Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
The migration of important social processes to distributed, electronic systems raises critical security and privacy issues. Precisely defining security and privacy is difficult; designing and deploying systems that provide these properties is even harder. This course examines what security and privacy mean in these settings, the techniques that might help, and how to use these techniques effectively. Our intention is to equip computer professionals with the breadth of knowledge necessary to navigate this emerging area.
Prerequisite: COSC 50 and COSC 51, or instructor's permission. COSC 30 is recommended.
This course focuses on the communications protocols used in computer networks: their functionality, specification, verification, implementation, and performance; and how protocols work together to provide more complex services. Aspects of network architectures are also considered. Laboratory projects are an integral part of the course in which networking concepts are explored in depth.
Prerequisite: COSC 50 and COSC 51. COSC 30 is recommended.
Instructor: Campbell
Offered: 13W: Arrange 13S: 12
This course studies an advanced topic in computer systems that is not covered in the regular curriculum. Students may take this course multiple times, subject to the restriction that the topics are distinct.
Prerequisite: Vary according to the topic. Consult with the instructor.
Instructors: Smith (winter), Balkcom (spring)
Web site: http://www.cs.dartmouth.edu/~sws/cs169/
In this research seminar course, we will examine whether systematic flaws in how humans produce these rule sets to prevent malicious attacks lie at the core of real-world security frustration----and whether we can use these insights to improve the situation. The course will draw on IT security issues in real-world domains including finance, healthcare, power.
Prerequisite: Vary according to the topic. Consult with the instructor.
Instructor: Smith
Computational Social Science
Winter 2010
Instructor: Choudhury
Web-powered computer vision
Fall 2009
Instructor: Torresani
Seminar on Wireless Sensor Networks
Winter 2006
Instructor: Campbell
Data Mining
Winter 2005
Instructor: Thompson
Pervasive Computing
Winter 2003
Instructor: Kotz
Context-Aware Mobile Computing
Winter 2002
Instructor: Kotz
Building and Breaking Secure Systems: CS 88 / 188
Spring 2001, Winter 2002
Instructor: Smith
Offered: 13W: Arrange
This course covers advanced topics in operating systems, including issues such as the hardware/software interface, operating-system structure, CPU scheduling, concurrency, virtual memory, interprocess communication, file systems, protection, security, fault tolerance, and transaction processing. The course also considers many of these topics in the context of distributed systems.
Prerequisite: A grade of B+ or better in COSC 058, or passing an examination administered by the department to demonstrate competency in the material of COSC 058.
Instructor: Staff
Previously taught courses have included:
Reading Course: Security, Trust, and Society: CS 82
Winter 2005
Instructors: Anthony and Smith
Reading Course: Information Technology for Big Brother: CS 82
Winter 2003
Instructor: Smith