{"id":119,"date":"2015-05-01T02:33:53","date_gmt":"2015-05-01T07:33:53","guid":{"rendered":"https:\/\/www.jsums.edu\/nmeghanathan\/?page_id=119"},"modified":"2023-06-16T09:19:06","modified_gmt":"2023-06-16T14:19:06","slug":"teaching","status":"publish","type":"page","link":"https:\/\/www.jsums.edu\/nmeghanathan\/teaching\/","title":{"rendered":"Teaching"},"content":{"rendered":"<h4><strong>Fall 2022<\/strong><\/h4>\n<h4><strong>CSC 323 Algorithm Design and Analysis, TR: 12 to 1.20 PM<\/strong><\/h4>\n<h4><strong>CSC 582 Social Network Analysis, F: 6 to 8.50 PM<\/strong><\/h4>\n<p>&nbsp;<\/p>\n<p><strong style=\"font-size: 18px; line-height: 20.8px;\">Spring 2022<\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\">CSC 323 Algorithm Design and Analysis<\/span><\/strong><\/p>\n<p><strong><span style=\"font-size: 16px;\">CSC 515\/601 Data Structures and Algorithms<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h4><strong>Fall 2021<\/strong><\/h4>\n<h4><strong>CSC 323 Algorithm Design and Analysis<\/strong><\/h4>\n<h4><strong>CSC 515\/601 Data Structures and Algorithms<\/strong><\/h4>\n<h4><strong>CSC 641 Network Science<\/strong><\/h4>\n<p>&nbsp;<\/p>\n<p><strong style=\"font-size: 18px; line-height: 20.8px;\">Spring 2021<\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\">CSC 228 Data Structures and Algorithms<\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\">CSC 323 Algorithm Design and Analysis<\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\">CSC 435\/524 Computer Networks<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Fall 2020<\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc228-fall2020\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 228 Data Structures and Algorithms<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc323-fall2020\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 323 Algorithm Design and Analysis<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc641-fall2019\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 641 Network Science<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong style=\"font-size: 18px; line-height: 20.8px;\">Spring 2020<\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc228-sp2020\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 228 Data Structures and Algorithms<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc323-sp2020\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 323 Algorithm Design and Analysis<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc435-sp2020\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 435\/524 Computer Networks<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong style=\"font-size: 18px; line-height: 20.8px;\">Fall 2019<\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc228-fall2019\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 228 Data Structures and Algorithms<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc323-fall2019\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 323 Algorithm Design and Analysis<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc641-fall2019\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 641 Network Science<\/a><\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong style=\"font-size: 18px; line-height: 20.8px;\">Spring 2019<\/strong><\/p>\n<p><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc228-sp2019\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 228 Data Structures and Algorithms<\/a><\/span><\/strong><\/p>\n<p><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc323-sp2019\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 323 Algorithm Design and Analysis<\/a><\/span><\/strong><\/p>\n<p><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc435-sp2019\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 435 Computer Networks<\/a><\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong style=\"font-size: 18px; line-height: 20.8px;\">Fall 2018<\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc228-fall2018\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 228 Data Structures and Algorithms<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc323-fall2018\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 323 Algorithm Design and Analysis<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc641-fall2018\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 641 Network Science<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong style=\"font-size: 18px; line-height: 20.8px;\">Spring\u00a02018<\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc228-01-sp2018\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 228-01 Data Structures and Algorithms (1 PM class)<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc228-60-sp2018\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 228-60 Data Structures and Algorithms (12 PM class)<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc323-sp2018\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 323 Algorithm Design and Analysis<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong style=\"font-size: 18px; line-height: 20.8px;\">Fall\u00a02017<\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc228-fall2017\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 228 Data Structures and Algorithms<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc323-fall2017\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 323 Algorithm Design and Analysis<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc641-fall2017\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 641 Network Science<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong style=\"font-size: 18px; line-height: 20.8px;\">Spring 2017<\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc323-sp2017\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 323 Algorithm Design and Analysis<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc641-sp2017\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 641 Network Science<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong style=\"font-size: 18px; line-height: 20.8px;\">Fall\u00a02016<\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc323-fall2016\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 323 Algorithm Design and Analysis<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc641-fall2016\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 641 Network Science<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong style=\"font-size: 18px; line-height: 20.8px;\">Spring 2016<\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc323-sp2016\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 323 Algorithm Design and Analysis<\/a><\/span><\/strong><\/p>\n<p style=\"font-size: 13px; line-height: 20.8px;\"><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc641-sp2016\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 641 Network Science<\/a><\/span><\/strong><\/p>\n<p><strong style=\"line-height: 20.8px; font-size: 18px;\">Fall 2015<\/strong><\/p>\n<p><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc-541-crypto-netsec-fall-2015\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 541 Cryptography and Network Security<\/a><\/span><\/strong><\/p>\n<p><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc-641-network-science-fall-2015\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 641 Network Science<\/a><\/span><\/strong><\/p>\n<p><span style=\"font-size: 18px;\"><strong>Spring 2015<\/strong><\/span><\/p>\n<p><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc-323-algorithm-design-and-analysis-spring-2015\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 323 Algorithm Design and Analysis<\/a><\/span><\/strong><\/p>\n<p><strong style=\"line-height: 20.7999992370605px; font-size: 18px;\">Fall 2014<\/strong><\/p>\n<p><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc-423499-algorithms-for-bioinformatics-fall-2014\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 423\/499 Algorithms for Bioinformatics<\/a><\/span><\/strong><\/p>\n<p><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc-434539-network-science-fall-2014\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 434\/539 Network Science<\/a><\/span><\/strong><\/p>\n<p><strong style=\"font-size: 18px; line-height: 20.7999992370605px;\">Spring 2014<\/strong><\/p>\n<p><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc-435-computer-networks-spring-2014\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 435 Computer Networks<\/a><\/span><\/strong><\/p>\n<p><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc-438539-systems-and-software-security-spring-2014\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 438\/539 Systems and Software Security<\/a><\/span><\/strong><\/p>\n<p><strong style=\"line-height: 20.7999992370605px; font-size: 18px;\">Fall 2013<\/strong><\/p>\n<p><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc-437539-computer-security-fall-2013\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 437\/539 Computer Security<\/a><\/span><\/strong><\/p>\n<p><strong style=\"line-height: 20.7999992370605px; font-size: 18px;\">Spring 2013<\/strong><\/p>\n<p><strong><span style=\"font-size: 16px;\"><a href=\"https:\/\/www.jsums.edu\/nmeghanathan\/csc-439539-advanced-information-security-spring-2013\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSC 439\/539 Advanced Information Security<\/a><\/span><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fall 2022 CSC 323 Algorithm Design and Analysis, TR: 12 to 1.20 PM CSC 582 Social Network Analysis, F: 6 to 8.50 PM &nbsp; Spring 2022 CSC 323 Algorithm Design and Analysis CSC 515\/601 Data Structures and Algorithms &nbsp; Fall 2021 CSC 323 Algorithm Design and Analysis CSC 515\/601 Data Structures and Algorithms CSC 641 [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/119"}],"collection":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/comments?post=119"}],"version-history":[{"count":5,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/119\/revisions"}],"predecessor-version":[{"id":3496,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/119\/revisions\/3496"}],"wp:attachment":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/media?parent=119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}