Programmes
Graduate Student Directory
Department of Computer Science Department of Information Systems and Analytics
Graduate Student Directory
Graduate Student Directory
Common Modules Table (Cohorts 2020 and before)
Common Modules Table (Cohorts 2020 and before) Module Code Module Title Modular Credits CS1231S Discrete Structures 4 MA1101R Linear Algebra I 4 MA1102R Calculus 4 ST2131/ MA2216 Probability 4 CS3230 Design and Analysis of Algorithms 4 XFC4101/ MA4199 Integrated Honours…
Artificial Intelligence
LEADING THE WAY IN AI INNOVATION The NUS School of Computing has consistently led the way in developing new and innovative computing solutions, which have made our daily lives better. Our dedicated faculty and researchers are visionaries who shape the…
FAQ
Information accurate as of August 2023 1. How can I apply for SEP? Please submit your SEP applications online via EduRec (Navigation Path: EduRec > Self Service > Global Education > External Study Application). 2. I’m a year one student…
Student Testimonials
Jet Tan, Computer Science, SEP @ National Yang Ming Chiao Tung University, Taiwan, AY2022/2023 National Yang Ming Chiao Tung University is a highly respected institution that is recognised for its strong academic programmes. I was fortunate enough to participate in…
Credit Transfer
Please be informed that only your home faculty can assist with the credit transfer process. School of Computing students who have participated in the Student Exchange Programme (SEP), Singapore Universities Student Exchange Programme (SUSEP), and summer/winter programmes should follow the…
Course Mappings
Students must take an active approach to ensure the quality and accuracy of their mapping requests. When selecting courses at partner universities, it is essential to refer to the most updated syllabus available on the university’s website. However, some partner…
Posters
Title 1 Presenter: Chen Manman (chenman@comp.nus.edu.sg)Title: Ensuring Security, Reliability and Robustness of Web ApplicationAbstract:Web and cloud applications nowadays are ubiquitous. Nevertheless, any vulnerability in these applications is susceptible to be exploited by malicious users, which form serious security problems. In…