Learning Outcomes
The course seeks to familiarize students with the basic principles governing the use of quantum pheonomena for solving computational problems. It focuses on the presentation of the mathematical background that is required to model quantum phenomena related to computational processes and to the analysis of quantum operations and algorithms capable of being executed by quantum computers. Furthermore, the course analyzes the relation between classical and quantum computations and provides a survey of the many open problems that exist in the quantum computing field. At a more applied level the course describes modern programming environments for quantum computing.
Course Contents
- Mathematical Background
- Elements of Linear Algebra, Elements of Complex Analysis
- Elements of Quantum Mechanics
- Quantum mechanical behavior in electrons and photons (spin, polarization) – Quantum Mechanical Experiments
- Qubits and their Attributes
- Representation, Superposition, Tensor Product, Entanglement, Measurement, Bell’s Inequality
- Classical Logic, Gates and Circuits
- Quantum Gates and Circuits
- Quantum Algorithms
- Deutsch-Josza, Simon, Grover, QFT, Shor
- Programming Environments for Quantum Computing
Recommended Readings
- Nielsen, M. A., Chuang, I. L., Quantum Computation and Quantum Information, Cambridge University Press, 2010.
- Instructor’s Notes
Learning Outcomes
The students upon the successful completion of the course will be able:
- to apply the appropriate techniques for programming and managing database systems
- to know the basic storage and data organization structures.
- to apply query processing, query optimization and transaction management mechanisms.
- to understand the mechanisms that ensure the integrity of the system in the case of multiple concurrent users with access to the same data and database recovery methods in case of failure.
Course Contents
- Introduction to Database Management Systems (DBMSs). Fundamental concepts of DBMSs, database applications, overview of data models.
- Data storage and file organization.
- Query processing methods
- Query optimization methods.
- Transaction management: characteristics of a transaction management system.
- Concurrency Control.
- Database recovery methods.
- Parallel and Distributed databases: design, query processing and transaction management in distributed systems.
Recommended Readings
- Ramakrishnan R. & Gehrke J. (2002): Database Management Systems (3rd Edition), McGraw Hill.
- Elmasri R. & Navathe S.B. (2007): Fundamentals of Database Systems (5th Edition), Addison-Wesley.
Learning Outcomes
The aim of the course is to present and analyze the measures implemented on a network infrastructure, the policies adopted by the network administrator to protect the network and its resources against unauthorized access, and the effectiveness (or lack of) of them. The course focuses on the security of wired-fixed networks that use Internet technology. The mechanisms and security protocols that ensure the operation of the above networks and the data of their users are presented and analyzed.
Upon successful completion of the course, the student will be familiarized with and will apply different security measures and techniques applied to wired networks that aim to provide security services to users of a network as well as to its providers.
Course Contents
- Security at lower layers.
- Network layer security solutions.
- Application layer security solutions.
- Key management protocols; identity management protocols.
- Firewalls.
- Trust management.
- Distributed authentication systems and intrusion detection systems.
Recommended Readings
- Stallings W. (2007): Network Security Essentials, Applications and Standards, 3rd Edition, Prentice Hall.
- Kaufman C., Perlman R. & Speciner M. (2002): Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall.