MATH-476: Optimal transportThe first part is devoted to Monge and Kantorovitch problems, discussing the existence and the properties of the optimal plan. The second part introduces the Wasserstein distance on measures and devel
CIVIL-522: Seismic engineeringThis course deals with the main aspects of seismic design and assessment of buildings including conceptual design. It covers different structural design and evaluation philosophies for new and existin
MICRO-606: Scaling in MEMSThis doctoral class covers the scaling of MEMS devices, including mechanical, thermal, electrostatic, electromagnetic, and microfluidic aspects.
MATH-207(d): Analysis IVThe course studies the fundamental concepts of complex analysis and Laplace analysis with a view to their use to solve multidisciplinary scientific engineering problems.
ChE-340: The engineering of chemical reactionsCe cours applique les concepts de la cinétique chimique et des bilans de masse et d'énergie pour résoudre les problèmes de génie des réactions chimiques, en mettant l'accent sur les applications indus
MICRO-435: Quantum and nanocomputingThe course teaches non von-Neumann architectures. The first part of the course deals with quantum computing, sensing, and communications. The second focuses on field-coupled and conduction-based nanoc
ENG-474: Impact studiesPrésentation des bases des études d'impact, du contexte et des outils d'évaluation de chacun des sujets et des chapitres. Illustration par de nombreux cas réels, et par un travail de groupe. Discussio
PHYS-204: Physics lab IIaCe cours pratique permet d'acquérir la connaissance des phénomènes physiques de base ainsi que de leurs applications, d'acquérir des connaissances concernant les méthodes d'observation et de mesure ai
EE-517: Bio-nano-chip designIntroduction to heterogeneous integration for Nano-Bio-CMOS sensors on Chip.
Understanding and designing of active Bio/CMOS interfaces powered by nanostructures.
COM-401: Cryptography and securityThis course introduces the basics of cryptography. We review several types of cryptographic primitives, when it is safe to use them and how to select the appropriate security parameters. We detail how