https://trello.com/b/kAFCpzpw/cto-2018
Information Technology Dictionary:
- https://www.webopedia.com/Top_Category.asp
- https://whatis.techtarget.com/
- http://www.mhhe.com/business/buscom/gregg/docs/appd.pdf
- https://pc.net/glossary/
- https://www.computerhope.com/jargon.htm
- https://en.wikipedia.org/wiki/Glossary_of_computer_hardware_terms
- http://www.math.utah.edu/~wisnia/glossary.html
- https://www.computer-dictionary-online.org/
- https://burmastarrecords.files.wordpress.com/2009/12/microsoft_computer_dictionary__fifth_edition1.pdf
Building the systems and infrastructure for technology deployment suitable for business work
Engineering Part:
-
Computer Vision for IOT
-
Data center system
-
Data warehouse system
-
Algorithms application in the big system
-
Blockchain System and Applied
-
Internet Banking
-
Mobile Banking
-
Open-source Banking
-
Bitcoin and Cryptocurrency ATMs
-
ATM Machine
-
E-Banking
-
SMS-Banking
-
E-Wallet
-
Voicemail Server
-
SMS Server
-
VPN Server
-
Billing System
-
Core Banking System
-
Core Retail Trading
-
Back Office System:
- Enterprise Resource Planning (ERP) System
- Customer-Relationship Management (CRM) System
- Human Resource Management (HRM) System
- Supply Chain Management (SCM) System
- Business Intelligence (BI) System
-
Doctor of Information Technology:
Các tên môn tiếng Việt là toàn bộ các môn từ chương trình đào tạo Tiến sĩ Công Nghệ Thông Tin của Đại học Quốc gia TP HCM, Việt Nam.
- Công nghệ phần mềm tiên tiến
- Công nghệ mạng và truyền thông hiện đại
- Công nghệ máy tính hiện đại
- Quản lý hệ thống CNTT
- An toàn và bảo mật thông tin
- Công nghệ tri thức và dữ liệu
- Thuật toán phân tán (Distributed algorithms)
- Nhận dạng giọng nói
- Chủ đề nâng cao trong lý thuyết trò chơi và ứng dụng
- Chủ đề nâng cao trong mã hóa
- Trí tuệ nhân tạo nâng cao (advanced Artificial Intelligence)
- Hệ giải quyết vấn đề thông minh và ứng dụng
- Các phương pháp giao tiếp người-máy hiện đại
- Khai thác dữ liệu nâng cao
- Truy xuất thông tin
- Biểu diễn tri thức nâng cao
- Hệ thống thông tin thông minh
- Xử lý ảnh và thị giác máy tính
- Phân tích mạng xã hội
- Biểu diễn dữ liệu không gian thời gian
- Ontology biểu diễn tài nguyên trong giảng dạy và học tập
- Kiểm định phần mềm chuyên sâu
- Khai phá dữ liệu trong hệ thống thông tin dựa trên tập thô
- Bảo mật hệ thống thông tin hiện đại
- Lọc ngẫu nhiên Kalman-Bucy-Stratonovich
- Giao tiếp người máy: điều khiển máy tính - robot
- Xử lý dữ liệu video
- Khai phá dữ liệu thương mại điện tử
- Xử lý tín hiệu âm thanh online
- Mạng cảm biến không dây
- Nhận dạng giọng nói
- An ninh thông tin trên thiết bị di động
- Hệ thống phân tích và xử lý thông tin
- Định vị bằng thiết bị di động sử dụng sóng Wifi
- Bảo mật và tối ưu hóa mạng máy tính
- Thị giác máy tính
- Đồ họa máy tính và trực quan hóa
- Hệ quản trị cơ sở dữ liệu và Kho dữ liệu
- Hệ thống thông tin không gian
- Phân tích trên dữ liệu lớn
- Xữ lý song song trên dữ liệu lớn
- Kinetic data structure
- Ad-hoc sensor and communication networks
- Randomized geometric algorithms
- Rounding and approximating geometric structures
- Local and global analysis with point cloud data
- Monte-Carlo algorithms for global illumination and motion planning
- Organizing and searching libraries of 3D shapes and images
- Physical simulations involving deformations and contacts
- Estimation of mappings between 3D shapes
- Functional maps and unctional maps networks for interlinking shape and image collections
- Deep architectures for geometric data, including pointclouds
- Development of the ShapeNet annotated 3D model repository
- Analysis of GPS traces and other mobility data
- Shape Analysis
- Algorithmic Techniques for Big Data Analysis
- Algorithms for wireless sensor networks
- Mining high-dimensional data
- Geometry processing
- Computational geometry
- 3D vision and graphics
- Reinforcement learning and robotics
- Computational topology
- Computational structural biology
- Visualization
- Automated Theorem Proving
- Markov chains for problems from discrete geometry
- Medical Imaging
- Computational imaging
- Large-scale Optimization
- Surface Parameterization
- Inter-surface mapping
- Simulation-based Modelling
- Wireless sensor network
- Point-Based Graphics
- Physically based animation
- Mobile ad hoc network
- Dynamics Simulations
- Convex and Combinatorial Optimization
- Approximate probabilistic inference
- Bayesian modeling of dynamical systems
- Identity management
- Statistical Ranking Analysis
- Noncommutative Harmonic Analysis
- Brain computer interface
- Supervisory control and data acquisition
- Robotics engineering
- Natural language processing
- Share sensor
- Molecular simulation
- Analysis of image data from microscopy
- Topics in Cryptography
- Pseudorandomness and the Blum-Micali generator]: Chapter 3 from the book
- The Goldreich-Levin theorem, generalizations, and its applications: Chapter 3 from the book
- Pseudorandom functions: the GGM and cascade constructions: Chapter 4 from the book, Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security, by M. Bellare , R. Canetti, H. Krawczyk (FOCS'96)
- Algebraic PRFs from the augmented cascade and their applications: Number-theoretic constructions of efficient pseudo-random functions , by M. Naor, O. Reingold (JACM 51(2)); Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade by D. Boneh, H. Montgomery, and A. Raghunathan (CCS'10); Key Homomorphic PRFs and Their Applications by D. Boneh, K. Lewi, H. Montgomery, and A. Raghunathan (Crypto'13)
- Private information retrieval (PIR): Replication is not needed: single database, computationally-private information retrieval by E. Kushilevitz and R. Ostrovksi (FOCS'97); Computationally Private Information Retrieval with Polylogarithmic Communication, by C. Cachin, S. Micali, M. Stadler (Eurocrypt'99)
- Oblivious transfer (strong PIR): Efficient oblivious transfer protocols by M. Naor and B. Pinkas (SODA'01); Extending Oblivious Transfers Efficiently by Y. Ishai, J. Kilian, K. Nissim, E. Petrank (Crypto'03); Blind Identity-Based Encryption and Simulatable Oblivious Transfer, by M. Green and S. Hohenberger (Asiacrypt'07)
- Garbled circuits and Yao's 2-party protocol: Foundations of Garbled Circuits by M. Bellare, V. Hoang, and P. Rogaway
- The BGW multiparty protocol: Completeness theorems for non-cryptographic fault-tolerant distributed computation, by M. Ben-Or, S. Goldwasser, and A. Wigderson (STOC 1988); how to share a secret, by A. Shamir (CACM 1979)
- Set intersection and comparison protocols: Privacy-Preserving Set Operations, L. Kissner and D. Song; location privacy via private proximity testing by A. Narayanan et al
- Zero knowledge proof systems
- Zero knowledge proofs of knowledge
- Sigma protocols, ID protocols, and digital signatures: Chapter 18 from the book
- Elliptic curves: Elliptic Curves from Mordell to Diophantus and Back by E. Brown and B. Myers
- Pairings and Miller's algorithm
- Identity based encryption and chosen ciphertext security
- Advanced Topics in Cryptography
- Advanced Topics in Networking
- Digital watermarking and steganography
- Build an Internet Router
- Virtual Reality, The Stanford Center for Image System Engineering, Virtual Human Interaction
- Matrix Methods: Introduction to Applied Linear Algebra – Vectors, Matrices, and Least Squares book
- Cryptocurrencies and blockchain technologies
- Computer and Network Security
- Computational Genomics
- Research Project in Computer Security
- Data Management and Data Systems
- Database System Principles
- Data-Intensive Systems for the Next 1000x
- Cloud Computing Technology
- Compiler technology
- Parallel Programming
- Network Algorithms
- Packet Switch Architectures I
- Packet Switch Architectures II
- Statistical Signal Processing
- Incentive Mechanisms for Societal Networks
- Hackers and Heroes
- Network Application Studio
- Computers, Ethics, and Public Policy
- Embedded Wireless Systems
- Wireless Networking
- Designing Computer Science Experiments
- Networked Systems for Virtual Worlds
- Digital Systems Design
- Wireless Networking Research
- The Computer of History, the Computer of Fiction
- Mobile Computer Vision
- Computer Vision, From 3D Reconstruction to Recognition
- Special Topics in 3D Representation and Recognition
- Special Topics in Computer Vision
- Special Topics in Computer Science
- Motion Planning
- Digital Actors
- Motion Planning for Robots, Digital Actors, and Other Moving Objects
- Algorithms for Structure and Motion in Biology
- Experimental Robotics
- Introduction to Robotics
- Advanced Robotics
- Statistical Learning Theory
- Artificial Intelligence: Principles and Techniques
- Natural Language Processing
- Natural Language Processing in DL
- Computer Musings
- Books in Print by Donald E. Knuth
- Donald E. Knuth's Programs