PHYS-425: Quantum physics IIITo introduce several advanced topics in quantum physics, including
semiclassical approximation, path integral, scattering theory, and
relativistic quantum mechanics
CS-448: Sublinear algorithms for big data analysisIn this course we will define rigorous mathematical models for computing on large datasets, cover main algorithmic techniques that have been developed for sublinear (e.g. faster than linear time) data
ChE-201: Introduction to chemical engineeringIntroduction to Chemical Engineering is an introductory course that provides a basic overview of the chemical engineering field. It addresses the formulation and solution of material and energy balanc
CS-251: Theory of computationThis course constitutes an introduction to theory of computation. It discusses the basic theoretical models of computing (finite automata, Turing machine), as well as, provides a solid and mathematica
CS-451: Distributed algorithmsComputing is nowadays distributed over several machines, in a local IP-like network, a cloud or a P2P network. Failures are common and computations need to proceed despite partial failures of machin
MICRO-470: Scaling laws in micro & nanosystemsThis class adresses scaling laws in MEMS/NEMS. The dominant physical effects and scaling effects when downsizing sensors and actuators in microsystems are discussed, across a broad range of actuation
COM-402: Information security and privacyThis course provides an overview of information security and privacy topics. It introduces students to the knowledge and tools they will need to deal with the security/privacy challenges they are like
HUM-403: Experimental cognitive psychology IThe media frequently report on trendy studies that have been conducted in experimental cognitive psychology, and which inform the public on "human functioning" and its causes. We teach students basic
CS-459: Foundations of probabilistic proofsProbabilistic proof systems (eg PCPs and IPs) have had a tremendous impact on theoretical computer science, as well as on real-world secure systems. They underlie delegation of computation protocols a