MATH-202(c): Analysis IIIThe course studies the fundamental concepts of vector analysis and Fourier-Laplace analysis with a view to their use in solving multidisciplinary problems in scientific engineering.
MATH-451: Numerical approximation of PDEsThe course is about the derivation, theoretical analysis and implementation of the finite element method for the numerical approximation of partial differential equations in one and two space dimens
PHYS-106(b): General physics : thermodynamicsLe but du cours de Physique générale est de donner à l'étudiant les notions de base nécessaires à la compréhension des phénomènes physiques. L'objectif est atteint lorsque l'étudiant est capable de pr
BIO-692: Symmetry and Conservation in the CellThis course shows students how the physical principles of conservation, symmetry, and locality influence the dynamics of living organisms at the molecular and cellular level. Computer simulations are
CS-401: Applied data analysisThis course teaches the basic techniques, methodologies, and practical skills required to draw meaningful insights from a variety of data, with the help of the most acclaimed software tools in the dat
CS-526: Learning theoryMachine learning and data analysis are becoming increasingly central in many sciences and applications. This course concentrates on the theoretical underpinnings of machine learning.
MATH-207(c): Analysis IV (for EL, GM, MX)This course serves as an introduction to the theory of complex analysis, Fourier series and Fourier transforms, the Laplace transform, with applications to the theory of ordinary and partial different
MSE-326: Ceramic and colloidal processingThe course covers the production of ceramics and colloids from the basic scientific concepts and theories needed to understand the forming processes to the mechanisms and methods of sintering (firing)
COM-401: Cryptography and securityThis course introduces the basics of cryptography. We review several types of cryptographic primitives, when it is safe to use them and how to select the appropriate security parameters. We detail how