Main Problems
- Edit Distance
- CPU cache
- 3D Projection
Definition Problems
- “Join. (Explain with an example)
- The difference between “process” and “thread” in operating systems or programs.
- Context-free grammar. (Explain with an example)
- “Gouraud shading” and “Phong shading” in computer graphics
- Image coding schemes “GIF” and “JPEG” universally used in the WWW.
- Digital Signature method using the public-key encryption.
- Knowledge representation using the “Semantic Network”, and its feature. (Explain with an example)
- “PID control”, and the roles of its components: “P”, “I” and “D”.
Main Problems
- Sorting network
- Circuit blocks
- Robot control
Definition Problems
- Sampling theorem
- RISC and CISC processors
- TCP and UDP as transport-layer protocols in the Internet
- The data structure used for heap sort (Explain with an illustrative example)
- Features of functional programming languages
- Branch-and-bound algorithm (Explain with an example)
- Morpheme in natural languages (Explain with examples)
- Homogeneous coordinate system
Main Problems
- Number Theory — Divisor Function
- Concurrency control
- Geometry
Definition Problems
- Divide and conquer algorithm
- B-tree
- Nyquist frequency
- Impulse response, step response, and their relation
- Vector quantization
- Out-of-order execution
- Regular grammar and regular language (Examples are mandatory)
- CGI (Common Gateway Interface)
Main Problems
- Sort and search algorithms
- Counter
- Semantic networks
Definition Problems
- Position feedback and torque feedback in a servo system
- Principle of proximity sensing (a particular type)
- Uncertainty in measurement
- Hidden Markov models
- Grid computing
- Phishing
- Reflection in programming
- Referential transparency
Main Problems
- Graph Theory
- 3D Projection
- ALU
Definition Problems
- Bayes’ theorem
- Decision tree learning method
- Spread-spectrum telecommunications and its applications
- Normalization in relational database
- Turing machine
- Snoop cache
- Unicode
- Three user authentication or personal identification techniques and a comparative analysis