Biological Approaches to Computer Security: Winter 2012: Difference between revisions

From Soma-notes
 
(27 intermediate revisions by 3 users not shown)
Line 22: Line 22:
     </th>
     </th>
   </tr>
   </tr>
    <tr>
      <td>
      <p>Jan. 4, 6
      </p>
      </td>
      <td>
      <p>Introduction
      </p>
      </td>
      <td>
      <p>Tom Ray, [http://people.scs.carleton.ca/~soma/biosec/readings/tierra.pdf Tierra] (1992)
      </p>
      </td>
      <td>
      <p>[[BioSec: Artificial Life|Artificial Life Notes]]
      </p>
      </td>
    </tr>
     <tr>
     <tr>
       <td>
       <td>
Line 27: Line 45:
       </p>
       </p>
       </td>
       </td>
      <td> </td>
       <td>
       <td>
       <p>Darwin, [http://www.gutenberg.org/ebooks/2009 The Origin of Species, 6th Ed.], Chapter 1  
      <p>Evolution
      </p>
      </td>
      <td>
       <p>Darwin, [http://www.gutenberg.org/ebooks/2009 The Origin of Species, 6th Ed.], Chapter 1
      </p>
      </td>
      <td>
      <p>[[BioSec: Evolution|Evolution Notes]]
      </p>
      </td>
    </tr>
    <tr>
      <td>
      <p>Jan. 18,20
      </p>
      </td>
      <td>
      <p>Evolution
      </p>
      </td>
      <td>
      <p>Darwin, [http://www.gutenberg.org/ebooks/2009 The Origin of Species, 6th Ed.], 2 Chapters assigned, and Conclusion
      </p>
      </td>
      <td>
      <p>[[BioSec: Evolution|Evolution Notes]]
      </p>
      </td>
    </tr>
<tr>
      <td>
      <p>Jan. 25,27
      </p>
      </td>
      <td>
      <p> Unit 1: Setting the Stage
       </p>
       </p>
       </td>
       </td>
       <td>
       <td>
       <p>&nbsp;
       <p> Reading from Textbook: Biology: Exploring the Diversity of Life
       </p>
       </p>
       </td>
       </td>
       <td>
       <td>
       <p>[[BioSec: Evolution]]
       <p>[[BioSec: Text: Unit 1: Setting the Stage|Unit 1 Notes]]
       </p>
       </p>
       </td>
       </td>
     </tr>
     </tr>
</table>
</table>
Other readings:
* [http://news.sciencemag.org/sciencenow/2012/02/danger-signals-from-dying-cells-.html Evidence for Danger Signals]
==Discussion Notes==
[[BioSec: CDN|Course Discussion Notes]] A place for things where you don't know where to put them yet  '''[Last updated on {{CURRENTTIME}}, {{CURRENTDAY2}} {{CURRENTMONTHNAME}} {{CURRENTYEAR}} (UTC)]'''
[[BioSec: DNMar23|Discussion Notes from March 23 Class]]
==Individual Notes==
* [[BioSec 2012: Annie|Annie]]
* [[BioSec 2012: Elizabeth|Elizabeth]]
* [[BioSec 2012: Cheryl|Cheryl]]
* [[BioSec 2012: Daniel|Daniel]]
* [[BioSec 2012: Luc|Luc]]
* [[BioSec 2012: Mohammad|Mohammad]]
==Consolidated Notes==
The notes for the whole class, consolidated, condensed, and edited are [[BioSec 2012: Consolidated Notes|here]].  Students in the class - please go ahead and add to it!

Latest revision as of 16:11, 30 April 2012

This is the main page for the Winter 2012 run of Carleton University's Biological Approaches to Computer Security (COMP 5900X). The instructor for this course is Anil Somayaji.

Course Outline

The course outline for this course can be found here.

Readings

Week

Topics

Readings

Notes

Jan. 4, 6

Introduction

Tom Ray, Tierra (1992)

Artificial Life Notes

Jan. 11,13

Evolution

Darwin, The Origin of Species, 6th Ed., Chapter 1

Evolution Notes

Jan. 18,20

Evolution

Darwin, The Origin of Species, 6th Ed., 2 Chapters assigned, and Conclusion

Evolution Notes

Jan. 25,27

Unit 1: Setting the Stage

Reading from Textbook: Biology: Exploring the Diversity of Life

Unit 1 Notes

Other readings:

Discussion Notes

Course Discussion Notes A place for things where you don't know where to put them yet [Last updated on 22:47, 31 October 2024 (UTC)]

Discussion Notes from March 23 Class

Individual Notes

Consolidated Notes

The notes for the whole class, consolidated, condensed, and edited are here. Students in the class - please go ahead and add to it!