ea950d0915f2","Number":"50010","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Foundational Principles Of Information Security","CreditHours":3.0,"Description":""},{"Id":"20bfe0c9-f828-4ab9-9dec-e9318ac0bd7a","Number":"50011","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Systems For Information Security","CreditHours":3.0,"Description":""},{"Id":"25fb7bd3-e297-43e7-ad1d-903ed6ca0547","Number":"50023","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Engineering I","CreditHours":1.0,"Description":""},{"Id":"89b5a982-c452-4a06-b043-cab64eee5159","Number":"50024","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Engineering II","CreditHours":1.0,"Description":""},{"Id":"392847bf-d6dd-4223-aec3-5b740db9fe42","Number":"50025","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Foundations Of Decision Making","CreditHours":1.0,"Description":""},{"Id":"ed4d33b9-5d16-4afb-ac1e-0930baa00edd","Number":"50100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computing For Science And Engineering","CreditHours":3.0,"Description":""},{"Id":"416cbbca-d34b-4dd8-a9b6-992a58f9ecfe","Number":"50100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Computational Science","CreditHours":3.0,"Description":""},{"Id":"bb7d92f9-22ab-4fc0-9363-a0506f85d513","Number":"50200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Compiling And Programming Systems","CreditHours":3.0,"Description":""},{"Id":"31e5012e-558c-4fd2-abaf-3db6da06bc58","Number":"50300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Operating Systems","CreditHours":3.0,"Description":""},{"Id":"12135e7b-5f67-4342-abe8-3a043234dd82","Number":"50500","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Systems","CreditHours":3.0,"Description":"Non-CS students will not be able to register until Jan 1st. DO NOT contact the instructor. Students should submit their course request via Scheduling Assistant in their MyPurdue after Jan 1st. All requests are subject to space availability."},{"Id":"878ce052-305c-4c4b-9584-5a2bf5d311f0","Number":"51000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Engineering","CreditHours":3.0,"Description":""},{"Id":"7a807bfb-483c-4b3d-b28c-aaaad388be09","Number":"51400","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Numerical Analysis","CreditHours":3.0,"Description":""},{"Id":"fdc107e8-417e-4f8e-aa77-45afa6c124fa","Number":"51500","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Numerical Linear Algebra","CreditHours":3.0,"Description":""},{"Id":"ee0ad06b-8dbf-44e8-af72-79f99c6665f1","Number":"51501","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Parallelism In Numerical Linear Algebra","CreditHours":3.0,"Description":""},{"Id":"46da6340-d312-4f95-b21c-2a82a85bdc9c","Number":"52000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computational Methods In Optimization","CreditHours":3.0,"Description":""},{"Id":"54d1902a-8940-41e3-93bb-8b3cd22f775d","Number":"52000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computational Methods In Analysis","CreditHours":3.0,"Description":""},{"Id":"d1c59562-90c4-4522-960b-39dccf59c827","Number":"52300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Social, Economic, And Legal Aspects Of Security","CreditHours":3.0,"Description":"CS 42600 or CS 526 Computer Security or equivalent course with the consent of the instructor (can be taken concurrently)."},{"Id":"5da40a09-2b10-419b-ac7f-348c62573529","Number":"52500","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Parallel Computing","CreditHours":3.0,"Description":""},{"Id":"74acaf3c-ec08-4d5d-b802-faa4270a6f99","Number":"52600","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Information Security","CreditHours":3.0,"Description":""},{"Id":"d3a14515-4ce4-44c4-8b8c-37198a73497a","Number":"52700","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Security","CreditHours":3.0,"Description":""},{"Id":"16fa1eb5-dd78-498c-b081-1e0328762967","Number":"52800","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Security","CreditHours":3.0,"Description":""},{"Id":"125e47e9-7518-4907-ac12-4d2b8b3bbd8a","Number":"52900","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Analytics","CreditHours":3.0,"Description":""},{"Id":"5bd3e9bd-6d91-418c-8165-cee1f2f57d05","Number":"53000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Scientific Visualization","CreditHours":3.0,"Description":""},{"Id":"885c8695-9b02-43c3-8e90-ec913000f026","Number":"53100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computational Geometry","CreditHours":3.0,"Description":""},{"Id":"5a26ac53-4d24-49db-88c2-a4dfa20a240b","Number":"53200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Geometric Modeling Algorithms","CreditHours":3.0,"Description":""},{"Id":"1917f558-55dc-47a1-a681-1a70b0cbcb6e","Number":"53400","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Motion Planning","CreditHours":3.0,"Description":""},{"Id":"948d3760-83b9-48a2-a550-4f7541430961","Number":"53500","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Interactive Computer Graphics","CreditHours":3.0,"Description":""},{"Id":"9fe1fe76-e8d1-4729-954d-28f4535211a3","Number":"53600","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Communication And Computer Networks","CreditHours":3.0,"Description":""},{"Id":"e96b5b21-6201-4967-b28a-03a56b4f37c1","Number":"54100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Database Systems","CreditHours":3.0,"Description":""},{"Id":"3ed59f48-2060-4c69-8418-3153e7839423","Number":"54200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Database Systems","CreditHours":3.0,"Description":""},{"Id":"17c8b064-6f3f-4838-94c8-70ed7fd4977f","Number":"54300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Simulation And Modeling Of Computer Systems","CreditHours":3.0,"Description":""},{"Id":"38d05749-791b-4038-8a63-98363859d7e0","Number":"54701","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Information Retrieval","CreditHours":3.0,"Description":"Students registering for this course must be pre-registered as a distance student with Engineering Professional Education - http://proed.purdue.edu"},{"Id":"42ede252-bc7b-41b7-ad40-0ff7a399437d","Number":"55100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Computing Fundamentals","CreditHours":3.0,"Description":""},{"Id":"e7225510-1cc5-4536-8b62-cc9bcbfb08f1","Number":"55500","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cryptography","CreditHours":3.0,"Description":""},{"Id":"3b3db65b-71cc-4aca-b17c-ae40b51c6279","Number":"55600","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Security And Privacy","CreditHours":3.0,"Description":""},{"Id":"829961e4-f55e-4e64-8400-05659e51ae1d","Number":"55800","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Robot Learning","CreditHours":3.0,"Description":""},{"Id":"b5b72b57-fc97-48d0-ba51-99eb3c1a513e","Number":"56000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reasoning About Programs","CreditHours":3.0,"Description":""},{"Id":"dbc07de7-008f-4564-84a6-a551fdafc43e","Number":"56500","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Programming Languages","CreditHours":3.0,"Description":"Non-CS students will not be able to register until Jan 1st. DO NOT contact the instructor. Students should submit their course request via Scheduling Assistant in their MyPurdue after Jan 1st. All requests are subject to space availability."},{"Id":"512e0be8-e658-4fe0-affe-d9e12d64326f","Number":"56900","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Robotic Systems","CreditHours":3.0,"Description":""},{"Id":"01aeb5af-db64-4790-bd1d-8b667371171f","Number":"57100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Artificial Intelligence","CreditHours":3.0,"Description":""},{"Id":"af12dc05-ded8-45e4-b0f6-2e7a1b490967","Number":"57300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Mining","CreditHours":3.0,"Description":""},{"Id":"85348386-f0f3-48f6-9aa9-e52223b887eb","Number":"57700","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Natural Language Processing","CreditHours":3.0,"Description":"Non-CS students will not be able to register until Jan 1st. DO NOT contact the instructor. Students should submit their course request via Scheduling Assistant in their MyPurdue after Jan 1st. All requests are subject to space availability."},{"Id":"b4cc3b73-cdc7-4ffa-bc27-814562ab0291","Number":"57800","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Statistical Machine Learning","CreditHours":3.0,"Description":""},{"Id":"c73cc4f0-b7da-4d4c-8321-4670673facc7","Number":"57900","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinformatics Algorithms","CreditHours":3.0,"Description":""},{"Id":"19e0db77-cb6d-4b71-b861-37ac6d9d146d","Number":"58000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Algorithm Design, Analysis, And Implementation","CreditHours":3.0,"Description":""},{"Id":"a711795b-7af2-4209-ba1a-00e773cc808f","Number":"58100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Algorithmic Game Theory","CreditHours":3.0,"Description":""},{"Id":"bb97cddb-8b15-4235-8ab9-e506b11e781b","Number":"58400","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Theory Of Computation And Computational Complexity","CreditHours":3.0,"Description":""},{"Id":"f7f189ae-7c1c-4d5d-8b70-3b17572a3db9","Number":"58500","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Theoretical Computer Science Toolkit","CreditHours":3.0,"Description":""},{"Id":"4df8ca7d-9957-454c-ac24-4b511049cbe2","Number":"58700","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Foundations Of Deep Learning","CreditHours":3.0,"Description":""},{"Id":"d25f140d-4e77-46af-b1af-e93709024a42","Number":"58800","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Randomized Algorithms","CreditHours":3.0,"Description":""},{"Id":"86fc1028-8d28-4ae3-b337-711e8aba7b0f","Number":"58900","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Quantum Computing","CreditHours":3.0,"Description":""},{"Id":"b86391f4-77f4-49b2-933f-7ea12f116020","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Efficient Distributed Systems","CreditHours":0.0,"Description":""},{"Id":"0c8ef28d-5880-4bdc-ae52-c9a4e5e32052","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Service Oriented Arch Security","CreditHours":3.0,"Description":""},{"Id":"0f6cfb91-878d-4f65-9c1e-ca133bb081f7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded HW/SW","CreditHours":1.0,"Description":""},{"Id":"25baa3aa-256f-4de5-b482-2a9c74911663","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Privacy In Dist Data Analytics","CreditHours":3.0,"Description":""},{"Id":"221cb7aa-3ece-4e17-8d9a-67ad595bdfd1","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Appication For Blind","CreditHours":1.0,"Description":""},{"Id":"47f5581f-b5cb-4323-8aba-67c8a185e6a6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Analysis Of Ripple Network","CreditHours":3.0,"Description":""},{"Id":"4b695915-7ded-441c-b8fe-35c03798968d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Sensing, Comp, And Appl","CreditHours":3.0,"Description":""},{"Id":"93b2883f-10c9-4344-beb5-dc9eb8c360a5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"B-Tree Compression II","CreditHours":0.0,"Description":""},{"Id":"5554d849-7819-4343-b6b0-439918ad1259","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Prediction Of Drug Reactions","CreditHours":3.0,"Description":""},{"Id":"65305447-bb71-4468-a01c-674ba00d75be","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Spatiotemporal Indexing II","CreditHours":3.0,"Description":""},{"Id":"322096ac-b75e-4bb6-9f5b-15ae3b3f4850","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Programming","CreditHours":1.0,"Description":""},{"Id":"6cab50dd-29bf-4858-bba9-249d0fa7e590","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer-aided Prog Reasoning","CreditHours":3.0,"Description":"As software increasingly runs our lives, can we effectively reason about and ensure software reliability? In this seminar, we will focus on logical foundations and algorithmic techniques for guaranteeing that programs meet certain properties. At the end of the seminar, students will have an insight into the following questions: How can one specify program correctness? How can one check if a program is correct?  How can one automatically synthesize a correct program or program component?  Course webpage: https://www.cs.purdue.edu/homes/roopsha/capr.f16.html"},{"Id":"6d8e172c-15a9-42d4-96c5-a0dde9da2609","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mapping Network Experiments","CreditHours":3.0,"Description":""},{"Id":"38b24f3e-d571-424b-809f-e1424b40d84a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advances DBMS I","CreditHours":3.0,"Description":""},{"Id":"796a812d-9bdd-4c71-b39f-4e34987cc902","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Secure Indexing And Searching","CreditHours":1.0,"Description":""},{"Id":"4f1f9555-57e1-41ee-810e-45c7d4cf7a5a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Learning Difference SEM","CreditHours":0.0,"Description":""},{"Id":"84864a1d-160b-445e-a0ea-f040f4a53b5d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML Meth For Soc Net Analysis","CreditHours":3.0,"Description":""},{"Id":"427e67f2-5c5a-4ef1-b802-930a355417fe","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Persistant Threats","CreditHours":3.0,"Description":""},{"Id":"8aa20b1c-6953-4745-a971-9ef3f507e3fd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Big Data Management","CreditHours":3.0,"Description":"This seminar course addresses research challenges in big data management. Topics to be covered include, but are not limited to, distributed and parallel data management and query processing techniques; in-memory distributed data systems; graph data management;  sample-based query processing techniques; big spatial data management; adaptive techniques; stream processing techniques; multidimensional indexing; row, column, and key-value stores; semantic data stores and semantic query processing. Each student is expected to present several research papers in class and complete a semester-long project in a related topic."},{"Id":"a0de9a1f-9412-4830-9c9a-ddabe5ffa9f7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IoT Security","CreditHours":5.0,"Description":""},{"Id":"a599d8ba-9e8b-40aa-99b0-228e3501a554","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network And Graph Embeddings","CreditHours":3.0,"Description":""},{"Id":"ac81b33b-b4d3-4ca6-aac2-78dc58446bb2","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Additive Splits In Security","CreditHours":3.0,"Description":""},{"Id":"4db84578-e303-46d4-acaf-e0f742af144e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Parallel Graph Algorithms","CreditHours":1.0,"Description":""},{"Id":"c51f892b-f666-493e-b24a-13f7e3b2d7b4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Individual Study On XINU OS","CreditHours":3.0,"Description":""},{"Id":"c7719daf-765e-41c4-93df-c447def19dec","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Vehicle To Vehicle Security","CreditHours":3.0,"Description":""},{"Id":"c8921c1c-72db-44d4-9316-4b9cd484d062","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Practical Software Training","CreditHours":1.0,"Description":""},{"Id":"cb86bed7-54b8-46a0-ab96-4152b511ade9","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Large Scale Systems","CreditHours":1.0,"Description":""},{"Id":"525b68fe-5bd4-48ce-9872-23957567ed00","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Coloring Algorithim Sftware II","CreditHours":3.0,"Description":""},{"Id":"668da302-b16a-4afb-b0e5-3c3750feca01","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"eCTF","CreditHours":3.0,"Description":""},{"Id":"df9dfe2a-cacd-49d2-90a6-e098e3e09df1","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Predicting Stance Reasons","CreditHours":3.0,"Description":""},{"Id":"e5eea9f9-12e2-4d14-aeed-2e3e02aeb40f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Passwords & Human Authenticatn","CreditHours":3.0,"Description":"In this seminar we will survey recent research on passwords and authentication focusing both on human factors (e.g., how people create and remember passwords) as well as the cryptographic tools used to defend passwords against attackers."},{"Id":"ec6d49eb-930a-4c37-b6ec-3499bb65c485","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Representations For Nl Text","CreditHours":1.0,"Description":""},{"Id":"f4789067-f6f9-4eed-b846-98ec4b5ab032","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Effective Teaching In CS","CreditHours":1.0,"Description":""},{"Id":"539fe41b-c17a-4daf-997f-3a93d0214d01","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Program Multicore Processors","CreditHours":1.0,"Description":""},{"Id":"ff297ddf-2156-4017-a561-dab9e7c2706e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multimodal Analysis In NLP","CreditHours":3.0,"Description":""},{"Id":"53c8e13c-411b-4f7c-99de-89a32f06749f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Parallel Spatiotemp Data Mgmt","CreditHours":3.0,"Description":""},{"Id":"265604e3-330b-4db8-8941-043c59e05fb3","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Search Recommendation","CreditHours":1.0,"Description":""},{"Id":"02b60a80-932b-4187-b97f-1769acdd2f13","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mining Failure Patterns In HPC","CreditHours":1.0,"Description":""},{"Id":"055f40d6-f7c2-422f-a71e-02fb37885ed5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network & DB Software Engineer","CreditHours":1.0,"Description":""},{"Id":"09862c19-6157-4101-b91d-c5566c4eb791","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mentor For Coding Practices","CreditHours":1.0,"Description":""},{"Id":"0a450fe3-0057-454d-8d00-953fda2b42e9","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Tracing Distributed Services","CreditHours":1.0,"Description":""},{"Id":"156cab47-b4f5-4bca-8003-46469f876382","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Dynamic Graph Database","CreditHours":3.0,"Description":""},{"Id":"2263b35d-b9bc-4515-b9bc-1d2969568c41","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Insider Threat","CreditHours":3.0,"Description":""},{"Id":"227c5834-4de7-4eb4-bf9e-a84f1dc1799f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Smartphone Energy Optimization","CreditHours":1.0,"Description":""},{"Id":"26553976-5d53-42bf-b0f5-0326ecdc8464","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"E Commerce Engineering","CreditHours":1.0,"Description":""},{"Id":"26f5a105-9c72-4c7b-b8eb-978d6a93d4c4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Traffic Quality Bot Id","CreditHours":1.0,"Description":""},{"Id":"28bc385e-a872-41b6-92ff-43d603d181fc","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Studies In Causal Inference","CreditHours":3.0,"Description":""},{"Id":"3aedf69e-c9db-4e54-b32a-102a57b4b639","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Recommendation Systems","CreditHours":1.0,"Description":""},{"Id":"435423c4-3a55-47fe-b677-d18e0b937699","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cheatg Detect In Comp Outsour","CreditHours":3.0,"Description":""},{"Id":"4455af57-ffe4-4966-afb4-f5a51b83e69a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Engineering Practice","CreditHours":1.0,"Description":""},{"Id":"861f8e25-3614-4c51-9435-da84e3cec5bf","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Trustworthy Machine Learning","CreditHours":0.0,"Description":""},{"Id":"531b6e31-73b3-40d4-a659-ad4fad318564","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Prediction Problems In iOS Ads","CreditHours":1.0,"Description":""},{"Id":"53791da9-abf1-44d8-8c20-de0272343e77","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Real Time Voice & Text Recogni","CreditHours":1.0,"Description":""},{"Id":"5ae371cf-6584-4358-abb8-ded2e3ca1bec","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intro To Virtualization","CreditHours":1.0,"Description":""},{"Id":"5e93383a-6757-4fdd-ad65-d7c0e4ae9527","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Graph Engineering","CreditHours":1.0,"Description":""},{"Id":"65d74534-7186-4f43-ae76-295e24882505","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Using Deep Learning For NLP","CreditHours":1.0,"Description":""},{"Id":"68637380-24d9-482f-8559-75deb658b266","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"NLP Cloud Computing","CreditHours":1.0,"Description":""},{"Id":"69d3f256-1ac5-46c3-89ae-a2b573461553","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Visual Analytics Project","CreditHours":3.0,"Description":""},{"Id":"6a02a1a1-aa2f-42c3-aa55-81dce393fed2","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Of Survey Responses","CreditHours":1.0,"Description":""},{"Id":"71cc8ed2-890b-4002-8086-30db51eaa799","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Visualization & Analysis","CreditHours":1.0,"Description":""},{"Id":"72cad559-e600-4480-9448-ef088d108d24","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Development Of E Trading Infa","CreditHours":1.0,"Description":""},{"Id":"754ca41a-024b-4e09-bdb4-893c6f6931f6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Privacy In Cloud","CreditHours":1.0,"Description":""},{"Id":"7d8b32ec-ea75-4df1-92b6-b24b268fa98b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Infosec Software Engineering","CreditHours":1.0,"Description":""},{"Id":"7ec6f42b-a0ba-46d7-8feb-e4d49854f544","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Secure Scalable Services","CreditHours":1.0,"Description":""},{"Id":"951fb1dd-a9d2-40a7-a429-39e82af37258","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Discrete Mathematics","CreditHours":3.0,"Description":""},{"Id":"9569692b-38b8-4320-b494-a765ec23fc75","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"V To V Security & Safety","CreditHours":3.0,"Description":""},{"Id":"95e4a9eb-6156-405b-b061-8e8a2aa55f38","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Anlytcs For Flt Detection","CreditHours":1.0,"Description":""},{"Id":"9afe74d9-a8e9-4fa0-a4f2-36c336f3ed27","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Video Game Services","CreditHours":1.0,"Description":""},{"Id":"9d373d91-5d58-481f-9016-e05b9daee069","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Spatiotemporal Indexing","CreditHours":3.0,"Description":""},{"Id":"bbc16179-a6c2-42af-95c8-8ce43cb16924","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML Driven Sensor Data Analysis","CreditHours":1.0,"Description":""},{"Id":"c1816e6a-9597-4942-9186-9cd77fb37a4b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web App Development Kindle","CreditHours":1.0,"Description":""},{"Id":"d20d7546-b30d-4dae-8fed-baf8a20e01c5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Simulation Programming","CreditHours":3.0,"Description":""},{"Id":"e2d5ad4b-7244-4cba-856a-03e67ba28878","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Vehicle To Vehicle Com Systems","CreditHours":3.0,"Description":""},{"Id":"ed87c62f-4de9-4cbd-89a0-ecc195ee72b3","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Engineering","CreditHours":1.0,"Description":""},{"Id":"9372b253-9fe7-4047-9063-4a1be8668aad","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intro To Quantum Computing","CreditHours":0.0,"Description":""},{"Id":"f429ef94-383b-474c-bd63-b257d94e929e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multi-Modal Methods In NLP 2","CreditHours":0.0,"Description":""},{"Id":"617066f2-8a87-40ed-a20d-b59442d7894f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Evasion Attack Agst Lang Model","CreditHours":0.0,"Description":""},{"Id":"15024901-6a8c-4311-afa2-952b09e36588","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Cloud Computing","CreditHours":3.0,"Description":""},{"Id":"5dc62b9f-5f8d-4b5d-b422-13761e6a2159","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Learning Bayesian Networks","CreditHours":0.0,"Description":""},{"Id":"7e32edf1-76c7-40ee-83ba-11486ea0b956","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Social Networking","CreditHours":1.0,"Description":""},{"Id":"5d720eb8-5169-4698-96fa-e85c7265c2ba","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Robotics Project","CreditHours":0.0,"Description":""},{"Id":"2a740a13-cbf4-4ad6-87e5-4b84baa9c739","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"False Users Detection","CreditHours":3.0,"Description":""},{"Id":"56a894d0-391e-47e9-a776-174cd167eba3","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"MPC W/ Noisy Ch & Active Advs","CreditHours":0.0,"Description":""},{"Id":"3df021fd-c580-4c9e-b0b7-11ce4743a13a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Leakage","CreditHours":3.0,"Description":""},{"Id":"40358657-187d-4386-a3b2-dc8f1277d7f9","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Database Systems For Networks","CreditHours":3.0,"Description":""},{"Id":"ad71d136-f099-4997-8ec6-a19e057703e0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mining Unstructured Data","CreditHours":1.0,"Description":""},{"Id":"bc433ff4-1d2e-4873-b6a5-6ffb9f2f75ef","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Realtime Data Management","CreditHours":1.0,"Description":""},{"Id":"c4c34a05-14a7-487f-af7c-0d99f173171a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research Mobile Operating Sys","CreditHours":1.0,"Description":""},{"Id":"61a4445a-fe46-4c5f-aaa4-1a6c379d3819","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Energy Debugging","CreditHours":1.0,"Description":""},{"Id":"6a53120a-7d1a-4450-8ca5-b9acb8d9f64f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Privacy Preserving Biomt Auth","CreditHours":3.0,"Description":""},{"Id":"6b309782-581f-4699-bfa0-e9feb78f1848","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Privacy Preserving Data Mining","CreditHours":3.0,"Description":""},{"Id":"762c9d38-8755-4f07-8a06-2fa647b29328","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Scaling Virtual Ntwk Functions","CreditHours":3.0,"Description":""},{"Id":"dadaaf6f-01ab-405e-814e-6fe4355e9b54","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Auto Parallelization GCC","CreditHours":3.0,"Description":""},{"Id":"db93a745-7ab1-4cb4-a3e8-198e1eba6c52","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Res In Wireless Interfaces","CreditHours":1.0,"Description":""},{"Id":"5304e93f-0f11-48a8-8c1b-bee759ca7285","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"System Model Compilation","CreditHours":0.0,"Description":""},{"Id":"9ccc2e87-7a2a-4881-b823-e92cd748823b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Security","CreditHours":3.0,"Description":"Successful completion of CS 52600 required, or equivalent course with the consent of instructor required. Significant programming expertise and knowledge of computer networks is required to complete the projects."},{"Id":"a8559f33-9104-498e-9ebd-0214c5da6efb","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Statistical Network Analysis","CreditHours":3.0,"Description":""},{"Id":"db96a8af-b325-4ab4-855f-1152229d7330","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Operating Systems","CreditHours":1.0,"Description":""},{"Id":"b0b5e803-4582-4392-a3c7-605b096a911e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Security","CreditHours":3.0,"Description":"Successful completion of CS 52600 required, or equivalent course with the consent of instructor.  required.  Significant programming expertise and skills are required to complete the labs and homeworks."},{"Id":"e50ef3f5-af12-49ea-af91-c21490390ebf","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Algorithm Scientific Computing","CreditHours":1.0,"Description":""},{"Id":"f1c400df-e5ae-41ba-baea-86ba2f6289c9","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Privacy Cloud","CreditHours":1.0,"Description":""},{"Id":"fce49460-8914-4562-831b-234a93fa5117","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Social Network Image Analysis","CreditHours":1.0,"Description":""},{"Id":"c3f2cee5-85dc-4760-97e5-5744d8ce978e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Formal Methods In Databases","CreditHours":3.0,"Description":""},{"Id":"fec12d61-8861-4249-b346-a6ff3ed8c370","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Integrating Mobiles With Cloud","CreditHours":1.0,"Description":""},{"Id":"ee2e1182-2487-4d79-9b81-05ed52628951","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Firmware Analysis Of Iot Dev","CreditHours":3.0,"Description":""},{"Id":"6acb5460-61b2-45d0-a2c7-d63c1b40419e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Computing Research Lab","CreditHours":0.0,"Description":""},{"Id":"0367fe02-5614-4513-8475-f1bfe9f95036","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Binary Program Security","CreditHours":3.0,"Description":""},{"Id":"079be295-5cee-474e-b9cc-a1992e113687","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Traffic Generator","CreditHours":3.0,"Description":""},{"Id":"1ceca6ac-929f-41b4-a6cd-d7ebad87b42d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Anomaly Detection Mechanisms","CreditHours":3.0,"Description":""},{"Id":"43e45ba7-9cb0-4690-b6db-c505aeeae31e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Heterogeneous Computing","CreditHours":0.0,"Description":""},{"Id":"3a164957-ac13-4446-83e1-3b21ba819835","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Procdrl Modeling Applications","CreditHours":1.0,"Description":""},{"Id":"402ec237-8d5e-4947-ba93-2fe37198d057","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Readings In Causal Inference","CreditHours":3.0,"Description":""},{"Id":"49c9a860-fa82-48d4-9a07-2a6166c76045","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"GenAI Sec. Risks/Mitigation","CreditHours":0.0,"Description":""},{"Id":"6bd0d5e1-b062-4a66-89ae-aebda41ba85a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Large Scale Firmware Analysis","CreditHours":3.0,"Description":""},{"Id":"6d984db7-42d8-41d3-8479-3b1d2c8289dc","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning Theory Smnr","CreditHours":3.0,"Description":"Basic knowledge of calculus and linear algebra is expected. Some knowledge or experience with machine learning or data mining is welcome."},{"Id":"6e927308-5847-47b0-adf3-fef3fe2658f6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intro To Sdn","CreditHours":3.0,"Description":""},{"Id":"a231435c-f457-41d6-8a4a-46d1a170ff50","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Resiliency Analysis Of HCP","CreditHours":0.0,"Description":""},{"Id":"8e31591f-c03a-406c-a9cc-560aae1182ad","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Application Develpment","CreditHours":3.0,"Description":""},{"Id":"34b522dd-b018-49b0-80f3-fb13cccd3004","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Operating Systems Optimization","CreditHours":0.0,"Description":""},{"Id":"b789ec85-7ba5-4909-be97-d1477ca8492b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Insertion And Deletion Codes","CreditHours":0.0,"Description":""},{"Id":"bba5d95e-6502-4808-9a9e-c216e5248735","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sec. Analysis Of Cyber Sys","CreditHours":0.0,"Description":""},{"Id":"a0422049-0d81-4507-b968-db6b3d67e8ac","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Identifying User Behavior","CreditHours":3.0,"Description":""},{"Id":"ee9072f0-69eb-4d55-9f0a-2295c52f6383","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Distributed Systems","CreditHours":0.0,"Description":""},{"Id":"b5505b76-9355-40aa-8aa6-786a16090be6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Agile Software Development","CreditHours":3.0,"Description":""},{"Id":"c1df1d76-70c2-44a3-8d06-f81b7950ce00","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"New Trends In Data Systems","CreditHours":3.0,"Description":""},{"Id":"c81796b3-e222-49d4-bbc0-230985fd999e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Optimizing Review Systems","CreditHours":3.0,"Description":""},{"Id":"cfbdb970-cb8c-4d42-860a-4b9a367d342b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Visual Analysis Of News Data","CreditHours":3.0,"Description":""},{"Id":"d05f3a43-5451-44b6-adc6-e331b06ff74f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Firmware Analysis For Iot Dev","CreditHours":3.0,"Description":""},{"Id":"5297d072-19ed-4c42-bb0a-41e888d9947b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Privacy For Language Models","CreditHours":0.0,"Description":""},{"Id":"29b407b1-f8cb-4478-a481-0a56eecb9f21","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Dynamic Memory In Switches","CreditHours":0.0,"Description":""},{"Id":"f6eeeb82-7688-45ea-80e5-13faeb68d76f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Protein Modeling V","CreditHours":3.0,"Description":""},{"Id":"f829f8ca-8767-4bd9-808b-c29d41ba7123","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Big Data Sampling & Querying","CreditHours":3.0,"Description":""},{"Id":"f8d9df34-d04d-4d10-8204-7a81d914e7dc","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Security","CreditHours":3.0,"Description":""},{"Id":"985a9052-e4ec-4424-a97a-d786c71143c8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sec Analysis Of Cyber Sys","CreditHours":0.0,"Description":""},{"Id":"27ba5a65-487e-4d60-822a-a4b788f1a9a1","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Of VR/AR Devices II","CreditHours":0.0,"Description":""},{"Id":"03cdb90d-0474-4eca-b431-1bad19f373b4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Application Development","CreditHours":3.0,"Description":""},{"Id":"0763589d-ac68-4f27-99f9-524b7c67b208","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Fast Image Proc Using Metaprog","CreditHours":1.0,"Description":""},{"Id":"1449318e-3711-4471-98e6-0f9dce9ebd7b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Application Development","CreditHours":1.0,"Description":""},{"Id":"1fbee644-d5c5-48ab-85cd-42eb3bf7a373","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Anomaly Detection For Big Data","CreditHours":1.0,"Description":""},{"Id":"274e5ea4-d0e6-43e5-ae50-6b81b376fc24","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning","CreditHours":1.0,"Description":""},{"Id":"29ec8747-c948-45e7-908d-8abb82120982","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Procedural Modeling Animation","CreditHours":1.0,"Description":""},{"Id":"32a3b749-12ee-4898-bcdc-322c8657b0cb","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Algorithms For Mobile Platform","CreditHours":1.0,"Description":""},{"Id":"3346bd86-9e39-4711-9e12-379f7136333b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Algorithms For Platform Design","CreditHours":1.0,"Description":""},{"Id":"3887eac4-1e2c-47c2-923a-67428d45b5b8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Engineering Interface","CreditHours":1.0,"Description":""},{"Id":"3ff78f16-badd-4fc7-ad06-ac66fb2cd6b9","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multimedia Streaming Qualcomm","CreditHours":1.0,"Description":""},{"Id":"52fc21c3-9d9f-4646-bc63-ecd4b69c4d1a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Recon/Overlapping St Light","CreditHours":3.0,"Description":""},{"Id":"5dc10c55-e6dd-4733-b7a3-cebc11f0db9f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Brain Network Alignment","CreditHours":3.0,"Description":""},{"Id":"5ff301c6-cf31-4c83-927f-0300acccdf60","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sub Linear Algorithms","CreditHours":3.0,"Description":""},{"Id":"6215b8a0-5e61-45c9-81c2-f27506a080a9","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Scalable Visual Analytics","CreditHours":3.0,"Description":""},{"Id":"66dd7e99-6589-4bdf-9d5f-188ae9ac6496","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Visualization Systems","CreditHours":3.0,"Description":""},{"Id":"6a1b8f05-4ede-46e3-933e-541cd034e5e6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Internship At Amazon","CreditHours":1.0,"Description":""},{"Id":"716b3a83-939a-4e8a-b6cd-57cf9e25514a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Engr Internship","CreditHours":1.0,"Description":""},{"Id":"7cb88e9b-46af-4ecd-abe3-d27c57c665a4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML For Data Centers","CreditHours":1.0,"Description":""},{"Id":"7ddd782c-69a4-4c58-9a83-0ed6d1beb099","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Security & Pentesting","CreditHours":1.0,"Description":""},{"Id":"8497d70b-8839-4dac-85a0-af00326538bc","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Elliptic Curves Study","CreditHours":3.0,"Description":""},{"Id":"8cd8e742-a7d1-4a14-be75-33bd8773ce41","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning And Dist Syst","CreditHours":1.0,"Description":""},{"Id":"e2165f05-a218-43fb-930c-bb7ac8facd1a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"GenAI Sec Risks Mitigation","CreditHours":0.0,"Description":""},{"Id":"ab888dd8-a235-4a2d-97a7-6d305bd7f3cd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Summer Internship In Amazon","CreditHours":1.0,"Description":""},{"Id":"ac27d192-09d6-4463-8f50-73420a8e016e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Summer Internship At Amazon","CreditHours":1.0,"Description":""},{"Id":"b6dbbd0c-eb5e-47eb-9865-ba5726cb1961","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Application Design","CreditHours":1.0,"Description":""},{"Id":"bbecd468-68b5-416a-b0c1-8b39b354e7b3","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Protein Modeling IV","CreditHours":5.0,"Description":""},{"Id":"bc3bcced-ecf4-4f6d-85ec-a0a67a79e31d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Redundancy Control Using SDN","CreditHours":1.0,"Description":""},{"Id":"5f83407e-d238-4229-ab33-4efb2f65ef25","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Generative AI & Its Impact","CreditHours":0.0,"Description":""},{"Id":"c9e66412-f292-4b21-86b7-c00e556f837d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Asmt Digital Rsch Data Repo","CreditHours":3.0,"Description":""},{"Id":"cad38bf1-66b4-4adc-8e1d-be67422eaf53","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Quadcopter Development","CreditHours":3.0,"Description":""},{"Id":"d2ab13fb-847c-4d1e-add8-16e594c48f64","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Analysis Cyber Risks IT Sector","CreditHours":1.0,"Description":""},{"Id":"d37d90a1-b0df-47d5-88b5-4845da1ca43c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Big Data Analysis","CreditHours":1.0,"Description":""},{"Id":"d78caacb-dcf6-48f1-b154-58ba6b0c1a8e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Modeling And Prediction Of Ads","CreditHours":1.0,"Description":""},{"Id":"db4b2fb2-732c-44ca-be0f-6678cc3f26bb","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Content Protection At IBM","CreditHours":1.0,"Description":""},{"Id":"df14f95e-3e97-4498-b191-ec672ae40580","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Parallel Algorithms / RNA Seq","CreditHours":1.0,"Description":""},{"Id":"121a43a5-98ba-44ef-af70-e199d268c1d4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Generalized Search Trees","CreditHours":3.0,"Description":""},{"Id":"246e3dc8-4f35-41fc-9efb-c53b1b03a4e7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Engineering Large Software","CreditHours":3.0,"Description":""},{"Id":"2cbcae9c-a3f1-4815-a181-81a33266182b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computing On Big Data","CreditHours":3.0,"Description":""},{"Id":"48c433a1-3534-47ac-b9c4-db39877568f1","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Hardware Side Channel Attacks","CreditHours":0.0,"Description":""},{"Id":"4a7a58e2-f50d-4a60-ad39-b0233f7d76c0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Fault Tolerance Of SDN Control","CreditHours":3.0,"Description":""},{"Id":"5229230c-3e81-49ac-bf28-5ea0e34390e0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Digital Literacy","CreditHours":3.0,"Description":""},{"Id":"5a1601b3-7790-45cf-9eb3-8152fecb1038","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Structured Light 3D Recon","CreditHours":3.0,"Description":""},{"Id":"240fdff2-9a15-409c-8901-fe1286586e45","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Heterogeneous Platform Securit","CreditHours":0.0,"Description":""},{"Id":"7288f5ed-ea77-461d-be91-e04752c7c583","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sampling For Language Models","CreditHours":0.0,"Description":""},{"Id":"6b6b064c-162d-4c31-a4b8-65b0d064babf","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"NOSQL DB Systems & Techniques","CreditHours":3.0,"Description":""},{"Id":"d347cf22-87e2-4b00-833a-acc8f5e09bba","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Neuro-Symbolic Image Annotatio","CreditHours":0.0,"Description":""},{"Id":"3b1d029a-6bb1-40d7-9cda-0efc75e8bede","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Resiliency Of HCP","CreditHours":0.0,"Description":""},{"Id":"e97f8283-7521-460b-b2fb-3347673b2292","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"PoA Of P-mean Welfare","CreditHours":0.0,"Description":""},{"Id":"977c56f6-59ce-4c57-8bb8-f4458384526b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Fuzz Testing Distributed Sys","CreditHours":0.0,"Description":""},{"Id":"96d613bf-4b7f-41e6-af5c-011e3e9262e4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Agile Systems","CreditHours":3.0,"Description":""},{"Id":"e55f7ee6-d159-47b7-9ebd-e842fc38a22c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Public Space Social Robot","CreditHours":0.0,"Description":""},{"Id":"4569cbbf-dee2-4afe-a3a3-33d79d05c162","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Probabilistic Modeling GNN","CreditHours":0.0,"Description":""},{"Id":"208f970b-c7aa-4ff2-b960-11bb0c7bc0ec","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Vector Databases","CreditHours":0.0,"Description":""},{"Id":"c8fd434b-2b2f-414e-abc4-cf3ce83d740e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research In Distributed System","CreditHours":3.0,"Description":""},{"Id":"cf25624d-4d42-4e26-94e6-ddbee8b3462e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sparse Linear System Solvers","CreditHours":3.0,"Description":""},{"Id":"0df15c0f-4d69-4fb5-ab41-e18a5523ee2e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multicore Operating Systems","CreditHours":0.0,"Description":""},{"Id":"e5eed50f-21a1-45a3-87b6-5016021505c0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sublinear Time Algorithms","CreditHours":3.0,"Description":""},{"Id":"0d7b74ac-88f6-400c-9e41-09343a25739a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Feature Detection Using ML","CreditHours":0.0,"Description":""},{"Id":"f0a79742-15ff-4b95-b3ae-b3aa966959ad","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Teaching Python For Sci & Engr","CreditHours":2.0,"Description":""},{"Id":"340af475-9b27-4fdc-80e5-2ae36dfb4f4b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"LLM-based Content Analysis","CreditHours":0.0,"Description":""},{"Id":"1602cf96-88eb-4640-81ca-2410aba76ce2","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Lang-Based Systems Security","CreditHours":3.0,"Description":""},{"Id":"18f5fd6f-07e8-482f-96b3-09966c3b8fc7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Metaprogramming & Pgm Generatn","CreditHours":3.0,"Description":""},{"Id":"b9b2b9b7-b741-4581-b63c-b22d30d15b78","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning To Mobile Sys","CreditHours":0.0,"Description":""},{"Id":"55706460-6f83-43da-a550-3a13a5aca9ca","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Human-in-the-loop","CreditHours":0.0,"Description":""},{"Id":"37d0edf0-f188-4444-833c-74d6ac6b67ad","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinformatics II","CreditHours":3.0,"Description":""},{"Id":"58a94c74-ded8-45f8-87a2-7a8b3f4dfec5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Dist Spatiotemp Data Streaming","CreditHours":3.0,"Description":""},{"Id":"5c82d23d-fbaa-4bcd-a77b-4e9c4d39da0a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Complexity And Hypergraphs","CreditHours":3.0,"Description":""},{"Id":"ade16bce-b745-47ce-844c-134ac042505d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Mem Alloc Tech","CreditHours":0.0,"Description":""},{"Id":"717fc1f8-6362-47ba-89cf-24e438137929","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded Firmware Analysis","CreditHours":3.0,"Description":""},{"Id":"23f58417-081a-4bec-b363-393f5e6a039e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Field Robotics Motion Planning","CreditHours":0.0,"Description":""},{"Id":"45a9812c-cb52-4b1f-9b9c-9110cd78cc18","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Generative Models For Robotics","CreditHours":0.0,"Description":""},{"Id":"c0676b4c-90aa-4aaf-bce9-a8a06d10b728","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Tools For Drones","CreditHours":3.0,"Description":""},{"Id":"4232dc13-0cd3-45ba-8b82-d70ee7276c31","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"RCA For Cloud Applications","CreditHours":0.0,"Description":""},{"Id":"29aef26d-6284-4e79-8da8-dfc594187695","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topic Computer Sc","CreditHours":0.0,"Description":""},{"Id":"06483b2c-5dc0-451e-8be9-252525fbaf40","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Securing Web Advertising","CreditHours":1.0,"Description":""},{"Id":"e9f478a3-f9f8-4aab-8626-a004f0dbe81e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Computing Research","CreditHours":0.0,"Description":""},{"Id":"25041f00-9442-419b-91a4-0a1e8e72e582","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Query Expansion Research","CreditHours":1.0,"Description":""},{"Id":"2936d0cb-b59b-4352-a0e8-220ad1079970","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Accountability For Systems","CreditHours":1.0,"Description":""},{"Id":"2f95eccf-2eff-4036-99ee-36c1e03f27fa","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Parallel Matrix Computation","CreditHours":1.0,"Description":""},{"Id":"4314c218-177f-45cf-8e7c-c8cd9ff7ca5b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Triangle Visibility In Cuda","CreditHours":3.0,"Description":""},{"Id":"5adc276d-13a4-4779-bd87-ae85259e6b6f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bayesian Learn For Bioinfo App","CreditHours":1.0,"Description":""},{"Id":"62076292-13d5-4177-ae26-91b6e60c2f4c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinformatics I","CreditHours":3.0,"Description":""},{"Id":"6801fa21-b947-4620-bb3b-44df4260b876","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Genome Sequencing Algorithms","CreditHours":1.0,"Description":""},{"Id":"6861b698-0373-4ede-8278-748be84a85bb","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Dsgn And Anly Alg For CSS","CreditHours":1.0,"Description":""},{"Id":"76d6ffa2-cb00-4de3-aa2d-1109c82cac73","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Geoscience Data Mining","CreditHours":3.0,"Description":""},{"Id":"896e64bc-eb0d-48ba-b688-8121a72b91dc","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Testing R Language","CreditHours":3.0,"Description":""},{"Id":"91549236-1584-4e51-bf5e-19cda58f3fe3","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Spatiotemporal DB Benchmarking","CreditHours":3.0,"Description":""},{"Id":"c007aeb9-90b0-46e9-a8a5-3ab5b08c0d89","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Android Forensics","CreditHours":3.0,"Description":""},{"Id":"c07399e1-9903-476c-8f9e-eb20e35d0b56","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Technologies","CreditHours":3.0,"Description":""},{"Id":"c7514795-94a4-4b7e-965e-8be9480ee9b5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Program Fault Localization","CreditHours":3.0,"Description":""},{"Id":"d41d93ad-a4cc-4bd4-ae98-e323ee711429","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mach Learn For Mobile Platform","CreditHours":1.0,"Description":""},{"Id":"d5c13275-d15c-47a4-b507-2863cee8ab2d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Processor Design Verification","CreditHours":1.0,"Description":""},{"Id":"da3da27d-4bf5-4d13-943d-932ad7fb08ac","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Classification In Energy Data","CreditHours":1.0,"Description":""},{"Id":"e30c2494-7d27-49a0-b565-5b59e783f4ac","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Improve Chrome Sec Warning","CreditHours":1.0,"Description":""},{"Id":"ef565f9d-eae3-4e8b-aa56-b80a79d5e82a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Info Sec In Vehicle Embde Sys","CreditHours":1.0,"Description":""},{"Id":"e3e6e140-04a8-4cc6-9564-b18fb8c20ddf","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning For Security","CreditHours":0.0,"Description":""},{"Id":"1593b217-9466-44b7-a581-3a6b83d32910","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Protein Bioinformatics","CreditHours":3.0,"Description":""},{"Id":"4d6662b8-5eb4-407c-b9cb-35d4cc789cc7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Time Series Forecasting","CreditHours":0.0,"Description":""},{"Id":"424c0be1-0706-4deb-90b9-ecd66285b209","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Analysis In Flowcytometry","CreditHours":3.0,"Description":""},{"Id":"e81cf0ae-af5b-4427-8cbe-04b51dfd9b99","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI In Programming Courses","CreditHours":0.0,"Description":""},{"Id":"e253581e-4644-4e7c-b088-2e651baf4d92","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Eng Intern Juniper","CreditHours":1.0,"Description":""},{"Id":"e63ae64a-6dae-4ca3-ae60-b96a97bff2ff","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Matching With Random Walks","CreditHours":3.0,"Description":""},{"Id":"f5035149-26dc-4b2a-a975-9fa37f5310db","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Facebook Core Ads Internship","CreditHours":1.0,"Description":""},{"Id":"f54ef4d2-df86-437c-9b7c-ff7a80fe1267","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Analytics For QoS","CreditHours":1.0,"Description":""},{"Id":"fe4d09e2-04ce-473e-ab0a-352f7ce0edf2","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Cryptology","CreditHours":3.0,"Description":""},{"Id":"0537d877-7bf4-4061-8b78-6118e19aa8a6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Soundscape Data Mining","CreditHours":3.0,"Description":""},{"Id":"935cd6ec-91e8-4de2-b4e8-e38141c93382","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Storage Systems","CreditHours":3.0,"Description":""},{"Id":"05c917d2-b906-4cdf-babe-c17bfbd4ee08","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Colocation Graph Analysis","CreditHours":3.0,"Description":""},{"Id":"52f6a03f-091b-4f0e-a607-c88b6901df47","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"3D Bin Packaging Planning","CreditHours":0.0,"Description":""},{"Id":"50cbdfc8-ece3-47cc-8707-cfa0b923838f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"GPU Accelerated K-SAT Solving","CreditHours":0.0,"Description":""},{"Id":"49e55970-b7d4-4451-9536-9a0ef0c4b391","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security In Computing System","CreditHours":0.0,"Description":""},{"Id":"51589a9d-6a26-49c3-abad-63e40695c3fa","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Applied GenAI Research","CreditHours":3.0,"Description":""},{"Id":"bad93296-6c26-4e83-82f8-868445ffa21b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computing For Life Sci II","CreditHours":2.0,"Description":""},{"Id":"3fca0e8a-5201-4bdb-a3e9-80f203eefea4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"VR Environment Interaction","CreditHours":0.0,"Description":""},{"Id":"2b3971b5-8d60-4329-a72f-a531ef96124e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Insecurity In 5G Networks","CreditHours":0.0,"Description":""},{"Id":"48acc32b-e1ed-47c0-844b-c669c49b0dde","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Feature Const For Clustering","CreditHours":3.0,"Description":""},{"Id":"1d561ade-4110-408f-bd11-9d23d391faba","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"B-Tree Compression","CreditHours":0.0,"Description":""},{"Id":"102065d2-86d4-45b5-b074-2c18b1aab983","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topological Data Analysis II","CreditHours":0.0,"Description":""},{"Id":"592a035e-443e-434f-8a05-61d542be8041","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bayesian Reg For Predictions","CreditHours":3.0,"Description":""},{"Id":"1a378bcf-3956-420d-b232-84f3e0c84938","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"MS Thesis Topic Exploration","CreditHours":0.0,"Description":""},{"Id":"5df86ea7-2967-4add-ac35-603f2d7dba3f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deep Learning For 3D Bio Data","CreditHours":3.0,"Description":""},{"Id":"6e2fcb4e-b1c7-4629-aef5-f945e02dbb6b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Social Econ Legal Asp Of Sec","CreditHours":3.0,"Description":"CS 42600 or CS 526 Computer Security or equivalent course with the consent of the instructor (can be taken concurrently)."},{"Id":"14d5e8e8-2463-4b94-b9a3-62ba8e8fd12b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Efficient And Scalable Systems","CreditHours":0.0,"Description":""},{"Id":"cdd204b6-4247-443b-ae52-891aac39df04","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Service Oriented Architecture","CreditHours":3.0,"Description":""},{"Id":"7b1a0d68-6ea2-47d9-a95a-cd5a2f1b187f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Crypto System Development","CreditHours":0.0,"Description":""},{"Id":"806ffef6-a005-4389-b239-171f0a73e316","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research Credit Networks","CreditHours":3.0,"Description":""},{"Id":"f7637e5f-b81b-46f2-a5ae-5aa78cd95b17","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Fully Homomorphic Encryption","CreditHours":0.0,"Description":""},{"Id":"9b0a8fe6-6fa4-48be-a113-911ba00a4ec7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Big Data Systems","CreditHours":3.0,"Description":"Surveys the recent developments in data management such as NoSQL (e.g., distributed key-value stores) and NewSQL (e.g., geo-distributed data stores) with respect to storage architecture (e.g., log-structured, row-oriented, and column-oriented layouts), concurrency controls (e.g., ranging from eventual consistency to full serializability), cloud computing and virtualization, the emerging commodity hardware trends (e.g., many-core, large main memory, and distributed main memory), modern hardware accelerators (e.g., GPUs, FPGAs, and SSDs), and types of workloads (e.g., OLTP and OLAP). Expected background: CS54100 (Database Systems) and an undergraduate systems course (e.g. operating systems, distributed systems, networks)"},{"Id":"51f1536a-d9aa-4a3f-acd1-75a21362c6b2","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sparse Federated Learning","CreditHours":0.0,"Description":""},{"Id":"e5f69f0a-09c6-4b80-8370-15dade7909d8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Knowledge Distillation","CreditHours":0.0,"Description":""},{"Id":"b4022a5a-4ec0-4cae-a278-96c069b86ae4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Analyzing Student Conversation","CreditHours":3.0,"Description":""},{"Id":"b7ab5adf-e51e-4daf-8c55-6264b6ae9777","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Dist In Mem Kv Store","CreditHours":3.0,"Description":""},{"Id":"e59ced6c-9e9c-4d3b-bdee-f08a35062fae","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Syst Blind/Hrng Impaired","CreditHours":3.0,"Description":""},{"Id":"bfabf557-8e7e-460d-9d41-a9a4a3d093a7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Secure And Trusted Systems","CreditHours":3.0,"Description":"Students are expected to have general background on computer systems --- Operating systems (CS35400) and Systems programming (CS25200), as well as basic information security knowledge --- Computer Security (CS42600) or Information Security (CS52600)."},{"Id":"c624f433-b6b1-472a-9d9f-fcde0d98c343","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Programming Languages Ind","CreditHours":3.0,"Description":""},{"Id":"c6aa49d6-5990-4274-bfac-15ef475d5fba","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Combinatorial Optimization Alg","CreditHours":3.0,"Description":""},{"Id":"c98f33bb-9563-4385-9815-76ca6c9ca6fb","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Synthesis Seminar","CreditHours":3.0,"Description":"Students are expected to be familiar with basic logic & mathematical reasoning (set theory, induction, etc.) Ideally, they will have taken a programming languages OR compilers course, either at the grad or undergrad level."},{"Id":"e10b97a2-8c83-4d66-80d5-d587fa116b46","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"CUDA K-SAT Solver Part II","CreditHours":0.0,"Description":""},{"Id":"e7176b80-c7a0-446b-a34f-b22dc2e47b3b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computing For Life Sci I","CreditHours":1.0,"Description":""},{"Id":"cd264e0a-e2f4-40e9-99f8-7bfdd43d6272","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Binary Software Analysis","CreditHours":3.0,"Description":""},{"Id":"d5622ea3-77d7-4068-92e7-abda03d55487","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Towards Automated Fuzz Testing","CreditHours":3.0,"Description":""},{"Id":"ca5b6562-91b7-4d31-9f91-2140bc4f1fce","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Forensics In Autonomous System","CreditHours":0.0,"Description":""},{"Id":"daed1427-091f-4b46-9db9-e88d1bd49b18","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cryptography Research","CreditHours":3.0,"Description":""},{"Id":"f05c4b50-9f46-4009-9bfb-588ec75bdf7c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Crypto Ransomware Detection","CreditHours":3.0,"Description":""},{"Id":"c123b9dd-bc5a-4801-995b-8a70ce4b75b5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Autonomous Driving Testing","CreditHours":0.0,"Description":""},{"Id":"c12049c1-1ccc-4284-a19a-b8eff4b164fe","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"NLP Multimodal Methods","CreditHours":0.0,"Description":""},{"Id":"fe52ded1-b09a-4a52-81c2-fffb8fa015ca","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Key Value Store","CreditHours":3.0,"Description":""},{"Id":"e2f588ac-ed60-4d06-80c2-88b0ba14d9a5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Databases","CreditHours":3.0,"Description":""},{"Id":"0212252b-ae97-4b77-911b-7ca7ddba68bf","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Graph Dynamics & Cloud Envnmts","CreditHours":3.0,"Description":""},{"Id":"0396bc62-c465-4f50-8685-4507a1317bec","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Privacy Aware Location Servers","CreditHours":3.0,"Description":""},{"Id":"0b1bc3c0-b569-4325-8df3-d15f18c7ee76","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Digitize Edu Secure Cloud","CreditHours":3.0,"Description":""},{"Id":"fe08dc2c-3dad-4381-9e7d-f4bbfc81cf2e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Design Of Remote Disk Server","CreditHours":3.0,"Description":""},{"Id":"7d10bc39-e341-43b9-89dd-4e747d36edcf","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Defenses Against Data Attacks","CreditHours":3.0,"Description":""},{"Id":"8fdc9ff2-694a-4088-9927-891e2bed3a2c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sec & Priv Of Cellular Net","CreditHours":4.0,"Description":""},{"Id":"9096e7a1-2e52-4993-b6bf-28fb294a4bde","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Fuzz Guided Static Analysis","CreditHours":3.0,"Description":""},{"Id":"f31e5b4d-cc05-49f7-925d-3cca930f40ef","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Debug Study For Distr Sys","CreditHours":0.0,"Description":""},{"Id":"eeca0e8d-07f2-4094-8d08-4702af0dda4f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Content Based Image Retrieval","CreditHours":1.0,"Description":""},{"Id":"c9f03f4e-e3bc-4400-8751-a73a5727474e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Privacy Preserving Anomaly Det","CreditHours":5.0,"Description":""},{"Id":"84e4b2e8-72b4-4de3-8918-9c465452aac7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Optimizing Interpretability","CreditHours":0.0,"Description":""},{"Id":"08c9229e-7d53-4c76-914e-a9c7e7b54713","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Prompt Learning","CreditHours":0.0,"Description":""},{"Id":"1408d05f-6537-4050-a07d-a317f09fc402","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advances DBMS II","CreditHours":3.0,"Description":""},{"Id":"ef73c812-f36d-4c09-b794-181ca531dd7f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"RDMA-Optimized Join Processing","CreditHours":0.0,"Description":""},{"Id":"140ba9de-a2c5-4f2b-b850-af6ed1e486db","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Applied Computer Vision","CreditHours":1.0,"Description":""},{"Id":"1e9a1b62-9089-4b40-a735-4e3b5a88adb3","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Java Runtime Systmes On Chip","CreditHours":3.0,"Description":""},{"Id":"4917623d-1313-4747-b694-87a32889b796","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"LLM Alignment","CreditHours":0.0,"Description":""},{"Id":"23833292-3020-4381-97bd-2c415973343c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Shallow Discourse Parsing","CreditHours":3.0,"Description":""},{"Id":"2ffef4f3-3ad9-41fe-a187-4513de3ea453","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security In SOA","CreditHours":3.0,"Description":""},{"Id":"2e77360f-b246-44a6-a951-d58a31a1ddcc","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Systems Security Seminar","CreditHours":1.0,"Description":"Intended for students broadly interested in systems research, novel systems trends, or clever applications of systems ideas. We discuss one paper each week and try to learn new things about systems research together."},{"Id":"356c7f00-2504-4839-8c06-3fe3a56b9122","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Balls And Bins Experiments","CreditHours":1.0,"Description":""},{"Id":"e7d58eab-3f79-4758-845c-81d3a00ed57d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Design Of A Cloud-Native CPU","CreditHours":0.0,"Description":""},{"Id":"378c0d84-e8cf-4066-8737-2f6ba72c473b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Language Grounding For Robots","CreditHours":3.0,"Description":""},{"Id":"464f0f36-06a7-42fd-b168-17c84e0dc0b3","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Scalable Genetic Data Analysis","CreditHours":3.0,"Description":""},{"Id":"33a5741b-e818-4756-acaa-9ff3148d735f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intelligent Tutoring Systems","CreditHours":3.0,"Description":""},{"Id":"490fa3cb-5b2e-4b7e-9526-fe8d992fafc4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Coreference Resolution In NLP","CreditHours":3.0,"Description":""},{"Id":"4dc6b097-0db8-451a-8812-29562d84453f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Q6 Verification Of WC Apps","CreditHours":3.0,"Description":""},{"Id":"7d4dc486-4c28-45e0-9443-fbccab4ff1ed","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Robotics Research","CreditHours":0.0,"Description":""},{"Id":"4b7fa2fd-9606-41ad-b3bd-7522db5ca7b8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cyber Conflict In 21st Century","CreditHours":3.0,"Description":""},{"Id":"710351f6-2237-4523-af81-afa23166135e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Analysis On Fc Data","CreditHours":3.0,"Description":""},{"Id":"5110ac4f-dca6-4e3d-8df4-ccc17d2d4ba6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Concurrent And Distribed Appls","CreditHours":3.0,"Description":""},{"Id":"53448d91-8662-4c80-a692-22f9ce6f1543","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Collusion In RL","CreditHours":0.0,"Description":""},{"Id":"e3bfd2ea-a81d-4d0e-8648-adb0f9f11181","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Of VR/AR Devices","CreditHours":0.0,"Description":""},{"Id":"6a6b9ee1-912f-4a3f-9d77-7d4a73aabc9d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Wireless Network Research","CreditHours":3.0,"Description":""},{"Id":"8a85e2da-c604-4951-97b1-e3ad2cc6eb08","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"PFL Human Computer Interaction","CreditHours":0.0,"Description":""},{"Id":"9444c259-9e0b-4979-ac5c-cc8e8e5100a9","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Applied Compiler Design","CreditHours":3.0,"Description":""},{"Id":"2e8084b4-4372-44ed-9af2-2c6516c271e0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"NLP & AI For Social Analysis","CreditHours":0.0,"Description":""},{"Id":"88208009-1c40-428c-b526-0cfe754f1711","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Uncertain Database Testing","CreditHours":3.0,"Description":""},{"Id":"c554f670-beb9-46f2-94cc-319d1ea6c0ed","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Object Detection In Videos-POC","CreditHours":0.0,"Description":""},{"Id":"b0ec0f70-d534-49bc-b1e6-61418db62845","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Driven VR Perf Boosting","CreditHours":3.0,"Description":""},{"Id":"bd6ac558-947a-4038-9c8f-b9bfc21afbfa","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mass Parallel Data Streming","CreditHours":3.0,"Description":""},{"Id":"cae0f50c-0dfc-4d70-b567-cef652fa1d52","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Communication Mining In V2V","CreditHours":3.0,"Description":""},{"Id":"ce24595e-042a-410d-8709-f5665344c449","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Telementoring In VR-Space","CreditHours":3.0,"Description":""},{"Id":"c0022065-417a-48ba-97f0-31a8179065cd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Search Privacy","CreditHours":3.0,"Description":""},{"Id":"e08e4a12-c1b6-4718-b4cf-871d687edd26","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Blockchain Technology Seminar","CreditHours":1.0,"Description":""},{"Id":"e495a843-84b5-46c8-83b0-5128500f1799","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Science For Education","CreditHours":3.0,"Description":""},{"Id":"a509a59b-43e6-4d72-87b5-0d8d4cc6c35a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Question Answering Systems","CreditHours":0.0,"Description":""},{"Id":"c95dc0f9-9a2c-4d8e-b330-ebd4302fda4e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Visual Analysis Dist Syst","CreditHours":3.0,"Description":""},{"Id":"f03e654d-5e80-4d62-b56d-41315e9fee9d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Science Of Information Seminar","CreditHours":1.0,"Description":""},{"Id":"03b69672-835b-490c-abf0-3637157281fc","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning Meth For NLP","CreditHours":3.0,"Description":""},{"Id":"f1441032-cfcb-4765-8248-e6014177b463","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Study In Computer Networks","CreditHours":3.0,"Description":""},{"Id":"18d00f86-4784-4ada-b0fc-7904d5f9aeee","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobility Management Diagnosis","CreditHours":3.0,"Description":""},{"Id":"a4e238cf-5a7c-4770-b93d-59453b25e6fd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IoT Data Analytics","CreditHours":0.0,"Description":""},{"Id":"322ec5b2-5fc8-4fdb-8952-60b40aee4bb0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AR Application In Telemedicine","CreditHours":3.0,"Description":""},{"Id":"3c391615-39ac-42a0-bc76-4c35571ce455","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Analytics For Genetics Data","CreditHours":3.0,"Description":""},{"Id":"14a4bebe-c039-4bed-a940-5246a49071b3","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Clean-Slate Network Architectr","CreditHours":3.0,"Description":""},{"Id":"523336d4-46d9-448d-b5a9-ab877d4b639a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Embedded Systems","CreditHours":3.0,"Description":""},{"Id":"5770a65d-7132-476a-9220-e4c413664755","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sec & Priv Of 4G & 5G Net","CreditHours":5.0,"Description":""},{"Id":"9b1f0d08-bc8e-42be-a1fe-064274cb9f78","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"GR Robotics Project","CreditHours":1.0,"Description":""},{"Id":"9808030f-3fbe-4762-af4d-dcbbda4c580f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Secure MPC Over Noisy Channels","CreditHours":0.0,"Description":""},{"Id":"7b39a15b-7438-4880-99ab-511fdce08b44","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security In Computing Platform","CreditHours":0.0,"Description":""},{"Id":"693a3670-5967-4f1e-aced-f21276bd944c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer Aided Geometric Dsign","CreditHours":3.0,"Description":"Covers the fundamentals of Bezier, B-Spline and Subdivision curves and surfaces.  Competence in linear algebra and calculus is required. Students will implement the basic algorithms and learn about major applications of this technology. Open to CS Grad students and senior undergrads.  All others with instructor's permission only.   See:  https://www.cs.purdue.edu/homes/cmh/590-2017.3/."},{"Id":"78769ccf-850d-415a-9c9b-6aa200ede3bf","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deep Learning - Bioinformatics","CreditHours":0.0,"Description":""},{"Id":"731cc389-d65d-435e-9d53-f3fd0e01361e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Random Algo Num Linear Algebra","CreditHours":3.0,"Description":"Will cover the theory and practice of randomized algorithms for numerical linear algebra problems (RandNLA) suitable for large-scale matrix problems arising in modern, massive, data analytics. https://www.cs.purdue.edu/academic-programs/docs/cs59000RND.pdf"},{"Id":"77d22084-10ca-4d13-9b2b-79611b342105","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reasoning About Programs","CreditHours":3.0,"Description":""},{"Id":"7ee8a032-7227-4960-b949-9017076ffda7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adv Compliers Machine Learning","CreditHours":3.0,"Description":""},{"Id":"83d51cb8-a0cf-419d-8eb0-6b33f0838d53","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Internet Of Things Research","CreditHours":3.0,"Description":""},{"Id":"9526c471-9d71-441c-ab61-fe1d41995385","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Financial Network Design","CreditHours":3.0,"Description":""},{"Id":"9f17816f-bf7d-4f90-bdab-467a02dae9aa","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Machine Learning","CreditHours":3.0,"Description":""},{"Id":"1cc6323d-e33b-4811-b6a1-4647cc8f745b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Next Gen Wireless Networks","CreditHours":3.0,"Description":""},{"Id":"2dd6fafb-4497-4fc7-b714-8eba78edee17","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Uncertain Databases","CreditHours":3.0,"Description":""},{"Id":"6fac4a7b-a9aa-4fa1-a7d2-21f691958c25","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bias Mitigation In NLP","CreditHours":0.0,"Description":""},{"Id":"06f32fe6-f836-475f-8ca2-0c5fb210ce89","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Soft-Rigid Body Manipulation","CreditHours":0.0,"Description":""},{"Id":"03cf087c-5071-4096-b39e-cde863459541","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Of XR Systems","CreditHours":0.0,"Description":""},{"Id":"474b469c-d7f5-4a5e-9fb0-f1363970f83e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning In Systems","CreditHours":3.0,"Description":""},{"Id":"56ab11ca-9f0f-40f3-9203-2372113594d0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Entity Retrieval","CreditHours":3.0,"Description":""},{"Id":"593df36c-a3f8-4079-b6dc-9d0337029a1d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ASL Computer Animation","CreditHours":3.0,"Description":""},{"Id":"c7a83e07-ce54-49ea-ab5f-d333b908b14b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Inferring Buildings Globally","CreditHours":3.0,"Description":""},{"Id":"6e846d31-ac6f-4380-9378-31106f688b51","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Interactive Debugger For DS II","CreditHours":0.0,"Description":""},{"Id":"d67c3ff7-d551-43df-a5bd-eb18a99f727e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Wearable Security","CreditHours":3.0,"Description":""},{"Id":"d86860bd-b04a-401e-bb71-30a73a57c7d1","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Basic Geometric Computing","CreditHours":3.0,"Description":""},{"Id":"de358929-65f9-446f-b220-c23a2d739114","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deception In Security","CreditHours":3.0,"Description":""},{"Id":"66c3cf47-d247-4044-8204-41cc1a219e79","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"XAI For Security Applications","CreditHours":0.0,"Description":""},{"Id":"ceb48a78-33db-4399-a91c-dea33bd138c7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Systems Project","CreditHours":0.0,"Description":""},{"Id":"fe2f8b39-8bf0-4de4-a50f-5f6a1c6c1798","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embracing 5G & Beyond 5G (B5G)","CreditHours":3.0,"Description":"For more information visit https://www.cs.purdue.edu/homes/chunyi/teaching/cs590.html."},{"Id":"40428977-08bc-4b0b-96de-9297006b1d37","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Of GenAI Systems","CreditHours":0.0,"Description":""},{"Id":"3b7021e0-bb55-4ff9-a012-ed23e13e3012","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Retail Systems Development","CreditHours":1.0,"Description":""},{"Id":"42404336-1233-47e0-85e6-7bffb8952aa5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Building Infra Services","CreditHours":1.0,"Description":""},{"Id":"7474a71d-5c3b-4b79-9196-e2056fb840bd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Manycore Programming","CreditHours":3.0,"Description":""},{"Id":"13f6adf6-e167-45cf-a1cd-043817e0b9ab","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Information Assurance","CreditHours":3.0,"Description":""},{"Id":"15bd3084-a6e3-43f3-9ea4-098f244ede43","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Designing Tools At Expedia","CreditHours":1.0,"Description":""},{"Id":"1858fbc7-b03c-4c2c-a557-9433c151cd7f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Ranking Ads Facebook","CreditHours":1.0,"Description":""},{"Id":"18b2f152-e692-4d0f-b4ff-b57097542825","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Online Banking Prototyping","CreditHours":3.0,"Description":""},{"Id":"1f17f983-1dc4-46a2-b4b4-12e167dd574b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Design & Security","CreditHours":3.0,"Description":""},{"Id":"212dd505-e3cf-40bd-9c3f-593d6f9291a3","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deterministic Concurrency Ctrl","CreditHours":3.0,"Description":""},{"Id":"24ca76b8-8976-4387-914d-4bfba92b19ac","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Embedding Models","CreditHours":1.0,"Description":"Employment is required for this course."},{"Id":"2a49260c-828f-45f2-906a-d147791e5a67","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"CSG PD Switching Development","CreditHours":1.0,"Description":""},{"Id":"2a55a2f5-b85a-4532-9c96-7093d7d00513","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Recommender Systems","CreditHours":1.0,"Description":""},{"Id":"2e2d30b7-3883-4d86-847e-5b03e20258df","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Retail Technology Development","CreditHours":1.0,"Description":""},{"Id":"382ee208-f93a-444e-801b-484aa5f7b42d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Optimizing Data Integration","CreditHours":1.0,"Description":""},{"Id":"392e235b-c078-456b-87ff-ea9840a817a9","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Health Care Data Analytics","CreditHours":1.0,"Description":""},{"Id":"47fb2e5a-2f48-48fe-a012-0c8bbef184f1","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Identity Matching Facebook","CreditHours":1.0,"Description":""},{"Id":"4bfe02e4-4c1c-467c-9f00-1b9b341fa68e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IOT Security Research","CreditHours":1.0,"Description":""},{"Id":"4d5c4282-9c8c-407d-affc-f1c5dd3cb5ba","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IoT Applications","CreditHours":1.0,"Description":""},{"Id":"5160a4bd-c84e-4ccf-8b7a-adee343889db","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Anomaly Detection On Sys Data","CreditHours":1.0,"Description":""},{"Id":"54241271-e9d6-485e-992a-f8a5dee92403","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Ind Research In Cyptography","CreditHours":3.0,"Description":""},{"Id":"5580bfea-0894-4c7e-8477-84925e79a613","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Community Shopping Analytics","CreditHours":1.0,"Description":""},{"Id":"786e6dbb-18b1-4d6f-934a-dedc99fdd199","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Tpcs Protein Bioinformatics","CreditHours":3.0,"Description":""},{"Id":"5eedb619-6991-49a1-97ba-7d45d92bb0e8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud App Engg Intern Aruba","CreditHours":1.0,"Description":""},{"Id":"5f046823-6597-4c1a-b92c-4a63ce22a7ad","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Visualizing Self Driving Cars","CreditHours":1.0,"Description":""},{"Id":"611dc545-e287-4a35-8ad6-a054daccb78e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Analytics Development Intern","CreditHours":1.0,"Description":""},{"Id":"670afd43-bad5-4336-a55a-ed05b71b0d4f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Amazon Big Data Technologies","CreditHours":1.0,"Description":""},{"Id":"6b14b685-ded1-435d-831f-3a1321c6da3b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Android Software Development","CreditHours":1.0,"Description":""},{"Id":"70960393-26e9-4561-b12b-859743ae9f93","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Content Anlys For Cloud Drive","CreditHours":1.0,"Description":""},{"Id":"75b1bd06-9262-48aa-b61b-2a58fc8e2267","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning For Networks","CreditHours":3.0,"Description":""},{"Id":"7cf1457d-e7e5-45a2-b2ec-2050c208cdbb","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Architecture","CreditHours":1.0,"Description":""},{"Id":"7ec03e24-9886-41ef-87e5-3b063f9b6f44","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Explainable Machine Learning","CreditHours":1.0,"Description":""},{"Id":"818f93de-97e1-4c56-b26f-59c78bf3092e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Scalable Data Analytics","CreditHours":1.0,"Description":""},{"Id":"83404aab-c539-43f8-83fb-09b2f07b23a4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"NLP Implementation","CreditHours":1.0,"Description":""},{"Id":"582a1cfa-46b6-45bf-9b2c-f0fe6ab5fa5c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Object Detection Using ML","CreditHours":0.0,"Description":""},{"Id":"86d77da0-90c0-4406-a1f1-b5d46543dcb4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Comput Mthds For Pop Genetics","CreditHours":1.0,"Description":""},{"Id":"86f20ff2-c0d4-457d-9b62-d30b7f94aa57","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Engineer Intern","CreditHours":1.0,"Description":""},{"Id":"87a88b7d-7ba6-4901-8520-715caf8735d5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Soc Development","CreditHours":1.0,"Description":""},{"Id":"88d5bd64-4d94-4a44-9af8-bbc69bfcd3e2","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Transaction Risk Management","CreditHours":1.0,"Description":""},{"Id":"8b715fdc-795f-4c32-9d60-ff18fb667f81","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"HTTP Fingerprinting Models","CreditHours":1.0,"Description":""},{"Id":"921480f8-c369-4ed5-b74a-57f6b7c50469","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Hyperledger Technology At IBM","CreditHours":1.0,"Description":""},{"Id":"93b765dc-e6ea-4d8d-b7bc-74368e9474b7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Nvm And Multi Core Drivers","CreditHours":3.0,"Description":""},{"Id":"9699d675-ae38-4f10-8d60-c5c58970a7ca","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"NL Text Topic Classifier","CreditHours":1.0,"Description":""},{"Id":"9ad13331-c3ba-4205-9537-2cd20045b028","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Facebook Software Engr Intern","CreditHours":1.0,"Description":""},{"Id":"a3362b53-c1d3-4309-a17a-f2d41c8c39de","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Routing Software System","CreditHours":1.0,"Description":""},{"Id":"7ecade30-0b30-49d3-8cd7-16cccba085b0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Coloring Algorithm And Softwar","CreditHours":2.0,"Description":""},{"Id":"afce0849-d6fb-4c16-9dc6-c382281d2808","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Microsoft Internship","CreditHours":1.0,"Description":""},{"Id":"b09cedbf-f58d-435c-949b-280c705b8db6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Design Gaming Service SDK","CreditHours":1.0,"Description":""},{"Id":"c76b7b7e-b3fb-435a-b8ff-248ad59ce29e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Building Platform For Kindle","CreditHours":1.0,"Description":""},{"Id":"c93b60bc-26ba-411d-8cd0-cd4a4599585b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Simulation Of Autonomous Cars","CreditHours":1.0,"Description":""},{"Id":"cff606b9-ab3a-4c5e-bd8d-35851d957d64","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Service Development","CreditHours":1.0,"Description":""},{"Id":"d0b7d007-9efd-495e-8943-d65bf3a1c8ee","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Study Of V2V Using ITETRIS","CreditHours":3.0,"Description":""},{"Id":"d55a0ba1-28ff-4916-91fb-57e888305627","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Program Testing & Ver Prac","CreditHours":1.0,"Description":""},{"Id":"e46923d2-b1cb-4eca-bbb3-cd86451e98c6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Binary Security Analysis","CreditHours":1.0,"Description":""},{"Id":"3a9af865-98fa-4f23-aa5f-77b8a0a6e044","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Learning Based StockPrediction","CreditHours":0.0,"Description":""},{"Id":"297847a0-4f96-4082-b5ed-343080b6f3c5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Human In Loop UI II","CreditHours":0.0,"Description":""},{"Id":"9d784a75-b16c-4c92-8306-a4e29b53d730","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Stealthy Debugging","CreditHours":3.0,"Description":""},{"Id":"b08b6a22-e61a-42a6-96de-f5fede75e3cb","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Randomized Algorithms","CreditHours":3.0,"Description":""},{"Id":"c7de37bd-f374-433f-8381-d8a5b4dbd4d6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cryptanalysis Of Rsa Cipher","CreditHours":3.0,"Description":""},{"Id":"d424ee26-c7ce-4fd0-9c13-81244459b4c8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adding OOPS Support To FASTR","CreditHours":3.0,"Description":""},{"Id":"e6ec1b67-c90e-48dd-bb75-7f52f18a82b2","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Vis Analysis Higher Ed Data","CreditHours":3.0,"Description":""},{"Id":"ceaead00-250e-47b9-849b-e55155f6129c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Redundancy &Diversity In Heter","CreditHours":0.0,"Description":""},{"Id":"f77fbfa4-d913-4a3e-8585-7c7b0cf26dfc","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Analysis Design","CreditHours":3.0,"Description":""},{"Id":"af4ec1d9-9b8d-438b-ab9a-4ac8d8b72127","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Defined Network Dsgn","CreditHours":1.0,"Description":""},{"Id":"31470b9d-6e80-4f15-95a8-12b081f989bd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"RL For Robotics","CreditHours":0.0,"Description":""},{"Id":"e87bb4de-8e50-4ef7-bb29-55657d962fb9","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML For Vulnerability Analysis","CreditHours":0.0,"Description":""},{"Id":"502761ed-4f22-4607-b10b-d32641216b01","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"High Perf Mem Allocation","CreditHours":0.0,"Description":""},{"Id":"2b66bcca-f66b-46ea-be74-bf6b8dfa2773","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Scrum Software Devpmt Research","CreditHours":3.0,"Description":""},{"Id":"afda72ab-c8ed-44da-b4d7-683376382342","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI-based Programming","CreditHours":0.0,"Description":""},{"Id":"5626393f-13a8-4ed0-88e6-1f04a06501d6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Lattice Based Cryptography","CreditHours":3.0,"Description":""},{"Id":"bc62d4f0-dbc5-436b-8d2e-ecc99ee550cf","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Foundations Of CS","CreditHours":1.0,"Description":"Basic logic and proof methods; recursion and induction. Introduction to data structures. Sorting, searching, basic graph algorithms. Algorithm design and analysis techniques. Covers material from CS 182 and CS 251."},{"Id":"5fb63165-5375-41be-9609-50c57d12b5f8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Software Testing","CreditHours":3.0,"Description":""},{"Id":"768b1f41-ccaf-4550-9978-78cfbd343c2b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Dynamic Program Analysis","CreditHours":3.0,"Description":""},{"Id":"7c1bf87e-c18e-4040-ba93-e08f282efeaa","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Binary Program Analysis","CreditHours":3.0,"Description":""},{"Id":"def30649-2303-4c32-91af-df28c14927c0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cognitive Robotics Research","CreditHours":0.0,"Description":""},{"Id":"acd1bee1-a96a-4e1b-8b35-03964966690f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Usability Study","CreditHours":3.0,"Description":""},{"Id":"b7065391-5360-40ce-a364-c44382ff06e7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Secure Architectures","CreditHours":3.0,"Description":""},{"Id":"c93f6d6b-7b4d-4ccf-b010-e5b45385db81","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"QOS In Complex Networks","CreditHours":3.0,"Description":""},{"Id":"d2668cfd-aa3b-4f34-9d4b-b1959ac8f258","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Robust Kernel Patching","CreditHours":3.0,"Description":""},{"Id":"d3cad5a6-6754-444a-8285-df3fb4ec6b1d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Algorithms In Microbiology","CreditHours":3.0,"Description":""},{"Id":"d624656f-6071-452f-ac6c-5de606ddaa40","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Model For Data Analysis","CreditHours":3.0,"Description":""},{"Id":"e29581d8-0b77-4572-9a8d-81e56404e318","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Operating Sys Level Security","CreditHours":1.0,"Description":""},{"Id":"dec3608c-bfba-42f7-93b5-8a84e336d18c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computing For Life Sciences","CreditHours":3.0,"Description":""},{"Id":"f53d9f6c-c1da-4de4-9c02-f1bd03b6683d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Policy Guided Isolation","CreditHours":3.0,"Description":""},{"Id":"b2226245-633f-4db9-9249-65f11da8ddf7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multi-Agent Planning With STL","CreditHours":0.0,"Description":""},{"Id":"007e7554-50be-4988-9857-37a3d8b51f1e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Financial Software Eng","CreditHours":1.0,"Description":""},{"Id":"0464e04c-f958-4c99-bc3e-438caf91a7d8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Infrastructure For Dist System","CreditHours":1.0,"Description":""},{"Id":"06b2568b-a9e1-4ba8-ab6e-eb2e189f1125","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning Applications","CreditHours":1.0,"Description":""},{"Id":"0c854ca9-6281-47fa-a369-2c05ca663ec7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Algorithm For Wireless Device","CreditHours":1.0,"Description":""},{"Id":"2a3620ba-6f3d-4372-8a19-e6af9b65b9f2","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Recovery Of Virtual Machines","CreditHours":1.0,"Description":""},{"Id":"2aec4d09-671b-40ad-8c14-6a7e1e3f9e50","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Of Apple Core OS","CreditHours":1.0,"Description":""},{"Id":"31d9011f-9a8d-4f8d-a7c6-561c918f3471","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Server Tools Development","CreditHours":1.0,"Description":""},{"Id":"339f165c-51eb-4e89-9a55-acb27ca57836","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Mining On Social Network","CreditHours":1.0,"Description":""},{"Id":"3b839c27-575b-4624-94a5-f73d9e49b1a1","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Graph Matching","CreditHours":1.0,"Description":""},{"Id":"621e9c11-3460-4d65-b28c-770b8f367e11","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Spatial Web Data Managment","CreditHours":3.0,"Description":""},{"Id":"76c9bea4-10d7-4e60-9b48-3da01547bd93","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Hardware Security","CreditHours":1.0,"Description":""},{"Id":"794d3054-4c1d-4fce-8707-92e5deadb6cd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bpel Debugging For Web Service","CreditHours":3.0,"Description":""},{"Id":"798b720e-5ee2-4337-ae73-2ce0ae292db1","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Dsgn & Exe Info Security","CreditHours":1.0,"Description":""},{"Id":"88d1da12-3383-4fa7-b623-a678cc8ad631","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Integrated Management Of Data","CreditHours":1.0,"Description":""},{"Id":"9332ca97-2322-42c4-be0d-1623927a436b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Parallel Inference With GPU","CreditHours":3.0,"Description":""},{"Id":"a64f716c-af17-4df1-bdc8-caf69e9a97d7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adv Information Processing","CreditHours":1.0,"Description":""},{"Id":"a7208ca5-8707-4acf-a580-16194145f966","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Design Patterns In Python","CreditHours":1.0,"Description":""},{"Id":"b356b5fd-5dd5-4c89-aaf5-22d4eda2f9c6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Security","CreditHours":1.0,"Description":""},{"Id":"bae57010-7b0b-4d89-b8ae-8058d0fdf8c7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Storage Management","CreditHours":1.0,"Description":""},{"Id":"c66060d9-cf84-4939-af52-e03f58ed95e6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Structured Data Collection","CreditHours":3.0,"Description":""},{"Id":"d3c92ef2-ca53-4608-987c-bb3c490d6a83","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Dynamic Resource Allocation","CreditHours":1.0,"Description":""},{"Id":"e4e8f2fe-1420-49da-8908-d79f6012a237","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Response Center Experience","CreditHours":1.0,"Description":""},{"Id":"e58c5bd7-d99a-4999-8287-2e0efea5c398","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Center Technology","CreditHours":3.0,"Description":""},{"Id":"ec42e6c3-fa81-428b-b5ff-db9158dc8465","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Center Networks","CreditHours":1.0,"Description":""},{"Id":"f22c536d-ddd1-488a-8476-d025d2b9e1b5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Finance Analytics","CreditHours":1.0,"Description":""},{"Id":"f28814a8-48b2-4d26-85a4-c38e51aeda77","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Automatic Differentiation","CreditHours":1.0,"Description":""},{"Id":"f38fff19-2c38-4de5-8eb7-7c0640a7448b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded Sw For Second Screen","CreditHours":1.0,"Description":""},{"Id":"f8609eeb-fa81-43be-b133-572b2cfc75bb","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Load Balancing","CreditHours":3.0,"Description":""},{"Id":"f98795d4-fd2d-4827-a355-0e4aeb296942","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Operating Systems Analysis","CreditHours":1.0,"Description":""},{"Id":"ff48c5d4-84fa-4473-aa8b-d8d4188a3a3c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Database Design","CreditHours":1.0,"Description":""},{"Id":"9d83ffc2-fa6a-4800-9e37-f31700703c04","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adv Topics Operating Sys","CreditHours":3.0,"Description":""},{"Id":"c34cddea-2010-439a-8586-dd4c2f79cf36","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multi Robot Project","CreditHours":0.0,"Description":""},{"Id":"1b330d8e-29ea-443d-aa15-5922fead4579","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Oracle Based Shortest Path Alg","CreditHours":0.0,"Description":""},{"Id":"15bc58da-0d0d-4958-9565-0840cf0c2d2e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Hub C1 Programming","CreditHours":1.0,"Description":""},{"Id":"f9988c46-876b-453a-a16e-2f5d4d5eb0a5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Of Generative AI","CreditHours":0.0,"Description":""},{"Id":"42cbc4bc-334a-4129-a5cf-8608dbc1075e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Proc-Oriented Sim Experiments","CreditHours":0.0,"Description":""},{"Id":"3c052f51-b85f-4b15-8e2a-02d1f4e57f92","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Ntwrk Sci & Machine Lrng II","CreditHours":3.0,"Description":""},{"Id":"d038a9ae-43b3-4e8d-b841-45b21dc5d990","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Code Generation Using Gen AI","CreditHours":0.0,"Description":""},{"Id":"448b118e-82a1-40ac-a818-ff00937fe37d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Personal Application Whitelist","CreditHours":3.0,"Description":""},{"Id":"3e3583f5-c7b6-4ee6-9df9-70aec88fda0f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"NLP-Augumented Attack Investig","CreditHours":0.0,"Description":""},{"Id":"4e95f17a-67b8-4a85-aa61-3e5782d63a21","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adv Topics In Computer Sci","CreditHours":3.0,"Description":""},{"Id":"0516252e-8e48-4007-a1ac-8dcdc0f42d26","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Protocol Reverse Eng","CreditHours":0.0,"Description":""},{"Id":"43bf2359-0b11-4bf7-a871-a56ebd8cbe3a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Neuro-Symbolic Data Labeling","CreditHours":0.0,"Description":""},{"Id":"5931ef68-d9db-452e-a5fc-8b99b9d3fa1e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Parallel Compilers","CreditHours":3.0,"Description":""},{"Id":"b90e5449-7bd4-4147-a95e-42229a3e332f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Location Optimized Data System","CreditHours":0.0,"Description":""},{"Id":"5aaea2d9-1c97-46a8-809a-da78b9c78fb1","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Port Xinu Os To Arm","CreditHours":3.0,"Description":""},{"Id":"5fde1d79-3179-4c3f-8250-6058834fd9b4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Image Steganography","CreditHours":3.0,"Description":""},{"Id":"66d7f137-17f2-417c-a534-81b0b83d4553","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adv Tpcs In Bayesian Learning","CreditHours":3.0,"Description":""},{"Id":"6b68a5df-5f55-4cec-807d-a1cd2d7a1722","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Algorithms In Systems Biology","CreditHours":5.0,"Description":""},{"Id":"71b600d2-99a4-4cf6-856d-8c99aec7eaf8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Anomaly Detect Telemetry Data","CreditHours":3.0,"Description":""},{"Id":"95fd105a-d3ab-40bd-88fb-a8e70567ae7f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"LLM For Code Generation","CreditHours":0.0,"Description":""},{"Id":"88a96ffa-f5a5-4d06-828c-1ea1d3ce5d3b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning Algorithm","CreditHours":3.0,"Description":""},{"Id":"9322a8c4-ba34-4796-ad0b-875add62f0b5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Approximation Algorithms","CreditHours":3.0,"Description":""},{"Id":"9db62268-58d8-4de1-9f06-1da0d45b2d89","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Elements Of Network Science","CreditHours":3.0,"Description":""},{"Id":"a89af86b-a607-4c20-8e60-b53af8e9574a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Zigbee Wireless Networking","CreditHours":3.0,"Description":""},{"Id":"aff8a406-c576-4853-9eed-65758facb497","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Applied Information Security","CreditHours":1.0,"Description":""},{"Id":"9e477dc8-1b89-4c63-8596-626c5231e009","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"LLM Reasoning/Alignment Study","CreditHours":0.0,"Description":""},{"Id":"b432c437-8cbb-48c5-8eb9-827d1560f252","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sensor Cloud","CreditHours":3.0,"Description":""},{"Id":"a14921c5-fa43-4bfb-b051-fa265752adba","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Gradient Based DLP Sampling","CreditHours":0.0,"Description":""},{"Id":"b9a72521-8f06-4733-a037-bb7334901ad3","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adv Topics In Computer Sci I","CreditHours":3.0,"Description":""},{"Id":"d619081b-9730-4d5a-a9d1-40adb75a6022","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Response Center  Experience","CreditHours":1.0,"Description":""},{"Id":"44822cbf-9768-454f-afb2-7cfdb7d49a3a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Gilvenko Cantelli","CreditHours":0.0,"Description":""},{"Id":"3d7ea37f-a748-46a9-9129-5178eb3712ef","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Systems Study","CreditHours":0.0,"Description":""},{"Id":"fe3fe26f-928a-42d2-b9c7-03df57ab4aa9","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Secure Cloud Processing","CreditHours":3.0,"Description":""},{"Id":"51af0b87-fba5-47cc-bc27-5443338e85c1","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reasoning Evaluation In LLMs","CreditHours":0.0,"Description":""},{"Id":"1fdf8eba-b1f4-40ff-84fd-0833a5d02849","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Graph Compression","CreditHours":3.0,"Description":""},{"Id":"25a09044-45ca-4945-a8e3-d357679da6af","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Hub-Ri Programming","CreditHours":1.0,"Description":""},{"Id":"bb27d9a1-5039-4c3a-a9a0-8107a769e0ce","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Team-Leader-CRP-BASF","CreditHours":0.0,"Description":""},{"Id":"3c8e6b8d-5d27-44b6-b704-85b23f3a1ef7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Transfer Learning","CreditHours":3.0,"Description":""},{"Id":"46bbb464-b3f2-4a51-a2e7-ff829dfbf463","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Analysis","CreditHours":3.0,"Description":""},{"Id":"f8d5efe3-13a4-4e8e-84f9-f521470db955","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Extented Reality","CreditHours":3.0,"Description":""},{"Id":"4795d74c-eb58-4034-9b85-b9cda8f8dd51","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Low Power Wireless Protocols","CreditHours":3.0,"Description":""},{"Id":"4a576789-2de2-4ef2-a918-4aeaf204d110","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Analytics","CreditHours":3.0,"Description":""},{"Id":"4d71d077-1a4e-4867-a926-c8c3484db25d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Private Data Analysis","CreditHours":3.0,"Description":""},{"Id":"50c01f14-a2f7-4708-8940-0028b8190ecb","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Android Security","CreditHours":3.0,"Description":""},{"Id":"55531466-d743-40fa-aa7d-49263085a80e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Data Center Vivtualizn","CreditHours":3.0,"Description":""},{"Id":"75bf6ae8-e23a-4f6d-aeb0-179f7cb805c2","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Extended Reality","CreditHours":3.0,"Description":""},{"Id":"6ba37070-dc5f-4db1-a15a-6a4a94c9557c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adv Topics In Comp Sci","CreditHours":1.0,"Description":""},{"Id":"739ca7b8-827a-4c17-9447-c550a527ed84","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Decision Support System Devel","CreditHours":3.0,"Description":""},{"Id":"82136257-840d-4a76-9153-18c418883dd8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Directed Rdg Computer Ethics","CreditHours":3.0,"Description":""},{"Id":"8ef0b06d-ea3f-4e7f-9c3c-85fbda2eacb7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adv Topics In Computer Science","CreditHours":5.0,"Description":""},{"Id":"81ff2251-620d-4c94-9042-b7c6e650cfce","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Computing","CreditHours":0.0,"Description":""},{"Id":"97b1556e-5552-49c7-9808-ac3244310537","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Performance Analysis On Vmware","CreditHours":3.0,"Description":""},{"Id":"7c6b62c6-0217-4c48-b77b-e8e47c4ddfcb","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Zero Trust Architectures","CreditHours":0.0,"Description":""},{"Id":"d21beaed-1ae1-4fdc-a60d-7025bbe49897","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mbest Vs Msd","CreditHours":0.0,"Description":""},{"Id":"b795830b-f7c9-4d2e-99c1-5f9d1bfe12dd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Openflow On Xinu Os","CreditHours":1.0,"Description":""},{"Id":"bc9de524-34af-4839-90c4-4336386c2a43","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Fault Management In Mapreduce","CreditHours":3.0,"Description":""},{"Id":"bd4f9aa1-5ac8-4e29-9311-f0ae2a021b43","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adv Tech For Network Mgmt","CreditHours":5.0,"Description":""},{"Id":"c54746e1-36f4-47ed-9c79-e17bab3ad775","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Parallel Hybrid System Solver","CreditHours":3.0,"Description":""},{"Id":"d8399e4a-6d1a-461f-bd69-017926cb8013","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Efficient Core Router Design","CreditHours":3.0,"Description":""},{"Id":"dcf7be5e-acfd-485d-897f-8cc77c3a2c56","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Current Tpcs In Theoretical CS","CreditHours":3.0,"Description":""},{"Id":"e44f9ac0-2c55-499d-9ca7-096ae2ea7c4a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Analysis Of Big Data Logs","CreditHours":3.0,"Description":""},{"Id":"e6d5649b-c426-4fd4-8387-e74f8b78a64d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Agile Software Development Res","CreditHours":3.0,"Description":""},{"Id":"76763a52-1890-4a66-bf36-880af09ecc3f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Numerical Comput For Data Sci","CreditHours":1.0,"Description":"Linear algebra and vector spaces, linear systems and Eigenvalues; linear regression and least squares; fitting data to models; high performance computing. Covers material from CS 314."},{"Id":"f67a358a-4f3d-4e8c-b3f8-0309be64c267","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Information Extraction","CreditHours":3.0,"Description":""},{"Id":"0c0c8617-8ec7-4769-919f-37ce5ff5010d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Modem Software","CreditHours":1.0,"Description":""},{"Id":"151fdbb2-525b-4bb3-b088-3c35688fb8fc","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Parallel Graph Matching","CreditHours":1.0,"Description":""},{"Id":"1f46dfc2-e243-4889-8c49-34e37b062de9","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Study In Cloud Infrastructure","CreditHours":1.0,"Description":""},{"Id":"2860deb3-3615-4ff6-8356-2c2813e6ce50","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud & Data Center Management","CreditHours":1.0,"Description":""},{"Id":"d3d5586f-45f7-4d86-9f1a-b28fb859eff4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Guided Robot Learning","CreditHours":0.0,"Description":""},{"Id":"3b8a97f6-37e8-4e25-8661-fcef13d0b6a2","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Center Security","CreditHours":1.0,"Description":""},{"Id":"44b5dc0f-63f6-4499-bdf3-c4380b58a20b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Management Internals","CreditHours":1.0,"Description":""},{"Id":"4e227b37-20e3-468b-bc74-c44f0c011838","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research Topics In 3D Graphics","CreditHours":3.0,"Description":""},{"Id":"4f029fa4-efb8-4ea9-ac1d-6917786dd05d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Jquery And Ksh Development","CreditHours":1.0,"Description":""},{"Id":"6e40d161-dd97-496e-8b77-5dadd1e6aaa0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Android Platform Security","CreditHours":3.0,"Description":""},{"Id":"71d5e9c4-d0bf-4031-a0e4-b9cd5fc6fd69","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Systems","CreditHours":1.0,"Description":""},{"Id":"731e2f4f-40ec-4d39-ba3a-fdfb3e2f12a8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Private Data Publishing","CreditHours":3.0,"Description":""},{"Id":"7aafa5b3-77be-43d3-87d4-93a3fc381ec7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Xinu Kernel Design","CreditHours":3.0,"Description":""},{"Id":"b4338507-e5de-44d1-851d-00fa948fc2ba","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Systems","CreditHours":0.0,"Description":""},{"Id":"7fd5b8c5-ac35-48ea-b708-1ac21ccd5a34","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reflective Distributed Program","CreditHours":3.0,"Description":""},{"Id":"8041308e-b9eb-42ed-917b-d5c753449755","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Info Assurance & Compl Mgmt","CreditHours":1.0,"Description":""},{"Id":"848e91cd-087f-43b3-8616-2915f80d4a8a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Linux Kernel Systems Software","CreditHours":1.0,"Description":""},{"Id":"869f3a55-39dd-495a-8a16-ee4ce2b6891e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Industrial Internship","CreditHours":1.0,"Description":""},{"Id":"93241a99-1b3c-482a-80d2-5ffe49e216c0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Semantic Web Databases","CreditHours":3.0,"Description":""},{"Id":"98d397bd-47aa-4f8f-816c-c811c236e9e5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Tracing","CreditHours":1.0,"Description":""},{"Id":"9b45fe6e-65e1-4471-9666-bdb80bb5c7a2","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Computing On Data","CreditHours":1.0,"Description":""},{"Id":"a088a948-0cc7-475b-acde-0e0c12bff33a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Programming","CreditHours":1.0,"Description":""},{"Id":"a8d15496-66f4-4d8e-a7f6-dd23d1b6f9dd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Markov Chain Monte Carlo Metho","CreditHours":1.0,"Description":""},{"Id":"aeb38515-96fa-4499-875d-9158621c2469","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Analysis Of Algorithims","CreditHours":1.0,"Description":""},{"Id":"b34f5233-3f64-4be9-abb1-fe5bb92a6eed","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Social Network Core Systems","CreditHours":1.0,"Description":""},{"Id":"b6c2f6d0-97c0-44c3-9b6f-d6b2debe072a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Support Of Web-Based Searching","CreditHours":1.0,"Description":""},{"Id":"b78f3e38-a314-49db-8a41-4ca58e5555c5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Research Project","CreditHours":1.0,"Description":""},{"Id":"be1d8935-333b-4da1-86f0-9d3f78569060","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Networking","CreditHours":1.0,"Description":""},{"Id":"c13e1898-2d4d-4e6b-9667-c19974586da9","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Data Storage","CreditHours":1.0,"Description":""},{"Id":"ce5a5647-f045-44d0-9979-0f8fd949d068","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Social Network Analytics","CreditHours":1.0,"Description":""},{"Id":"d7a24330-9e6e-45aa-b9ce-bbb4357a476d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mapin Project","CreditHours":3.0,"Description":""},{"Id":"defb5bb2-2ea7-4a4e-83a6-b23d2b5d978a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Hub Programming & Developing","CreditHours":1.0,"Description":""},{"Id":"fe087f86-9f60-4d24-ad3e-d098a8b6fed6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Modem Software","CreditHours":1.0,"Description":""},{"Id":"17e1e3e8-c5ff-4062-89ec-ab2e16be4fb7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Engineering Via LLM","CreditHours":0.0,"Description":""},{"Id":"1198396f-dffd-45ca-af9b-0d6eb704b923","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Secure Computations In Cloud","CreditHours":3.0,"Description":""},{"Id":"12b90494-263b-4db2-b367-43c3b7be1323","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computat Mthds In Optimization","CreditHours":3.0,"Description":""},{"Id":"1323f07b-4565-4f85-bd48-1358edf3fa71","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded Systems","CreditHours":3.0,"Description":""},{"Id":"7d1e0858-a23d-40bc-95f8-48db61324f83","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Domain Adaption Graph Networks","CreditHours":0.0,"Description":""},{"Id":"7e3fa9d2-7c21-4a91-95ea-b24bb52c8ec7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Leak-Resilient Secret Sharing","CreditHours":0.0,"Description":""},{"Id":"82aa5f7c-e6c0-4ea1-a818-dacafa4bbbe5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"CS Independent Study","CreditHours":0.0,"Description":""},{"Id":"1e7d722d-4dc8-43f2-b624-8f521f04cef6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Analysis Of Wikipedia Feedback","CreditHours":3.0,"Description":""},{"Id":"a00c72a2-abfc-4201-bfdb-48e586ffe8eb","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multicast AI Research","CreditHours":0.0,"Description":""},{"Id":"dbc5461d-de53-4cb6-9dfd-0eb5807b486d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To VR/AR","CreditHours":3.0,"Description":""},{"Id":"749f9358-c5d6-4f6b-ae55-93be22d6ae53","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Theoretical Computer Science","CreditHours":0.0,"Description":""},{"Id":"6b9410ab-0624-49a1-8636-6c43d9ff80d4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Social Issues And Security Ind","CreditHours":0.0,"Description":""},{"Id":"b94830dc-696b-4402-9240-5382813f92be","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Decentralized Anonymous Creds","CreditHours":0.0,"Description":""},{"Id":"be1e1342-99fa-4991-ad2e-81af68a6f7ec","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"DNN In Networking","CreditHours":0.0,"Description":""},{"Id":"2ddb8ddb-ee35-4a3a-94f8-ef479203b33c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security In Active Bundles","CreditHours":3.0,"Description":""},{"Id":"5cfe0cc6-4cbd-483a-b719-dbbbaae1937b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI In Graphics","CreditHours":0.0,"Description":""},{"Id":"353fb3d5-c56f-4219-ad5b-03eb7a557b18","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Analitics","CreditHours":3.0,"Description":""},{"Id":"38ba2af0-f2e2-4b3f-b095-d9379be87ff8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Address Space Rand","CreditHours":3.0,"Description":""},{"Id":"53dace3f-df3c-49a6-bede-5e5695687f01","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IoT And Mobile Security","CreditHours":0.0,"Description":""},{"Id":"eaf2d9e1-9972-4d13-9384-716ca86e9b77","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Secret Sharing Leakage","CreditHours":0.0,"Description":""},{"Id":"439688eb-8df4-4dc7-8542-cfee057a50d8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Data Center Connection","CreditHours":3.0,"Description":""},{"Id":"47dc1a44-1753-48cc-9c64-8bdc8b057ad5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intro To HumanComputerInteract","CreditHours":3.0,"Description":""},{"Id":"8597488a-1385-4067-b927-cce325f13e90","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML Human Pose Analysis","CreditHours":3.0,"Description":""},{"Id":"8811e957-603e-4956-9744-ff9a9fc6a80b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML In Video Analysis","CreditHours":3.0,"Description":""},{"Id":"9eca20d3-8483-47a3-b883-ba9559a3f23a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Individual Study","CreditHours":3.0,"Description":""},{"Id":"53278d49-1db2-4383-b98b-e1fc6dc230dd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Domain Adaptation","CreditHours":0.0,"Description":""},{"Id":"c6d4d189-7669-4391-80c1-3420d639f97d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"SMR And Blockchains","CreditHours":3.0,"Description":""},{"Id":"e3cfa8ee-eca9-4cda-be25-bd7c1e32933d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Anly Survlnc Vid Data Using ML","CreditHours":3.0,"Description":"Analysis Of  Surveillance Video Data Using ML"},{"Id":"19b84f0c-c347-4641-a283-7bf70488fe75","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Artificial Intelligence","CreditHours":3.0,"Description":""},{"Id":"36c8581a-7cfb-4329-849e-0302c3646d97","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Location Privacy Via Anti-ML","CreditHours":0.0,"Description":""},{"Id":"5988b2b3-f002-4704-962f-1e67582510ec","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Grad School Match","CreditHours":3.0,"Description":""},{"Id":"32560130-2681-4dab-be05-7044e071d907","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Practical And Applied Crypto","CreditHours":3.0,"Description":"This course has been identified for the Spring 2021 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Spring 2021."},{"Id":"5f57063f-ea41-4779-96bc-c03bfbbe9489","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Performance Metrics","CreditHours":3.0,"Description":""},{"Id":"294b0c89-7e80-4dee-8455-84bbe9be8190","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research On VR/AR","CreditHours":0.0,"Description":""},{"Id":"5f688785-535f-458e-b136-bb452c468c2e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Rec In Distributed Systems","CreditHours":3.0,"Description":""},{"Id":"93190669-0cb8-4cf6-a8c5-f9bcdb49adf1","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topological Data Analysis","CreditHours":3.0,"Description":""},{"Id":"9c5ea3e2-817a-4384-8132-b7377d7308eb","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Tools For TLS FingerprintingII","CreditHours":3.0,"Description":""},{"Id":"bafb141c-3331-46c3-be83-40eaa2aa072c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Cryptography","CreditHours":3.0,"Description":""},{"Id":"67d4f7a0-7f24-4c4c-9666-5977cc5634a0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Submodularity & Soc Networks","CreditHours":3.0,"Description":""},{"Id":"cbcdf9df-ceed-4839-9922-0e6250cd8537","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Computing Systems","CreditHours":3.0,"Description":"This course has been identified for the Spring 2021 Online Catalog that will serve students who are pursuing the fully online option.  The fully online option serves students who cannot or choose not to come to campus for Spring 2021."},{"Id":"cc7e6867-e006-4971-a62e-5570280a961a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Zoom In With Image Assistance","CreditHours":3.0,"Description":""},{"Id":"a393b2a4-87d1-49f5-86e1-c2dc4f2ff320","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Quantum Computing Immersion","CreditHours":0.0,"Description":""},{"Id":"21363ae4-f607-431a-a150-bb627285842b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mathematics For Theoretical CS","CreditHours":0.0,"Description":""},{"Id":"d63d7930-e5a2-4e9c-a7d1-f4645f62093c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Numerical Computing Data Sci","CreditHours":1.0,"Description":""},{"Id":"1d1ec173-4b20-4834-a43d-a6ddf0675a3c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Theoretical CS & Graph Theory","CreditHours":0.0,"Description":""},{"Id":"6971ef17-07ec-48a4-bbd0-48d713ec476a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Sci Machine Learning","CreditHours":3.0,"Description":""},{"Id":"f8b8cfae-1dfb-428a-9997-7805cbaec836","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Inverse Procedural Modeling","CreditHours":4.0,"Description":""},{"Id":"fb8fa439-f270-4e38-b807-297bc020af2b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Sublinear Algorithms","CreditHours":3.0,"Description":""},{"Id":"fc2171cc-1594-445d-9810-c69f2440154d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Approx Algorithms In Action","CreditHours":3.0,"Description":""},{"Id":"69f4b521-ef8e-4ac6-b907-0b2f180fa550","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"FPGA For Securtiy","CreditHours":3.0,"Description":""},{"Id":"036c6ab7-ca4e-43dc-b6ae-fcf9949a8fae","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning On Graphs","CreditHours":3.0,"Description":""},{"Id":"1adb8a37-e3fe-4130-b581-b10cb4edfcc5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Dataset Discovery Techniques","CreditHours":3.0,"Description":""},{"Id":"70f3f2c1-68c8-4e5d-8f28-c6fccfcb7cc7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Digitization Ontology Archive","CreditHours":3.0,"Description":""},{"Id":"2cc3db12-b471-4233-882c-b47913d268f5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Procedural Modeling","CreditHours":4.0,"Description":""},{"Id":"87b20d7d-5b00-4b7f-91f5-c17f21625d92","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AIP For Linked Data","CreditHours":3.0,"Description":""},{"Id":"8cb4357d-247c-41b3-af4d-9fd1aa23df9a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Manycore System Design","CreditHours":1.0,"Description":""},{"Id":"92a57c42-af4a-4a83-ab57-a4b1eba6c633","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Memory Management","CreditHours":3.0,"Description":""},{"Id":"a145b57c-d54a-4b8f-8113-7217bc71bd63","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Modern Trends Cloud Computing","CreditHours":0.0,"Description":""},{"Id":"60bdd6a8-fa96-42da-939f-5d51732cc9e9","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deep Visual Computing","CreditHours":3.0,"Description":"This course has been identified for the Fall 2020 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Fall 2020."},{"Id":"7bb0552e-c814-49bd-8eb8-d39cc57f287a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Formal Analysis Of IoT Systems","CreditHours":3.0,"Description":"This course has been identified for the Fall 2020 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Fall 2020."},{"Id":"87a3b826-a931-4ed2-8f84-99f26f96ad1b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"MI Lab Development","CreditHours":2.0,"Description":""},{"Id":"93541368-80d7-42bb-aec0-4b4bb72c8484","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Systems Security","CreditHours":3.0,"Description":""},{"Id":"a2295a0d-4498-4bb2-a7f9-9abb7c97fead","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Tools For TLS Fingerprinting","CreditHours":3.0,"Description":""},{"Id":"9c6c5876-7487-4aec-a687-7a82d76b3b6a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Privacy In Social Networks","CreditHours":3.0,"Description":""},{"Id":"b1d807af-22f1-4a29-a118-6365fc0c4c05","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":" Machine Learning On Graphs","CreditHours":3.0,"Description":"This course has been identified for the Fall 2020 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Fall 2020."},{"Id":"c4272db7-88bf-4eaa-9f58-01ff6aac1b22","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Appls Of ML And Explainable Al","CreditHours":3.0,"Description":"This course has been identified for the Fall 2020 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Fall 2020."},{"Id":"db59e29c-d36c-4cd1-90f0-6a45bb321d1d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reinforcement Learning","CreditHours":3.0,"Description":"This course has been identified for the Fall 2020 Online Catalog that will serve students who are pursuing the fully online option.  The fully online option serves students who cannot or choose not to come to campus for Fall 2020."},{"Id":"b6f9ac1d-6afa-4f32-b186-60134fb2fbc4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Confidential Data Outsourcing","CreditHours":3.0,"Description":""},{"Id":"886688eb-eb92-4757-9ec6-0a1de03eea36","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Professional Skills Project","CreditHours":0.0,"Description":""},{"Id":"f444db23-ad45-4d4c-b79e-104b9095b5fd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Spec Grph Theory And Epidemics","CreditHours":3.0,"Description":""},{"Id":"07e41a66-535f-44c3-8078-fc9e0ff27369","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Crowdsourcing Research","CreditHours":3.0,"Description":""},{"Id":"11d1bd12-9d11-4b23-bff3-3f8d73d18240","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Study Of Intel SGX & Its SDK","CreditHours":3.0,"Description":""},{"Id":"1ef25739-6ec7-4df6-b128-7442e6dcbc2d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Engineering I","CreditHours":1.0,"Description":"Basic data manipulation; review of Python; introduction to Unix scripts; data cleaning; dealing with missing data; summarizing data. Covers material from CS/Stat 242."},{"Id":"1f8b459c-1be2-4e73-9b3f-06cd85ed9f8d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Integrated Video Conference","CreditHours":3.0,"Description":""},{"Id":"255f22e9-b094-45a7-87e3-86f78449e9ab","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Engineering II","CreditHours":1.0,"Description":"Relational databases; SQL; introduction to No-SQL systems; introduction to cloud computing; Data Security and Privacy; Access Control. Covers material from CS/Stat 242 and CS 348."},{"Id":"27562fe6-8a27-432c-bd3e-031116f34380","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Rapid Distributed Prototyping","CreditHours":5.0,"Description":""},{"Id":"33703f46-a189-499e-8b48-5a205939c96f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Practical Program Analysis","CreditHours":3.0,"Description":""},{"Id":"38b08496-8313-468d-b60f-f23df5a3802e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Foundations Of Decision Making","CreditHours":1.0,"Description":"Sampling and reproducibility. Hypothesis testing (A/B testing), multiple hypothesis testing, data visualization, fairness and data biases. Covers material from CS 373 and Stat 355."},{"Id":"6c2027bb-39cc-4649-bc01-409abc64ec03","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Centers","CreditHours":3.0,"Description":""},{"Id":"cb656dec-ece1-4e51-9654-b3f71f7f6df0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Privacy Mechanisms For Data","CreditHours":3.0,"Description":""},{"Id":"7546efa3-87c7-4fdb-80b3-0319753f83ae","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Center Networking","CreditHours":3.0,"Description":""},{"Id":"c929c35d-a7f8-455c-82ac-c787daa1f440","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intrusion Detection Systems","CreditHours":3.0,"Description":""},{"Id":"f1b6120a-3688-4760-98de-2a6b25bea3b1","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Online Social Media Markets","CreditHours":0.0,"Description":""},{"Id":"0d239db3-de7d-4b7b-9dcd-b527563cca69","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Robotics","CreditHours":0.0,"Description":""},{"Id":"f255f2cf-fc8a-4f06-a1da-9fa7b40c796f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Asynchronous DKG In Tendermint","CreditHours":3.0,"Description":""},{"Id":"efe87a84-66ca-4648-9f91-9931d74ec223","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"DS Interactive Debugging","CreditHours":0.0,"Description":""},{"Id":"15763c72-7352-4dbc-b9a3-837bd692b8ce","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Economics And Computations","CreditHours":3.0,"Description":""},{"Id":"d8ffff4b-b048-4ba4-a8d7-64d4151301cd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Compiling & Programming System","CreditHours":3.0,"Description":""},{"Id":"cc5a6a03-ed9a-468a-bfef-713a50e08331","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"LSM Tree Over RDMA","CreditHours":0.0,"Description":""},{"Id":"e06f147c-42bc-4b2f-8e0a-e18638f0dc7b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":" Enhancement In VM Migration","CreditHours":3.0,"Description":""},{"Id":"3afd2947-767e-48c3-b567-8d6bd0168f51","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Confidential Computing","CreditHours":3.0,"Description":""},{"Id":"3f638ae0-2133-4e7e-b1a7-95c1dea9a308","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Passwords & Human Authction","CreditHours":3.0,"Description":""},{"Id":"e4185e5f-04a7-4e9c-96c5-cd86b275466b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Distributed System","CreditHours":3.0,"Description":""},{"Id":"ea964d51-2286-45bf-99f6-2f67f3969820","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multi-Core OS Development","CreditHours":3.0,"Description":""},{"Id":"edef6b67-155e-487d-8b52-007f7037c68d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mining Heart EKG Data","CreditHours":3.0,"Description":""},{"Id":"47a2a62b-ff3b-42f4-8b26-deb95de42e49","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adv Tpcs In Pgrming Languages","CreditHours":3.0,"Description":"Students are expected to be familiar with basic logic & mathematical reasoning (set theory, induction, etc.) Ideally, they will have taken a programming languages OR compilers course, either at the grad or undergrad level."},{"Id":"c56ae93d-df2e-4c77-8e8e-e9f6f1d0f738","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multi-View Image Precorrection","CreditHours":0.0,"Description":""},{"Id":"4c0f849a-9d26-4879-b34a-33ac267714e0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Blockchains & Cryptocurrencies","CreditHours":3.0,"Description":"Additional information is available at this link:  https://www.cs.purdue.edu/homes/akate/courses/blockchain-20/"},{"Id":"ff7cb40a-9b27-4cde-8bdf-a4c41b6cca9b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Data Center","CreditHours":3.0,"Description":""},{"Id":"da830ba5-0df2-4da5-bd43-5b562d9aed33","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"LLMs","CreditHours":0.0,"Description":""},{"Id":"1ba21b14-9ec4-4f9b-b12d-c9e5ff9da28e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Futuristic Cloud System","CreditHours":1.0,"Description":""},{"Id":"a6677528-b183-4f88-8846-a8cb9f4d169c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Drone Delivery Motion Planning","CreditHours":0.0,"Description":""},{"Id":"6cefa687-2f1b-4b60-8bd0-63ffd3dc43cc","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reliable And Secure Systems","CreditHours":3.0,"Description":""},{"Id":"838f9a3f-3f45-45ee-9f21-348b885b4209","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Human-Centered Computing","CreditHours":3.0,"Description":""},{"Id":"8507d972-0c83-4adb-ade2-6c336ddf4c82","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Graphs In Machine Learning","CreditHours":3.0,"Description":"For details visit https://www.cs.purdue.edu/academic-programs/docs/Graphs%20in%20Machine%20Learning.pdf"},{"Id":"9a5bd025-3722-46b4-bd9a-d7bad2c4fd56","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Gen Methods In Comp Graphics","CreditHours":3.0,"Description":"For details see https://www.cs.purdue.edu/academic-programs/docs/CS 59000-CGS-Syllabus 2020.pdf"},{"Id":"339a8280-90f8-4962-adbd-c9ade57771db","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Systems","CreditHours":3.0,"Description":""},{"Id":"a2f06bfe-06c3-4759-b051-cf0c454a1615","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Graph Domain Adaptation","CreditHours":0.0,"Description":""},{"Id":"accccd7b-c2cb-4152-af5c-678b2fcacaa9","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer Vision For Video Data","CreditHours":3.0,"Description":""},{"Id":"c5b93ea5-b6ba-4425-a209-3bfd3cba7970","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IoT & Cyber Physl Sys Security","CreditHours":3.0,"Description":""},{"Id":"c73261ce-f87b-4032-af6f-076b9666fe21","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Audio Data Analysis In Python","CreditHours":3.0,"Description":""},{"Id":"bc9d3c1a-41a7-4c8c-a9b3-899a0d2d14c9","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Client Subsampling For Federat","CreditHours":0.0,"Description":""},{"Id":"508d1699-7a44-4dde-b5ce-13cbb0ca4467","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IP Research Project","CreditHours":3.0,"Description":""},{"Id":"96ce596c-20fe-4bfb-a24d-d49d167c0e4e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Code Style Analysis","CreditHours":0.0,"Description":""},{"Id":"edd90baa-55a3-4fed-af14-a0655330c7ad","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Graphics Independent Study","CreditHours":3.0,"Description":""},{"Id":"808a8d08-52e2-4b81-926d-1b779dec35a1","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Open-Src Cloud-Native DB Sys","CreditHours":0.0,"Description":""},{"Id":"75ff0194-d883-4947-8825-e5fc29b8438c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"P4-Free Partition/Cover Number","CreditHours":0.0,"Description":""},{"Id":"00a5575c-de1c-4ae1-a295-bda2acbbb0c8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Fault Tolerant Comp Sys Dsgn","CreditHours":3.0,"Description":""},{"Id":"12542bf4-a3cf-40f5-b32b-65de5e8929ae","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multi Objective Engr Design","CreditHours":3.0,"Description":""},{"Id":"152cdb56-994e-44ed-9c98-a230bf4b35fb","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Image Proc 3D Reconstruction","CreditHours":3.0,"Description":""},{"Id":"16d204fb-a2b1-4832-a41a-5952179b3dd7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Operating System Security","CreditHours":3.0,"Description":""},{"Id":"1bffadc6-ec9b-4697-a059-6878f57f5a09","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Hands-On Learning Theory","CreditHours":3.0,"Description":"For details see http://www.cs.purdue.edu/homes/jhonorio/19fall-cs59000hlt.html"},{"Id":"5867905b-1fa0-4492-a44c-cd0ee3d9fad7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Transactional Memory Research","CreditHours":3.0,"Description":""},{"Id":"2991a85c-7c2e-4658-9ab8-bc09a1997f56","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Prgm Anlysis For Deep Learning","CreditHours":3.0,"Description":"https://www.cs.purdue.edu/homes/xyzhang/cs590fall19"},{"Id":"2de7350e-97dc-47bf-b3d6-26f250c20aa0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML On User Profiling","CreditHours":3.0,"Description":""},{"Id":"6d9eb78d-d3f2-4858-b175-efb7f25e0616","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Computing","CreditHours":3.0,"Description":"Cross-listed with CS 49000CLC"},{"Id":"59648a57-a69e-4784-9d8b-4b289f4329cc","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Interactive Debugger For DS","CreditHours":0.0,"Description":""},{"Id":"514bbf20-09f3-4dc6-b0f7-f698c101ff0b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Privacy & Information Security","CreditHours":0.0,"Description":""},{"Id":"4b113316-8245-435d-a2b0-2af2e78d82bd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Gr Research Computer Networks","CreditHours":3.0,"Description":""},{"Id":"4cf21ac0-ab41-4d67-8c7d-58663765e9ce","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML On Static Analysis Results","CreditHours":3.0,"Description":""},{"Id":"5b8a5035-5ed7-44f9-8132-5c067342961a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Privacy In Cloud Databases","CreditHours":3.0,"Description":""},{"Id":"623aafc3-7b70-4bcf-a0f4-89a78f1c586a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Latency Analysis On The Go","CreditHours":3.0,"Description":""},{"Id":"6031a0a5-5ee5-4286-8dfd-73dc7b3e7793","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Implementation For Xinu","CreditHours":3.0,"Description":""},{"Id":"846e05d7-286b-4a8a-a9e1-6dd76155e21c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Compiler Architecture Co-Desgn","CreditHours":3.0,"Description":""},{"Id":"87cb4e54-d2bc-4e44-b712-6d861a2d48cf","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Driven Mobile Network","CreditHours":3.0,"Description":""},{"Id":"af0829f7-d02b-4a50-a96e-4cccf58a3a33","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Systems Study II","CreditHours":0.0,"Description":""},{"Id":"654eca25-24de-4eab-a2af-01e4dc5ee18c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bioinformetics","CreditHours":3.0,"Description":""},{"Id":"67ff8da6-4ba3-430b-a91a-63ea96db3c64","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Javascript And Browser Sec","CreditHours":3.0,"Description":""},{"Id":"b81ed073-d44c-42cf-a3bf-92cc8ed11981","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Quantum Comp Machine Learning","CreditHours":3.0,"Description":""},{"Id":"6c2ebde8-9861-43ae-a538-87ecd4298b05","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Map&Location Based Operations","CreditHours":3.0,"Description":""},{"Id":"c0adfa5e-016c-4775-8515-fec85600c79a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intro To Data Visualization","CreditHours":3.0,"Description":"The course offers an introduction to the basic principles, strategies, and techniques needed to visually explore and analyze data. The course focuses primarily on information visualization, whose goal is to create spatial representations of inherently non-spatial data. Typical examples of such data include tables, graphs, trees, text, maps, time series, etc... The lectures will present various techniques and discuss their strengths and limitations in practical scenarios. Students will gain hands-on experience by visualizing real world using advanced visualization software. The course material is self-contained and no graphics background is assumed. Basic programming experience required."},{"Id":"c0eb3c97-6b08-4882-917e-6f23a3e15d2a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile Sys & Smartphone Sec","CreditHours":3.0,"Description":""},{"Id":"7c50b429-f492-4cbc-917b-4052b2317dc6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Binary Reverse Engineering","CreditHours":3.0,"Description":""},{"Id":"57668a88-cc96-4022-9b2c-8b4f73190fb3","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Improving Reasoning In LLMs","CreditHours":0.0,"Description":""},{"Id":"deb4611a-43c0-4e9d-91c5-c30f6429b91c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Spectra Of Random Graphs","CreditHours":3.0,"Description":""},{"Id":"986b3f15-7399-4b1f-9664-f9d1bbed4562","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Weak Memory Atomics In C++11","CreditHours":0.0,"Description":""},{"Id":"8189f5f5-2bf4-42c6-a0f0-97f50bf613e8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Key Value Store","CreditHours":3.0,"Description":""},{"Id":"15136138-5d2c-40d8-8a40-8cdc6f6426cf","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Comp Vision For Urban Modeling","CreditHours":3.0,"Description":""},{"Id":"8b5aef1a-b78c-4740-b767-4794e4d81792","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"BGP Defense Systems","CreditHours":3.0,"Description":""},{"Id":"3ee6b567-34a3-47c6-9b6e-e374bd9795e5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Analysis For GDPR Access Cntrl","CreditHours":3.0,"Description":""},{"Id":"419ac2e9-7f4d-41b7-bf07-5152f974bbac","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Of Program Synthesis","CreditHours":0.0,"Description":""},{"Id":"558cdf6c-b5de-4038-8af6-76be39aeb1fd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Managing An Intro CS Course","CreditHours":3.0,"Description":""},{"Id":"6e45eeb5-0cc5-4e13-9e84-8a65852ee815","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Interactive Machine Learning","CreditHours":3.0,"Description":""},{"Id":"7b48d608-194b-454d-bf2c-117e05681782","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multithreaded Simulation","CreditHours":3.0,"Description":""},{"Id":"7b972372-7e8c-4ea1-9804-203c57d9c7df","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Closed Loop Control Project","CreditHours":3.0,"Description":""},{"Id":"9c1d944e-f3a1-40f3-869f-abf910291d59","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Engineering In Cloud","CreditHours":1.0,"Description":""},{"Id":"3fe34311-b3e2-4b82-a025-a51b38caaada","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Analysis Of Thread","CreditHours":0.0,"Description":""},{"Id":"97934af5-7a0b-4594-bc09-d22cee193822","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Contingency Based Access Cntrl","CreditHours":3.0,"Description":""},{"Id":"d464b3d6-3d0a-49a1-a28d-06c6f1a4ce7f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Computer Sciences","CreditHours":0.0,"Description":""},{"Id":"db86d344-6eb4-4f63-aeaf-e16c117617ae","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adversarial Machine Learning","CreditHours":5.0,"Description":""},{"Id":"0950dd78-2cc9-4631-8506-7342a0eb0dba","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Intelligence In 5G","CreditHours":3.0,"Description":"Additional information is available at this link:  https://www.cs.purdue.edu/homes/chunyi/teaching/cs590-sp19.html"},{"Id":"0c487719-ffdb-4afb-bdf9-73654e6f6b9d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"LLM Training Trends Analysis","CreditHours":0.0,"Description":""},{"Id":"10f73173-ebad-40ee-b118-d18e4e42cd0f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Spatial Keyword Indexing","CreditHours":3.0,"Description":""},{"Id":"1613411d-c884-425c-b49c-161b972539e7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"BLE For Mobile Crowdsensing","CreditHours":3.0,"Description":""},{"Id":"2aca0b2c-f713-44dc-a3b4-6cd87a50a6dd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Report Summarization Using NLP","CreditHours":0.0,"Description":""},{"Id":"b08d8672-9c33-4acb-890d-dd1e4d76cf03","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reasoning & Planning With LLMs","CreditHours":0.0,"Description":""},{"Id":"af10f628-3a7b-4f68-b252-8bd6dbc0a379","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computer Simulation","CreditHours":3.0,"Description":""},{"Id":"39402233-ad9b-44d7-b0ae-4b0b251af8be","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Neural Knowledge Acquisition","CreditHours":0.0,"Description":""},{"Id":"b221342f-5bde-4d5a-a336-23efeb16e89e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud Network Topololgy","CreditHours":3.0,"Description":""},{"Id":"3694ff26-d14c-45e0-8c8a-0c8f4333a05e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mathematical Tookit For CS","CreditHours":3.0,"Description":"https://www.cs.purdue.edu/homes/hmaji/teaching/Spring%202018/CS-59000-MTK-Spring-2018.html"},{"Id":"b3a19108-7394-4ee9-9134-222117676a74","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Architecture","CreditHours":3.0,"Description":""},{"Id":"34273100-828e-4d5b-9b56-8cb3cd09dbee","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Bluetooth Security","CreditHours":0.0,"Description":""},{"Id":"310723e2-a3ae-49d8-b155-a9629b42fcf4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Object Detection In Videos","CreditHours":0.0,"Description":""},{"Id":"c3a58742-9a31-4efe-8738-b4e834508ac4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Content Centric Networking","CreditHours":3.0,"Description":""},{"Id":"c5018de2-50a6-48c8-8c57-1a3950c5e6cd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deterministic Parallelism","CreditHours":3.0,"Description":""},{"Id":"f331e03c-c378-4bf6-883a-5070573d463a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Rhyme Development","CreditHours":0.0,"Description":""},{"Id":"77361d4b-b874-4b1e-a3e6-19fd2f524914","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Reliability&Security","CreditHours":3.0,"Description":"Software needs to be reliable and secure; otherwise, they can cause casualty, financial losses, and many other damages. Software bugs significantly hurt software reliability and security. This course discusses a broad range of techniques to reduce the negative impact of software bugs to improve software reliability and security. The main topics include fundamental software reliability and security concepts, software bug detection, prediction, and repair, software bug tolerance and recovery, security attacks and security bugs, and application of machine learning and natural language processing for improving software reliability and security.  https://www.cs.purdue.edu/homes/lintan/courses/cs590/"},{"Id":"cade2f94-a5d4-4ccc-8aff-e788858b85fa","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Data Store","CreditHours":3.0,"Description":""},{"Id":"d87dfa5e-29c4-4d10-8ef4-cc8cde6898d6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Statistical Machine Learning","CreditHours":3.0,"Description":"No PhD qualifying examination in fall 2011."},{"Id":"dab9425e-67aa-4311-8572-ea57ea22de84","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Nosql DB Systems","CreditHours":3.0,"Description":""},{"Id":"e962f4ef-8f30-40d6-9b35-ffed92b5ae2a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Virtual Machine","CreditHours":5.0,"Description":""},{"Id":"fe290c72-325a-464d-909f-a576f84220de","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network & Matrix Computations","CreditHours":3.0,"Description":""},{"Id":"2f56e2a1-c195-43de-84e3-f31c3b188cb7","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Security And Privacy","CreditHours":3.0,"Description":"Prerequisites: CS 52600, Introduction to Information Security and basic knowledge of relational database systems including the SQL language, file systems and processes."},{"Id":"006c4554-bd30-4a3c-9e03-a3832c31668e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Software Development","CreditHours":1.0,"Description":""},{"Id":"2340db7c-f789-4c2f-b7bf-2132b82fde01","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Of IoT Devices","CreditHours":0.0,"Description":""},{"Id":"057a64d9-b27f-4d5f-ad28-d8683fe69474","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Services On EC II","CreditHours":1.0,"Description":""},{"Id":"9ee6417b-4e95-4672-9e4a-871b8df463e1","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Active & Deep Learning","CreditHours":3.0,"Description":""},{"Id":"a2fbd8d8-71ee-450e-b68c-7057d6e603d1","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Internetworking","CreditHours":3.0,"Description":""},{"Id":"09c7cfcb-1ef8-40f4-97a4-5ecaaec3494f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Engineering For DB","CreditHours":1.0,"Description":""},{"Id":"81a88ee5-487d-4902-8f3e-7e508bbca90f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Tag-Enforced DMA Security","CreditHours":0.0,"Description":""},{"Id":"1aab28ca-d7e2-4bb1-9824-1b10ba2ccc9f","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"P4 Free Cover Number","CreditHours":0.0,"Description":""},{"Id":"1360c249-3048-4141-a7cc-6653fab06bbd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reliable Data Center Design","CreditHours":1.0,"Description":""},{"Id":"d331908a-eaf5-4a31-a46d-0eaa15333d53","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web App Security Principles","CreditHours":0.0,"Description":""},{"Id":"17697093-4fc3-405e-b59b-0f2aeaa88f1c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Application Reliability","CreditHours":1.0,"Description":""},{"Id":"1fdde505-6fc1-4e0c-92f1-5f1b9bd84f13","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Financial Software Engineering","CreditHours":1.0,"Description":""},{"Id":"e350ea15-351c-4bfa-a3c6-63358fd9fcdd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Causal Inference-Adv Mach Lrng","CreditHours":3.0,"Description":"Introduction to the concepts, principles, and algorithms necessary to solve modern, large-scale problems in scientific inference. Emphasis will be given to the tradeoff between assumptions and conclusions for standard types of queries, including associational, causal, and counterfactual. Mathematical maturity and a strong quantitative background (e.g., graph theory, algorithms, logic, statistics) are required.  Additional information is available at this link:  https://causalai.net/cs590_syllabus.pdf"},{"Id":"24f5f28b-83bc-4407-9ac2-d18485fcec6b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Graphics Software Development","CreditHours":1.0,"Description":""},{"Id":"e95e741b-48d0-4346-8973-e677cc12d029","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reliable Hypervisors","CreditHours":3.0,"Description":""},{"Id":"251f0139-2ba2-4279-927b-5270e1a6c536","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Systems Practicum","CreditHours":1.0,"Description":""},{"Id":"c97a6b7a-8e95-410e-8915-aaa48d65d3bc","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Fairness In AI","CreditHours":0.0,"Description":""},{"Id":"2f8044c5-bd2d-4393-ab79-8288cf8594be","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Virtualization","CreditHours":3.0,"Description":""},{"Id":"40cf7ce4-2863-42ff-b6ae-90b1e5cb463c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed System Development","CreditHours":1.0,"Description":""},{"Id":"4940d7dd-ad49-48ea-ae82-05264f4fcf3b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Privacy In The Cloud II","CreditHours":1.0,"Description":""},{"Id":"4de512e5-820d-4802-bfe9-0043862369a4","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Virtual Machine Management","CreditHours":1.0,"Description":""},{"Id":"57d53028-9a4e-4f21-ad37-7320e44b3f14","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Prototype Development","CreditHours":1.0,"Description":""},{"Id":"23ab3199-f9f7-407a-9d59-b09fe487cf21","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Analytics","CreditHours":3.0,"Description":"Previous or concurrent enrollment in CS 52600 is required."},{"Id":"5b1e4e6c-c331-407d-869d-256f5c8cdeab","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced OS Design","CreditHours":1.0,"Description":""},{"Id":"c4656020-1696-4900-99f2-1c7be57eb9ef","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML For Networking","CreditHours":0.0,"Description":""},{"Id":"6147b30d-3acb-4744-a8b3-8961c79ba7bd","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Product Security","CreditHours":1.0,"Description":""},{"Id":"3efbf3e6-cc18-4f91-809f-2ef8c92d9455","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Crowdsourcng & Social Computng","CreditHours":3.0,"Description":"Crowdsourcing and social computing sits at the intersection of computer science, economics and other social sciences. It concerns developing empirical understandings and designing computational systems and techniques to enable effective interactions between people and machines for solving complex problems. This course surveys the state of the art in this area. Topics of interests include incentive design, workflow design, quality control and intelligent management in crowdsourcing, computer supported collaborative work, and applications in various domains like artificial intelligence and citizen science. Basic programming skills required. http://mingyin.org/CS590/Fall2018/index.html"},{"Id":"6527091a-ae22-4f9a-b02a-35c020a0a4e0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Seo Resistant Search Engines","CreditHours":1.0,"Description":""},{"Id":"455b19fa-4e5a-4224-92be-f10b1dfae88d","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"3D Protein Structure Modeling","CreditHours":3.0,"Description":""},{"Id":"6545b232-6aee-4b00-8953-4be543ed31f2","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security In E Commerce Systems","CreditHours":1.0,"Description":""},{"Id":"6bc21415-7c61-415d-b3d2-1a9ce6a768ad","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Dat Min & Anom Det On Yelp Rev","CreditHours":1.0,"Description":""},{"Id":"723001e2-4106-44df-b131-66462951c0cb","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Application Virtualization","CreditHours":1.0,"Description":""},{"Id":"7503cc9f-3575-48bb-8b93-3726b34f9e7c","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Commercial OS Design Practicum","CreditHours":1.0,"Description":""},{"Id":"1db0bcd3-6250-4f67-a59d-5f8924573d20","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Targeted Fuzzing","CreditHours":0.0,"Description":""},{"Id":"7ca96658-5871-456b-a641-1de19db40bc3","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Services","CreditHours":1.0,"Description":""},{"Id":"72b315f5-18fa-4dd3-a902-d124e5a417f1","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deep Learning For Audio Data","CreditHours":1.0,"Description":""},{"Id":"4c7cac3e-b30f-4a61-9057-a21d6c7659b6","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Application Of AI To Attack In","CreditHours":0.0,"Description":""},{"Id":"8a4f96b8-37d1-4f4d-bbca-a6f72e1a4a80","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Privacy In The Cloud","CreditHours":1.0,"Description":""},{"Id":"b40752da-18b5-467e-8944-26a375a5664e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Analysis Of WebVR","CreditHours":0.0,"Description":""},{"Id":"8f56957c-3e3e-43ea-9fa4-478e907c9623","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Log Collection","CreditHours":1.0,"Description":""},{"Id":"9f57bff2-0d5f-4b72-add5-7efbf0a3563a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Financial Software Development","CreditHours":1.0,"Description":""},{"Id":"88de1195-d9b6-437d-95e1-7d1a4b123a22","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"RLA Algorithms & Applications","CreditHours":3.0,"Description":""},{"Id":"a29b9d23-1ef0-4acd-9bcf-fa4383501e6e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Exp With 4G Mobile Comm Std","CreditHours":1.0,"Description":""},{"Id":"8bcba96d-6a6e-413b-bd8f-509b01e52050","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deep Learning & Sym Reasoning","CreditHours":3.0,"Description":"Despite the recent successes of deep neural networks in fields such as image recognition, machine translation, or gameplay, big challenges remain in applying deep learning techniques to applications that require symbolic reasoning: theorem proving, compiler optimization, software verification and synthesis, and solving NP-complete problems. This research-focused seminar aims to make progress in this exciting and timely field.  For more info see tiarkrompf.github.org/cs590/2018.  Students are expected to come with background knowledge on either deep learning or symbolic reasoning (programming languages / formal methods)."},{"Id":"a44e5307-32e5-4e6d-ae14-6d57124a7421","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Embedded Software Development","CreditHours":1.0,"Description":""},{"Id":"a81a80a6-83c4-48c2-a266-e3d748039dcc","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Blockchain Based System","CreditHours":3.0,"Description":""},{"Id":"abf19e30-a1eb-4dde-b23f-8e2dd1d4429a","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Economics And Computation","CreditHours":3.0,"Description":"This course will introduce the area of EconCS by studying games, mechanism design, auction theory, fair division, voting, complexity of equilibria, dynamics, and markets. See more info at simina.info/econcs.html.  Mathematical maturity, calculus, probability, undergraduate algorithms required."},{"Id":"a1f47170-d4b8-45cf-8164-8c5a08fd6f23","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Diversity For Robustness","CreditHours":0.0,"Description":""},{"Id":"b4a9d5b8-021f-4dec-8e9d-c6be2b2a3716","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Graph Data Management","CreditHours":3.0,"Description":"For details see https://www.cs.purdue.edu/homes/aref/Fall2018CS590-Graph-Data-Systems/index.html"},{"Id":"c702cb47-585c-4f3d-9253-f69d1b9a6a60","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Meets Sustainability","CreditHours":3.0,"Description":"https://www.cs.purdue.edu/homes/yexiang/courses/18fall-cs590/index.html, https://www.cs.purdue.edu/homes/yexiang/courses/18fall-cs590/index.html."},{"Id":"b4375054-0bfa-4543-b19f-a8e9dd721c99","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Web Services & Cloud Computing","CreditHours":1.0,"Description":""},{"Id":"a1f15181-feb5-46f7-8135-4ff88a1b44c5","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Neural Knowledge Extraction","CreditHours":0.0,"Description":""},{"Id":"c7d7b14e-1639-49e7-a645-b2e2bc9b3990","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Test Development","CreditHours":1.0,"Description":""},{"Id":"62565373-34bb-46ec-aac8-4cb7dc460049","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"OOD Tasks In CFD Simulations","CreditHours":0.0,"Description":""},{"Id":"919df00c-55c7-4ba5-bc6f-1a910ec6f6a9","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Implementation Of OpenThread","CreditHours":0.0,"Description":""},{"Id":"d5a75361-6bff-44e6-a4b7-ddb533ab1cb0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Source To Source Translation","CreditHours":1.0,"Description":""},{"Id":"3ce3f582-2095-498f-869e-fbe5dd10aee0","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"CTF Applied Security","CreditHours":0.0,"Description":""},{"Id":"dbd5a17c-b869-440e-a7fd-be80d50494fb","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Scalable Network Measurements","CreditHours":3.0,"Description":""},{"Id":"dfa67b38-4659-4dfb-a401-84ed8b2a7017","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Ecommerce Software Development","CreditHours":1.0,"Description":""},{"Id":"0991bdfd-8c9c-4017-b213-14325ac282a8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Performance Enhancemnt Of Code","CreditHours":3.0,"Description":""},{"Id":"2076b373-4b95-40a3-b77b-f6980e5fe352","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Positive Feedback Loops In DS","CreditHours":0.0,"Description":""},{"Id":"1bdb35eb-4fd2-4c93-91cd-99ee7c581389","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computational Protein Modeling","CreditHours":3.0,"Description":""},{"Id":"25c7f780-0734-4382-bd94-081e8580b29e","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IOT Protocols Study","CreditHours":4.0,"Description":""},{"Id":"2a5e9f06-9b1c-472a-9967-bd49d6127584","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Runtime Monitoring Of Cell Net","CreditHours":4.0,"Description":""},{"Id":"e3c54d40-2fee-41d6-84ba-20050df69353","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Virtualization Research","CreditHours":1.0,"Description":""},{"Id":"e7e64bc2-775a-486f-ba13-a49957435ea8","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Engineering For FS","CreditHours":1.0,"Description":""},{"Id":"1c0cea8d-3ecc-4c29-8fe6-42c11d659b55","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"MDL Implementation Analysis","CreditHours":0.0,"Description":""},{"Id":"06587209-6b22-4d30-932a-aa5055122b4b","Number":"59000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cloud-Native Database Systems","CreditHours":0.0,"Description":""},{"Id":"971842d4-bfff-4703-9f40-498298fb732b","Number":"59100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learn Reading Group","CreditHours":1.0,"Description":""},{"Id":"b00b3ece-a065-487d-8ee0-76f0e3ee3f10","Number":"59100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Blockchains:  Theory To Pract","CreditHours":1.0,"Description":"Blockchains:  From Theory to Practice"},{"Id":"50453d0f-2619-4614-9a22-6800313f589d","Number":"59100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"CERIAS Security Seminar","CreditHours":1.0,"Description":"For details see https://www.cerias.purdue.edu/news_and_events/events/security_seminar/"},{"Id":"9d314afb-05f5-4bb5-bf0e-400082b3ab47","Number":"59100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Blockchains:Theory To Practice","CreditHours":1.0,"Description":""},{"Id":"bc05b2c8-6d06-4ce1-8db4-adfaef012674","Number":"59100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Blckchains From Thry To Prctce","CreditHours":1.0,"Description":""},{"Id":"2cce94e9-22de-44d7-bd0a-cbb23c72675d","Number":"59100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Res Sem 1st-Yr Gr Student","CreditHours":1.0,"Description":""},{"Id":"d56239aa-57ac-4df9-8750-c03b992e8c67","Number":"59100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Res Sem First Yr Gr Student","CreditHours":1.0,"Description":""},{"Id":"dba82bbf-58ca-465c-a42f-54374c44d292","Number":"59100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Effective Teaching In CS","CreditHours":1.0,"Description":""},{"Id":"0671621e-539f-49bc-a33e-5e2a1999d66f","Number":"59100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Res Sem 1st-Yr Gr Stud","CreditHours":1.0,"Description":""},{"Id":"4b966780-f1c4-4450-b3d9-c7b0f7bc6a32","Number":"59100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Systems Seminar","CreditHours":1.0,"Description":""},{"Id":"7fba4c9e-9a19-4bc9-bedc-f02a9748a45d","Number":"59100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Security Seminar","CreditHours":1.0,"Description":""},{"Id":"3895def3-dab0-4616-81fd-e4d6c77c0ed1","Number":"59100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Dist Systems & Netwkng Seminar","CreditHours":1.0,"Description":""},{"Id":"ecd50124-4666-475e-bd0b-4b7e80d8c3c5","Number":"59100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Info Sec&Cybr Crime Sem","CreditHours":1.0,"Description":""},{"Id":"7e6268af-4779-4852-b10b-6ffca84492ec","Number":"59100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Seminar","CreditHours":1.0,"Description":"This course has been identified for the Fall 2020 Online Catalog that will serve students who are pursuing the fully online option. The fully online option serves students who cannot or choose not to come to campus for Fall 2020."},{"Id":"1f28a0ad-7ed4-46ee-9776-a58f18294784","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reinforcement Learning","CreditHours":3.0,"Description":""},{"Id":"1c7d8399-b7dc-4cb9-9ce6-9b21d7a816c9","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Prog Self-Driving Networks","CreditHours":3.0,"Description":""},{"Id":"66982156-b8c0-4903-84d4-e10a2cb4330f","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning Systems","CreditHours":3.0,"Description":""},{"Id":"cd5f8544-7d3b-45ca-9145-487f9f344f0f","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML System Co-Design","CreditHours":3.0,"Description":""},{"Id":"e47270e6-8f89-46af-9dcd-eda9419ef1d5","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Hardware Security","CreditHours":3.0,"Description":""},{"Id":"72d08664-a222-437d-9b87-4f6ddf44b5d1","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Modeling Digital & Real Humans","CreditHours":3.0,"Description":""},{"Id":"1ce737f1-f93b-4731-b7d7-e6c913494be3","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Information Visualization","CreditHours":3.0,"Description":""},{"Id":"19e56dbe-8fc0-40af-8bc5-528877967091","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Al For Scientific Discovery","CreditHours":3.0,"Description":""},{"Id":"663036cd-91a1-4421-9648-d8594c6b0737","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reliable And Secure Systems","CreditHours":3.0,"Description":""},{"Id":"e5594af0-5c18-42d7-82b4-93dfa40073fe","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"New Trends In Big Data Systems","CreditHours":3.0,"Description":""},{"Id":"9ceb289d-13ee-4407-9bc0-3431ef9de6a2","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Gen Methods In Comp Graphics","CreditHours":3.0,"Description":""},{"Id":"b3496f32-1d59-4f2e-8dde-c28f9baa1e45","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Interpretability In ML","CreditHours":3.0,"Description":""},{"Id":"2cbdef22-dd6a-4cdb-919d-ea9d6f39f71f","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI-Assisted Software Engr","CreditHours":3.0,"Description":""},{"Id":"5466ae93-844b-48da-b63f-15bbac1b225a","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Autonomous Drones For Your Use","CreditHours":3.0,"Description":""},{"Id":"d25e31ac-9ccd-4160-8e21-3db597988bcb","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Socially Assistive Agents","CreditHours":3.0,"Description":""},{"Id":"4566b9ba-7a40-4a51-82df-367ccdcf0a23","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Passwords&Human Authentication","CreditHours":3.0,"Description":""},{"Id":"1789bdaf-ca6a-4c9d-b7b9-e34934d0cee6","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Special Topics In Cryptography","CreditHours":3.0,"Description":""},{"Id":"2c2b1d4b-516e-42a1-9ed6-e30dd57fc4e3","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Robot Manipulation","CreditHours":3.0,"Description":""},{"Id":"262fae2f-0298-43b9-abeb-b8502b066637","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI For Scientific Discovery","CreditHours":3.0,"Description":""},{"Id":"90afe993-76d1-43cb-99a6-f7000ff3aca7","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reasoning With LLM","CreditHours":3.0,"Description":""},{"Id":"7ba03fdd-637d-435a-9656-8ec20ad7de4f","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Special Topics in Blockchains","CreditHours":3.0,"Description":""},{"Id":"af1ff0ea-291d-41c9-8c5b-3f7d75f5b3a5","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Analytical Toolkit In CS","CreditHours":3.0,"Description":""},{"Id":"17993b5a-8fc1-461e-933f-5ecdc177284e","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Topics In Compilers","CreditHours":3.0,"Description":""},{"Id":"b3a2ef64-8741-4657-abe5-37339957b930","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computational Imaging","CreditHours":3.0,"Description":""},{"Id":"042df4d0-14e6-44c2-b584-abed38a6de56","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Compiler-Architecture Codesign","CreditHours":3.0,"Description":""},{"Id":"1084bdd1-07fb-4dbd-9915-583523f3d1d0","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI And Security","CreditHours":3.0,"Description":""},{"Id":"707ef4b3-8cb1-4e8c-91ae-1f768645b025","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adv Topics In Types And PL","CreditHours":3.0,"Description":""},{"Id":"3e8566d3-79dd-4408-8f87-c85e987935f9","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Algorithmic Game Theory","CreditHours":3.0,"Description":""},{"Id":"cf164fe1-7900-4798-8f47-59244bc6f0c5","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Imitation Learning/Robotics","CreditHours":3.0,"Description":""},{"Id":"72e99644-bbad-48d2-adf9-f2be4f255c5f","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"IoT/CPS Security","CreditHours":3.0,"Description":""},{"Id":"39dc5a80-68f4-4640-be23-f6cfb34447e3","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Network Intelligence 5G/Beyond","CreditHours":3.0,"Description":""},{"Id":"11a6e572-20f3-4f98-a61c-6bf8ffee538b","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Automated Security Testing","CreditHours":3.0,"Description":""},{"Id":"b1e02e3e-4d12-45dd-9c14-7b7d51391a26","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Thought Partners","CreditHours":3.0,"Description":""},{"Id":"55c881bc-5253-4f81-9cfa-33036d611bbb","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Machine Perception","CreditHours":3.0,"Description":""},{"Id":"49706094-7c8b-416e-a3f0-203a0de0e875","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Adv Topics In Reasoning W/ LLM","CreditHours":3.0,"Description":""},{"Id":"d6bfbe29-ef48-43c5-aca1-95a9c02de5ff","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Auto Reasoning/ML Integration","CreditHours":3.0,"Description":""},{"Id":"572c3b84-d294-4af3-a0b8-a8f84b913606","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Motion Planning","CreditHours":3.0,"Description":""},{"Id":"f4e92184-8174-49f5-93e7-f27f616b83eb","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Pseudorandomness","CreditHours":3.0,"Description":""},{"Id":"034a1f18-0801-4e89-af31-c026c795bdb0","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Management For AI","CreditHours":3.0,"Description":""},{"Id":"ebc2a820-7d59-464a-8a00-7d5b00925703","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Agentic Security","CreditHours":3.0,"Description":""},{"Id":"0c55f718-361d-482f-b722-0d4c52500f01","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Verifying Systems At Scale","CreditHours":3.0,"Description":""},{"Id":"00a89ac0-4467-4736-99b7-a49f4a59601f","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Disaggregated Database Systems","CreditHours":3.0,"Description":""},{"Id":"2f9ddf72-639b-4daf-97e5-02bd57cb451b","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Compilers For GPUs","CreditHours":3.0,"Description":""},{"Id":"cc27e5ce-f336-4fa7-a7fd-7d9f114b9e51","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Probabilistic Machine Learning","CreditHours":3.0,"Description":""},{"Id":"68267ee5-8be2-4102-a69c-4a7f0369e1ff","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Neurosymbolic Prog Synthesis","CreditHours":3.0,"Description":""},{"Id":"f7ed0aa4-da15-448e-9936-5996a3f50211","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Human-Robot Interaction","CreditHours":3.0,"Description":""},{"Id":"a64d0376-e810-4a46-9a80-9be6e25fd3c6","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Introduction To Robot Motion","CreditHours":3.0,"Description":""},{"Id":"f79bb270-28ea-439c-b60a-fb444279484d","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning & Algorithms","CreditHours":3.0,"Description":""},{"Id":"083fe3e5-55d9-4f35-b477-1c4b8cafd0fa","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Hands-On Learning Theory","CreditHours":3.0,"Description":""},{"Id":"940ad3a3-7e8b-4e63-9db2-4a13bf0b2806","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Special Topics In Blockchains","CreditHours":3.0,"Description":""},{"Id":"ad1a4a59-b4be-4f56-8ae8-19bb5624c872","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning Theory","CreditHours":3.0,"Description":""},{"Id":"509754d8-32c1-4633-9ea1-eeb0fa2a6049","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI Techniques In Cybersecurity","CreditHours":3.0,"Description":""},{"Id":"d14040ff-98d8-4efd-a539-76c5be745398","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Human-AI Interaction","CreditHours":3.0,"Description":""},{"Id":"d61ae63a-63e2-4623-a03f-d8f6a812bac7","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Trusted & Confidentl Computing","CreditHours":3.0,"Description":""},{"Id":"176c80d9-12e2-4808-a948-3545c7fee6eb","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Mobile & Ubiquitous Computing","CreditHours":3.0,"Description":""},{"Id":"d8260d14-26bb-4a28-8ce8-5eb62dcf651f","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Reliability And Al","CreditHours":3.0,"Description":""},{"Id":"43e2b0e8-1582-4268-aa53-17c0ddba3eb0","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computational Interaction","CreditHours":3.0,"Description":""},{"Id":"3f84aa67-7377-4b78-a67e-7d6f91071288","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Fault Injection Attacks","CreditHours":3.0,"Description":""},{"Id":"e7fd59db-2580-4599-8ab0-f7c04e2955fa","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"ML And Algorithms Seminar","CreditHours":3.0,"Description":""},{"Id":"7cbaab13-0212-48b5-8f51-92bf89817ca8","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Quant Computer Software Stacks","CreditHours":3.0,"Description":""},{"Id":"5e020c18-c258-4b05-accb-1771e9bb1558","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI/DC Networking","CreditHours":3.0,"Description":""},{"Id":"85ea7e4a-b05a-4e41-bf06-c07be323e57c","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Vector Databases","CreditHours":3.0,"Description":""},{"Id":"385d77e9-dba2-4ac0-b219-a1af2e7ac89f","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Probabilistic Methods","CreditHours":3.0,"Description":""},{"Id":"91ffb7ad-104a-465a-9e05-f1ea941e7c91","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Appls Of ML And Explainable Al","CreditHours":3.0,"Description":""},{"Id":"78713018-ca7d-4d4a-a17f-bf287c185036","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Distributed Optimizaton For ML","CreditHours":3.0,"Description":""},{"Id":"47a3f50c-f8d8-4f9e-8915-aa86cb73a96c","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Methods Of Machine Learning","CreditHours":3.0,"Description":""},{"Id":"bae69220-406e-4570-b339-159e6751b069","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Res Topics In Extended Reality","CreditHours":3.0,"Description":""},{"Id":"356416d7-63ae-49e4-8858-d72988798d1e","Number":"59200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Distributed Systems","CreditHours":3.0,"Description":""},{"Id":"68c22b16-cfb1-408d-a9de-d2e4ab5b48f8","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intro To Quantum Computing","CreditHours":3.0,"Description":""},{"Id":"8e39bae2-dcdf-4238-b79b-2e439952d4d9","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Trustworthy Machine Learning","CreditHours":3.0,"Description":""},{"Id":"8311f84d-9b68-4d62-8d82-13e4a2344e71","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Human-Computer Interaction","CreditHours":3.0,"Description":""},{"Id":"eec9a65f-c9a4-4b68-90a1-25407535c5fa","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Algorithms For Data Science","CreditHours":3.0,"Description":""},{"Id":"37f6ec0f-2ab7-4886-9a27-52270d59f282","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computation & Learn On Graphs","CreditHours":3.0,"Description":""},{"Id":"5ce19fbb-2032-4c25-bdee-65add7918ae0","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Principles Comp Architecture","CreditHours":3.0,"Description":""},{"Id":"a370786f-0e92-46e2-a550-2dc45455c6be","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topological Data Analysis","CreditHours":3.0,"Description":""},{"Id":"106f43a0-12a8-45c3-a80e-f56187bb5d58","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Comp Complexity","CreditHours":3.0,"Description":"Topics in Computational Complexity"},{"Id":"366ca176-09f8-45f6-a4b6-3a6e18a95c6f","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Topics In Algorithms","CreditHours":3.0,"Description":""},{"Id":"6bd67efa-7e1c-48fd-94f2-0462fb03a474","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"AI-Assisted Software Engr","CreditHours":3.0,"Description":""},{"Id":"f6d8f026-821c-490a-9c1d-539f4035d082","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Reinforcement Learning","CreditHours":3.0,"Description":""},{"Id":"a977ee56-729b-44ed-8204-c45efa9319bd","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Human-Robot Interaction","CreditHours":3.0,"Description":""},{"Id":"a84ed8c3-a527-48ca-87ed-fc02636cac32","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Algorithmic Economics","CreditHours":3.0,"Description":""},{"Id":"5e5a1132-13ba-45fe-b68d-05e60ce5eedb","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Computational Imaging","CreditHours":3.0,"Description":""},{"Id":"de6dff5c-f154-4285-b128-872112802e68","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Engineering /Robotics","CreditHours":3.0,"Description":""},{"Id":"035c6e6f-ee61-457a-a443-439b12f896e2","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Imitation Learning/Robotics","CreditHours":3.0,"Description":""},{"Id":"ab9ad583-7e8a-4639-8152-7e3a3ce41902","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Microarchitecture Security","CreditHours":3.0,"Description":""},{"Id":"afbd37cd-963c-4e7f-aca3-47e5ab63e6d5","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Machine Learning Theory","CreditHours":3.0,"Description":""},{"Id":"5fe5df71-df0e-464b-9220-ee6a7c5c8c2e","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Comp Vision With Deep Learning","CreditHours":3.0,"Description":""},{"Id":"c3eb46e7-95b9-414a-9a5a-9402ede72593","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Robotics","CreditHours":3.0,"Description":""},{"Id":"12670d1a-3905-4ac7-9a6b-0a09ffa909dc","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Computer Architecture","CreditHours":3.0,"Description":""},{"Id":"a2acdc97-203e-450f-9a56-bbe347d4d170","Number":"59300","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Human AI-Interaction","CreditHours":3.0,"Description":""},{"Id":"650398c2-41dc-4e26-881e-24f063e89a60","Number":"59799","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Graduate Professional Practice","CreditHours":0.0,"Description":""},{"Id":"80f86727-d099-410f-a242-fbb87a08021f","Number":"61400","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Numerical Solution Of Ordinary Differential Equations","CreditHours":3.0,"Description":""},{"Id":"c0ed2f99-53fe-4763-b3b1-130352b4318e","Number":"61500","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Numerical Methods For Partial Differential Equations I","CreditHours":3.0,"Description":""},{"Id":"21731e1a-62d0-44c5-9f66-0d1826d3f91c","Number":"62600","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Information Assurance","CreditHours":3.0,"Description":""},{"Id":"e13356ae-5806-4bea-8ee0-525e0682f197","Number":"63500","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Capturing And Rendering Real-World Scenes","CreditHours":3.0,"Description":""},{"Id":"6a278a2b-680c-4063-a04f-bef6d888c8bd","Number":"63600","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Internetworking","CreditHours":3.0,"Description":""},{"Id":"a7d70bf7-b9b9-4937-ac06-32a8ea8e3422","Number":"63800","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Multimedia Networking And Operating Systems","CreditHours":3.0,"Description":""},{"Id":"7f46f242-b427-4fad-b805-10dda17596e3","Number":"65500","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Advanced Cryptology","CreditHours":3.0,"Description":""},{"Id":"60136233-cf26-4b05-9e11-28b4490cd0e8","Number":"66100","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Formal Compiling Methods","CreditHours":3.0,"Description":""},{"Id":"806c057c-bcb1-45e2-99a5-235419d2efd6","Number":"66200","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Pattern Recognition And Decision-Making Processes","CreditHours":3.0,"Description":""},{"Id":"2f7d86d3-a08f-4f56-b14a-982433e5b589","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Data Protection/Insider Threat","CreditHours":3.0,"Description":""},{"Id":"4127f764-a605-4649-8026-199130f98cef","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Dynamic Effect Analysis","CreditHours":3.0,"Description":""},{"Id":"354dbb88-1e5c-4f7d-a50e-a94ee72b4593","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Graph & Netwk Algo:Thry&Prac","CreditHours":3.0,"Description":""},{"Id":"7f067b4d-6d01-4365-aa98-dba658983a27","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In CS","CreditHours":0.0,"Description":""},{"Id":"d6bf019d-1851-43f7-8fb4-d446442b7e79","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Many-Core Virtual Machines","CreditHours":3.0,"Description":""},{"Id":"8840e6c2-6020-4eb8-8dd4-15bafaadfb24","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Software Trust Management","CreditHours":3.0,"Description":""},{"Id":"34dbd70c-daa0-4853-b396-dbc6dc290491","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Optimization With Java","CreditHours":2.0,"Description":""},{"Id":"045416a9-35f3-41fe-b425-9c0b4d2bff86","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Graph Algorithms For Brain Ntw","CreditHours":3.0,"Description":""},{"Id":"01a34691-9bdd-443c-b3a0-7222fdcdb6d7","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Seminar On Topics In Computer Sciences","CreditHours":0.0,"Description":""},{"Id":"26d4017e-df7d-403c-b1ee-d22b07b1cf2e","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Deep Learning","CreditHours":3.0,"Description":""},{"Id":"7e09b7cc-c06b-4e2a-bf22-f5b4c0d7b1b5","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Provenance Techniques In OS","CreditHours":3.0,"Description":""},{"Id":"21af4492-1580-4e97-9d56-5bc4a6f644c4","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Statistical Machine Lrning II","CreditHours":3.0,"Description":""},{"Id":"7533b640-a92d-4631-aa5c-7f6502d41204","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Privacy Enhancing Tech Topics","CreditHours":3.0,"Description":""},{"Id":"592efec0-38ff-497a-b623-59b3cc8d30da","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Independent Research","CreditHours":3.0,"Description":""},{"Id":"1b868766-2557-40b9-b224-61976374b9aa","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Git Based Data Model For Nosql","CreditHours":3.0,"Description":""},{"Id":"6794a928-3a14-49e3-994f-00ca23a40df2","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Intro Bioinformatics Algorithm","CreditHours":3.0,"Description":""},{"Id":"e02608d1-96d1-4516-85d8-f3343852e40c","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Cryptography II","CreditHours":3.0,"Description":""},{"Id":"4ba91d89-656a-42d6-8821-ce920b113b74","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Declarative Prog For Nosql","CreditHours":3.0,"Description":""},{"Id":"27a3f4fd-ab14-4576-877e-4b5f7d1ac262","Number":"69000","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Topics In Data Mining","CreditHours":3.0,"Description":""},{"Id":"70f6cb0f-86e6-4ec4-893d-eb6d22698488","Number":"69800","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research MS Thesis","CreditHours":1.0,"Description":""},{"Id":"a8e6c2bc-3887-435c-b43d-ec15dd477865","Number":"69900","SubjectId":"86ad8a59-6ddc-4067-9f6b-169c8eec86a6","Title":"Research PhD Thesis","CreditHours":1.0,"Description":""}]}