Course |
Course title |
Extend of
teaching |
Comple-
tion |
Seme-
ster |
Recomm.
sem. |
Cre-
dits |
Instruc-
tor |
Cat. |
NI-MPJ |
Modelling of Programming Languages |
2P+1C |
Z,ZK |
Z |
1 |
5 |
|
18101 |
MI-SYP.16 |
Parsing and Compilers |
2P+1C |
Z,ZK |
Z |
1 |
5 |
|
18101 |
NI-PAS |
Advanced Aspects of Business |
2P+1C |
Z,ZK |
Z |
1 |
4 |
Buchtela D., Kučera Z. |
18102 |
NI-ADP |
Architecture and Design patterns |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Borský J., Křikava F., Zimolka J. |
18102 |
NI-AM1 |
Middleware Architectures 1 |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Vitvar T. |
18102 |
MI-MEP.16 |
Modelling of Business Processes |
2P+1C |
Z,ZK |
Z |
1 |
5 |
|
18102 |
MI-MDW.16 |
Web Services and Middleware |
2P+1C |
Z,ZK |
Z |
1 |
5 |
|
18102 |
MI-NFA.16 |
Design for the FPGA and ASIC Technology |
2P+1C |
Z,ZK |
Z |
1 |
5 |
|
18103 |
MI-SIM.16 |
Digital Circuit Simulation |
2P+1C |
Z,ZK |
L,Z |
1 |
5 |
|
18103 |
NI-EHW |
Embedded Hardware |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Schmidt J. |
18103 |
NI-ESW |
Embedded Software |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Kubátová H., Skrbek M. |
18103 |
MI-TES.16 |
Systems Theory |
2P+1C |
Z,ZK |
Z |
1 |
5 |
|
18103 |
NI-EPC |
Effective C++ programming |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Langr D. |
18104 |
NI-MTI |
Modern Internet Technologies |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Moucha A. |
18104 |
MI-REV.16 |
Reverse Engineering |
1P+2C |
Z,ZK |
Z |
1 |
5 |
|
18106 |
NI-SBF |
System Security and Forensics |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Fornůsek S., Svetlík M. |
18106 |
NI-VMM |
Retrieval from Multimedia |
2P+1C |
Z,ZK |
Z |
1,3 |
5 |
Skopal T. |
18102 |
NI-PDD |
Data Preprocessing |
2P+1C |
Z,ZK |
Z |
1,3 |
5 |
Jiřina M. |
18105 |
MI-GEN |
Code Generators |
2P+1C |
Z,ZK |
L |
2 |
4 |
|
18101 |
MI-FLP |
Functional and Logical Programming |
2P+1C |
Z,ZK |
L |
2 |
4 |
|
18101 |
NI-APR |
Selected Methods for Program Analysis |
2P+1C |
Z,ZK |
L |
2 |
5 |
Křikava F. |
18101 |
MI-PIS.16 |
Advanced Information Systems |
2P+1C |
Z,ZK |
L |
2 |
5 |
|
18102 |
NI-BUI |
Business Informatics |
2P+2C |
Z,ZK |
L |
2 |
5 |
Pavlíčková P. |
18102 |
MI-FME.16 |
Formal Methods and Specifications |
2P+1C |
Z,ZK |
L |
2 |
5 |
|
18102 |
MI-MBI.16 |
Management of Business Informatics |
3P+1C |
Z,ZK |
L |
2 |
5 |
|
18102 |
NI-AM2 |
Middleware Architectures 2 |
2P+1C |
Z,ZK |
L |
2 |
5 |
Vitvar T. |
18102 |
MI-NSS.16 |
Normalized Software Systems |
2P |
ZK |
L |
2 |
5 |
|
18102 |
MI-DDW.16 |
Web Data Mining |
2P+1C |
Z,ZK |
L |
2 |
5 |
|
18102 |
MI-W20.16 |
Web 2.0 |
2P+1C |
Z,ZK |
L |
2 |
5 |
|
18102 |
NI-BVS |
Embedded Security |
2P+2C |
Z,ZK |
L |
2 |
5 |
Novotný M. |
18103 |
NI-BKO |
Error Control Codes |
2P+1C |
Z,ZK |
L |
2 |
5 |
Kubalík P., Pluháček A. |
18103 |
MI-BHW.16 |
Security and Hardware |
2P+2C |
Z,ZK |
L |
2 |
5 |
|
18103 |
MI-POA.16 |
Advanced Computer System Architectures |
2P+1C |
Z,ZK |
L |
2 |
5 |
|
18104 |
NI-GPU |
GPU Architectures and Programming |
2P+1C |
Z,ZK |
L |
2 |
5 |
Šimeček I. |
18104 |
MI-PAP.16 |
Parallel Computer Architectures |
2P+1C |
Z,ZK |
L |
2 |
5 |
|
18104 |
NI-VCC |
Virtualization and Cloud Computing |
2P+1C |
Z,ZK |
L |
2 |
5 |
Fesl J., Vondra T. |
18104 |
NI-BML |
Bayesian Methods for Machine Learning |
2P+1C |
KZ |
L |
2 |
5 |
Dedecius K., Tichý O. |
18105 |
MI-HWB.16 |
Hardware Security |
2P+2C |
Z,ZK |
L |
2 |
5 |
|
18106 |
MI-MKY.16 |
Mathematics for Cryptology |
3P+1C |
Z,ZK |
L |
2 |
5 |
|
18106 |
MI-SYB.16 |
System Security |
2P+2C |
Z,ZK |
L |
2 |
5 |
|
18106 |
MI-RUN.16 |
Runtime Systems |
2P+1C |
Z,ZK |
Z |
3 |
5 |
|
18101 |
NI-PDB |
Advanced Database Systems |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Valenta M. |
18102 |
NI-DSS |
Decision Support Systems |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Buchtela D., Pavlíčková P., Pergl R. |
18102 |
MI-PCM.16 |
Project And Change Management |
1P+2C |
KZ |
Z,L |
3 |
3 |
|
18102 |
MI-SWE.16 |
Semantic Web |
2P+1C |
Z,ZK |
Z |
3 |
5 |
|
18102 |
NI-TSW |
Software Product Development |
1P+2C |
KZ |
Z |
3 |
4 |
Pavlíčková P. |
18102 |
MI-SMI.16 |
Strategic Management of Informatics |
3P+1C |
Z,ZK |
Z |
3 |
5 |
|
18102 |
NI-NUR |
User Interface Design |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Pavlíček J. |
18102 |
MI-SOC.16 |
Systems on Chip |
2P+1C |
Z,ZK |
Z |
3 |
5 |
|
18103 |
MI-TSP.16 |
Testing and Reliability |
2P+2C |
Z,ZK |
Z |
3 |
5 |
|
18103 |
MI-DSV.16 |
Distributed Systems and Computing |
2P+1C |
Z,ZK |
Z |
3 |
5 |
|
18104 |
NI-MCC |
Multicore CPU Computing |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Šimeček I., Langr D. |
18104 |
NI-OSY |
Operating Systems and Systems Programming |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Zemánek P. |
18104 |
MI-BPR.16 |
Security and Secure Programming |
2P+1C |
Z,ZK |
Z |
3 |
5 |
|
18104 |
NI-MVI |
Computational Intelligence Methods |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Kordík P. |
18105 |
MI-EDW.16 |
Enterprise Data Warehouse Systems |
2P+1C |
Z,ZK |
L |
3 |
5 |
|
18105 |
MI-KRY.16 |
Advanced Cryptology |
2P+2C |
Z,ZK |
Z |
3 |
5 |
|
18106 |
NI-AIB |
Algorithms of Information Security |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Jureček M., Lórencz R. |
18106 |
MI-SIB.16 |
Network Security |
2P+1C |
Z,ZK |
L |
3 |
5 |
|
18106 |
|