Jiawei Yuan

Jiawei Yuan

Assistant Professor

Computer & Information Science

Research Website

508-999-8299

etp\i;ph\nn_)`_p

Dion 308A

Education

2015University of Arkansas Little RockPhD
2011University of Electronic Science and Technology of ChinaBS

Teaching

Programs

Teaching

Courses

Comprehensive coverage of all major groups of algorithms, including divide-and-conquer, dynamic programming, greedy, backtracking, branch-and-bound, and parallel algorithms. Discussion of the design and implementation of complex, dynamic data structures. The course also covers an introduction to the functional paradigm.

Comprehensive coverage of all major groups of algorithms, including divide-and-conquer, dynamic programming, greedy, backtracking, branch-and-bound, and parallel algorithms. Discussion of the design and implementation of complex, dynamic data structures. The course also covers an introduction to the functional paradigm.

Comprehensive coverage of all major groups of algorithms, including divide-and-conquer, dynamic programming, greedy, backtracking, branch-and-bound, and parallel algorithms. Discussion of the design and implementation of complex, dynamic data structures. The course also covers an introduction to the functional paradigm.

Comprehensive coverage of all major groups of algorithms, including divide-and-conquer, dynamic programming, greedy, backtracking, branch-and-bound, and parallel algorithms. Discussion of the design and implementation of complex, dynamic data structures. The course also covers an introduction to the functional paradigm.

Foundations of applied cryptography through practical applications. Key concepts of applied cryptography, including classical cryptography and modern secret key and public key cryptography are introduced. Cryptographic primitives, their utilization to develop modern protocols for secure communication, secure computation are discussed. The subjects covered include Symmetric Encryption, Asymmetric Encryption, Message Authentication, Key Distribution and Management, Public Key Protocols, Digital Signatures, and Secure Computation.

Latest from Jiawei

Request edits to your profile