Software Crisis & Engineering, Monolithic Programming, Modular Programming, Object Oriented Programming, Agent Programming, Fix Defect Impact, Software Development Components, Software Development 36 Classic Mistakes (People, Process, Product, Technology), Project Management Lifecycle, Development Life Cycle, Waterfall Model, Rapid Prototyping, Incremental Model, Iterative Model, Spiral Model, Software Estimation, Function Point Analysis (FP), Software Project Management / Scheduling, Capability Maturity Model (CMM), Critical Path Method (CPM), Gantt Chart, Program Evaluation & Review Technique (PERT), Personal Software Process (PSP), JUnit, Decomposibility, Reusability, Understandability, Continuity, Protection, Direct Mapping, Few Interfaces, Small Interfaces, Explicit Interfaces, Information Hiding, Object Constrain Language (OCL), Unit Test, Integration Test, System Test, White Box / Black Box Test, Finite State Machine Testing, Big Bang, Top Down, Bottom Up, Sandwich, Use Case Driven, Quality Management, Reviews & Audits, Config Management, Change Management, Release Management, Software Maintainence, System Re-engineering, Reverse-Engineering, Oaktree Odyssey |
Computer Networks, Applications of Networks, Broadcast Networks, Point-to-Point Networks, Local Area Networks, Packet Switching (Store & Forward), Connection-Oriented & Connectionless Service, Quality of Service (Reliability), TCP/IP Model, OSI Reference Model, Session Layer, Application Layer, Physical Layer, Data Link Layer, Propogation Delay, Error Control, Framing, Simplex, Full Duplex, Sliding Window Protocol, Piggybacking, Go Back N Recovery, Selective Repeat Recovery, Medium Access Control Layer, ALOHA, Carrier Sense Multiple Access (CSMA), Collision Free Protocols, Ethernet, Hierarchical Routing, Mobile Host Routing, Ad Hoc Routing, Conjestion Control, Flow Control, Open Loop Solution, Network Layer, Routing, Conjestion Control, Inter- Networking, Datagrams, Virtual Circuits, Packet Routing, Round Trip Time
|
Artificial Intelligence, Intelligent Agents, Percepts, Actions, Goals, Environment, Reflex Agent, Goal Based Agent, Utility Based Agent, Accessible, Deterministic, Static, Discrete, Episodic, Uniform Cost Search, Depth-Limited Search, Iterative Deepening Search, Greedy Search, A Star Search, Monotonic Heuristics, Admissible Heuristics, Constraint Satisfcation Problem, Minimax Tree, Alpha Beta Pruning, Knowledge-Based Agents, Propositional Logic, Entailment, First Order Logic, Universal Quantifier, Existantial Unifier, Inference, Generalized Modus Ponens, Unification,
| Shortest Path Routing, Distance Vector Routing, Link State Routing, Closed Loop Solution, Admission Control, Reservation, Warning Bit, Choke Packets, Load Shedding, Jitter Control, Traffic Shaping, Leaky Bucket/Leaky Token Algorithm, Transport Layer, Connection Release, Connection Establishment, 3 Way Handhsake Protocol, Two Army Problem, Dynamic Buffer Management, User Data Protocol, Transmission Control Protocol, Silly Window Syndrome, Sender Nagle's Algorithm, Receiver Clark's Solution, Slow Start Algorithm, HTML, XHTML, Javascript, Perl, CGI, CSS, Engineering Ethics Professionals, Code of Conduct, Engineering Ethics, Multiracialism, Education & Elitisim, National Identitty, Social Cohesiveness, Public Housing, Principles of Governence, Pragmatism, Meritocracy, Water, Competitiveness, Key Focus Areas
|
Unit Resolution, Disjunctive Resolution, Implicative Resolution, Universal Elimination, Existential Elimination, Existential Introduction, Forward & Backward Chaining, Variable Substitution, Production Systems, Conjunctive Normal Form, Refutation, Logical Reasoning Systems, Semantic Networks, Truth Maintenance System, Conceptual Graph, Fuzzy Knowledge Representation, Bayes Theorem, Apriori Probability, Conditional Probability, Joint Probability, Posterior Probability, Model Evaluation, Confusion Matrices, ROC Curve
|
No comments:
Post a Comment