Biological Approaches to Computer Security: Winter 2012: Difference between revisions

From Soma-notes
Afry (talk | contribs)
No edit summary
Afry (talk | contribs)
Line 58: Line 58:
       </td>
       </td>
     </tr>
     </tr>
    <tr>
      <td>
      <p>Jan. 18,20
      </p>
      </td>
      <td>
      <p>Evolution
      </p>
      </td>
      <td>
      <p>Darwin, [http://www.gutenberg.org/ebooks/2009 The Origin of Species, 6th Ed.], 2 Chapters assigned, and Conclusion
      </p>
      </td>
      <td>
      <p>[[BioSec: Evolution|Evolution Notes]]
      </p>
      </td>
    </tr>
</table>
</table>



Revision as of 17:48, 18 January 2012

This is the main page for the Winter 2012 run of Carleton University's Biological Approaches to Computer Security (COMP 5900X). The instructor for this course is Anil Somayaji.

Course Outline

The course outline for this course can be found here.

Readings

Week

Topics

Readings

Notes

Jan. 4, 6

Introduction

Tom Ray, Tierra (1992)

Artificial Life Notes

Jan. 11,13

Evolution

Darwin, The Origin of Species, 6th Ed., Chapter 1

Evolution Notes

Jan. 18,20

Evolution

Darwin, The Origin of Species, 6th Ed., 2 Chapters assigned, and Conclusion

Evolution Notes

Discussion Notes

Course Discussion Notes A place for things where you don't know where to put them yet