Kennesaw State University CS 5004: Fundamentals of Data Structures and Algorithms

advertisement
Kennesaw State University
DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION SYSTEMS
CS 5004: Fundamentals of Data Structures and Algorithms
Instructor:
Office Number:
Phone:
Fax:
Email:
Webpage:
Dr. Hisham Haddad
CL 3035
(770) 420-4389
(770) 423-6731
hhaddad@kennesaw.edu
http://science.kennesaw.edu/~hhaddad/
Course Description:
Study of the concepts and implementation of data structures with emphasis on their specifications,
representations, and application to problem solving. Topics include Arrays, Linked-Lists, Recursion,
Sort and Search Algorithms, Stacks, Queues, Lists, Trees, Binary Search Trees, and Graphs. The
Java language is used to illustrate the implementation aspects of covered data structured.
Prerequisites: Admission to the MSACS Program.
Textbook: Java Software Structures: Designing and Using Data Structures, Third Edition, by Lewis
and Chase, Addison-Wesley, 2010, ISBN #: 978-0-13-607858-6.
Course Objectives:
The course objectives include the following:
- Learn the concepts of Arrays and Linked-Lists
- Learn the concept of reclusion
- Learn common search and sort algorithms
- Learn the specification and implementation of common linear and nonlinear data structures
Learning Outcomes:
Upon successful completion of the course, students will develop:
- good understanding of the concepts of linear and non-linear data structures
- the ability to utilize search and sort algorithms in application development
- the ability to utilize data structures in problem solving and application development
- The ability to utilize java implementation of covered data structures
Course Modules:
This course is designed for self-study and on-line delivery. The course is divided into modules that
correspond to covered topics. The modules are recorded lectures available online to students enrolled
in the course. Students study the modules at their own pace.
Assignments:
Assignments are designed to gage students’ progress and performance. Assignments are associated
individual modules. As student must study the model notes before attempting its assignment. All
assignment will be available online. The student has only one attempt at any assignment. The
assignment must be complete and only the first submission is accepted and graded. No partial
submission of an assignment is accepted.
Page 1 of 5
Tests:
Tests are milestones that must be completed in the order they are scheduled as materials for later
tests may depend on understanding concepts and materials covered in earlier modules. Three tests
are scheduled as follows:
Test #
1
2
3
Covered Modules
Arrays, Linked-Lists, Stacks, and Queues
Lists, Recursion, and Search and Sort Algorithms
Trees, Binary Search Trees, and Graphs
A test can be given only once. No repeat attempts. Tests are not cumulative, and each test is worth
100 points. The student must request the test from the instructor when ready for it. Once all tests are
completed, no later than the end of the semester during which the course is offered, a grade is issued
for the student based on performance on the tests and assignments as outlined in the Course
Assessment section below.
Course Assessment:
Final grades are based on performance on tests and assignments. The final grade is determined
using the following weights and scale.
Milestone
Assignments
Test I
Test II
Test III
Weight
40%
20%
20%
20%
A
B
C
D
F
Grading Scale
90% - 100%
80% - 89%
70% - 79%
60% - 69%
59% or below
Class Format:
This course does not require classroom meetings. It is totally on-line. However, students can seek
help from the instructor in person during specified office hours or by appointment. Students study the
course lectures at their own pace. Assignments and tests will have time limits. The completion of the
course is limited by the end of the semester during which the course is offered.
Lectures:
All course modules (recorded lectures) will be available online to enrolled students. Additional
materials may be provided via email as needed.
Student Help:
The instructor will be available to help students. Students can seek the instructor’s help during his
office hours via email, phone, in-person (during office house) or by appointment.
Email Policy:
The instructor guarantees replies to emails received from your Kennesaw email account
(netid@students.kennesaw.edu). Emails sent from other email domains may not reach the
instructor's mailbox. In order to ensure receipt/responses to your email be sure that you communicate
with the instructor via your Kennesaw email account.
Diversity Statement:
All courses offered by the Computer Science and Information Systems department will adhere to the
KSU policy that prohibits discrimination on the basis of race, religion, color, sex, age, disability,
national origin, or sexual orientation.
Page 2 of 5
Enrollment Policy:
Only those students who are enrolled in the class may attend lectures, receive assignments, take
quizzes and exams, and receive a grade in the class. If a student is administratively withdrawn from
this course, they will not be permitted to attend class nor will they receive any grade for the class.
Classroom Behavior:
Although this course does not require classroom meetings, it is recommended that students in this
course be aware of the University Student Code of Conduct published in the Undergraduate and
Graduate Catalogs. Every KSU student is responsible for upholding the provision. For more details,
visit http://www.kennesaw.edu/academicaffairs/acadpubs/. Students who are in violation of this
policy will be asked to leave the classroom and may be subject to disciplinary action by the University.
Student Email and Web Account Access:
KSU is moving towards a central authentication server that will allow one username and password to
be used by all KSU users to access an increasing variety of applications (email, WebCT etc.) This
unified network identification is referred to as your "NetID". The new source for university-provided
email and web space for students will be located at students.kennesaw.edu All students will have
access to this system once they have established their NetID. This system will provide email service
through a web-based interface, FTP and SFTP.
How to Activate your NetID:
To activate your NetID go to http://netid.kennesaw.edu and click on the "Sign up Now!" link. You will
be asked to provide information to verify your identity and set your password. This password will only
be for NetID enabled applications.
How to Look Up a NetID:
After you have activated your NetID, you can look up other users by logging into
http://netid.kennesaw.edu and clicking on Directory Search.
How to Send Email:
For student email, your NetID in combination with the new email address would look like
netid@students.kennesaw.edu.
Web Address:
For student web address, your NETID in combination with the new server address would look like
http://students.kennesaw.edu/~netid. If you have problems please call the Service Desk at ext. 6999 or
e-mail service@kennesaw.edu.
Acquiring Final Grades:
In an effort to better utilize our technology resources, Kennesaw State University has instituted the
reporting of end of term grades by phone. This is in addition to the web version of grades, which has
been in effect for several terms. All current semester term students may call 770-420-4315 and select
Option Number 4 to secure their end of term grades. With this new development, printed grade reports
will not be mailed at the end of the term. Students needing verification of grades or enrollment should
request either an official transcript or enrollment verification through the Office of the Registrar.
Academic Integrity Statement:
Every KSU student is responsible for upholding the provisions of the Student Code of Conduct, as
published in the Undergraduate and Graduate Catalogs. Section II of the Student Code of Conduct
addresses the University's policy on academic honesty, including provisions regarding plagiarism and
cheating, unauthorized access to University materials, misrepresentation and falsification of University
records or academic work, malicious removal, retention, or destruction of library materials,
Page 3 of 5
malicious/intentional misuse of computer facilities and/or services, and misuse of student identification
cards. Incidents of alleged academic misconduct will be handled through the established procedures
of the University Judiciary Program, which includes either an "informal" resolution by a faculty
member, resulting in a grade adjustment, or a formal hearing procedure, which may subject a student
to the Code of Conduct's minimum one semester suspension requirement.
Students are encouraged to study together and to work together on class assignments and lab
exercises; however, the provisions of the STUDENT CONDUCT REGULATIONS, II. Academic
Honesty, KSC Undergraduate Catalog will be strictly enforced in this class.
Frequently students will be provided with "take-home" exams or exercises. It is the student's
responsibility to ensure they fully understand to what extent they may collaborate or discuss content
with other students. No exam work may be performed with the assistance of others or outside material
unless specifically instructed as permissible. If an exam or assignment is designated "no outside
assistance" this includes, but is not limited to, peers, books, publications, and the Internet. If a student
is instructed to provide citations for sources, proper use of citation support is expected. Additional
information can be found at the following locations.
http://www.apa.org/journals/webref.html
http://www.lib.duke.edu/libguide/citing.htm
http://bailiwick.lib.uiowa.edu/journalism/cite.html
http://www.cas.usf.edu/english/walker/papers/copyright/ipdummie.html
http://www.indiana.edu/~wts/wts/plagiarism.html
http://plagiarism.phys.virginia.edu/links.html
http://www.arts.ubc.ca/doa/plagiarism.htm
http://alexia.lis.uiuc.edu/%7ejanicke/plagiary.htm
http://webster.commnet.edu/mla/plagiarism.htm
http://www.virtualsalt.com/antiplag.htm
http://www.engr.washington.edu/~tc231/course_info/plagiarism.html
http://quarles.unbc.edu/lsc/rpplagia.html
Page 4 of 5
Kennesaw State University
DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION SYSTEMS
CS 6504: Fundamentals of Data Structures and Algorithms
Acknowledgment and Acceptance of Academic Honesty Statement
Every KSU student is responsible for upholding the provisions of the Student Code of Conduct, as
published in the Undergraduate and Graduate Catalogs. Section II of the Student Code of Conduct
addresses the University's policy on academic honesty, including provisions regarding plagiarism and
cheating, unauthorized access to University materials, misrepresentation/falsification of University records
or academic work, malicious removal, retention, or destruction of library materials, malicious/intentional
misuse of computer facilities and/or services, and misuse of student identification cards. Incidents of
alleged academic misconduct will be handled through the established procedures of the University
Judiciary Program, which includes either an "informal" resolution by a faculty member, resulting in a grade
adjustment, or a formal hearing procedure, which may subject a student to the Code of Conduct's
minimum one semester suspension requirement.
Students are encouraged to study together and to work together on class assignments and lab exercises;
however, the provisions of the STUDENT CONDUCT REGULATIONS, II. Academic Honesty, KSC
Undergraduate Catalog will be strictly enforced in this class.
Frequently students will be provided with "take-home" exams or exercises. It is the student's responsibility
to ensure they fully understand to what extent they may collaborate or discuss content with other students.
No exam work may be performed with the assistance of others or outside material unless specifically
instructed as permissible. If an exam or assignment is designated "no outside assistance" this includes, but
is not limited to, peers, books, publications, the Internet and the WWW. If a student is instructed to provide
citations for sources, proper use of citation support is expected. Additional information can be found at the
following locations.
http://www.apa.org/journals/webref.html
http://www.lib.duke.edu/libguide/citing.htm
http://bailiwick.lib.uiowa.edu/journalism/cite.html
http://www.cas.usf.edu/English/walker/papers/copyright/ipdummie.html
http://www.indiana.edu/~wts/wts/plagiarism.html
http://plagiarism.phys.virginia.edu/links.html
http://www.arts.ubc.ca/DOA/plagiarism.htm
http://alexia.lis.uiuc.edu/%7ejanicke/plagiary.htm
http://webster.commnet.edu/MLA/plagiarism.htm
http://www.virtualsalt.com/antiplag.htm
http://www.engr.washington.edu/~tc231/course_info/plagiarism.html
http://quarles.unbc.edu/lsc/rpplagia.html
Fundamentals of Data Structures and Algorithms
Course Name
Dr. Hisham Haddad
Instructor Name
Print Name
Student ID Number
Signature
Date
Page 5 of 5
Download