Course |
Course title |
Extend of
teaching |
Comple-
tion |
Seme-
ster |
Recomm.
sem. |
Cre-
dits |
Instruc-
tor |
Cat. |
NIE-EVY |
Efficient Text Pattern Matching |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Holub J. |
18101 |
NIE-NON |
Nonlinear Continuous Optimization and Numerical Methods |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Kruis J. |
18101 |
NIE-SYP |
Parsing and Compilers |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Janoušek J. |
18101 |
NIE-ADP |
Architecture and Design patterns |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Borský J. |
18102 |
NIE-AM1 |
Middleware Architectures 1 |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Dojčinovski M., Kuchař J., Vitvar T. |
18102 |
NIE-EHW |
Embedded Hardware |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Schmidt J. |
18103 |
NIE-ESW |
Embedded Software |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Kubátová H., Skrbek M. |
18103 |
NIE-TES |
Systems Theory |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Ratschan S. |
18103 |
NIE-REV |
Reverse Engineering |
1P+2C |
Z,ZK |
Z |
1 |
5 |
Dostál J., Kokeš J. |
18106 |
NIE-SBF |
System Security and Forensics |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Fornůsek S. |
18106 |
NIE-KOD |
Data Compression |
2P+1C |
Z,ZK |
L |
2 |
5 |
Holub J. |
18101 |
NIE-GAK |
Graph theory and combinatorics |
2P+2C |
Z,ZK |
L |
2 |
5 |
Valla T. |
18101 |
NIE-PIS |
Advanced Information Systems |
2P+1C |
Z,ZK |
L |
2 |
5 |
Kroha P., Pavlíčková P. |
18102 |
NIE-FME |
Formal Methods and Specifications |
2P+1C |
Z,ZK |
L |
2 |
5 |
Ratschan S. |
18102 |
NIE-NSS |
Normalized Software Systems |
2P |
ZK |
L |
2 |
5 |
Pergl R., Suchánek M. |
18102 |
NIE-SIM |
Digital Circuit Simulation and Verification |
2P+1C |
Z,ZK |
L |
2 |
5 |
Kohlík M. |
18103 |
NIE-BVS |
Embedded Security |
2P+2C |
Z,ZK |
L |
2 |
5 |
Novotný M. |
18103 |
NIE-BKO |
Error Control Codes |
2P+1C |
Z,ZK |
L |
2 |
5 |
Kubalík P. |
18103 |
NIE-ADM |
Data Mining Algorithms |
2P+1C |
Z,ZK |
L |
2 |
5 |
Da Silva Alves R., Kordík P. |
18105 |
NIE-HWB |
Hardware Security |
2P+2C |
Z,ZK |
L |
2 |
5 |
Buček J. |
18106 |
NIE-MKY |
Mathematics for Cryptology |
3P+1C |
Z,ZK |
L |
2 |
5 |
Jureček M., Lórencz R. |
18106 |
NIE-SIB |
Network Security |
2P+1C |
Z,ZK |
L |
2 |
5 |
Fornůsek S. |
18106 |
NIE-PDB |
Advanced Database Systems |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Svoboda M. |
18102 |
NIE-NUR |
User Interface Design |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Pavlíček J. |
18102 |
NIE-TSP |
Testing and Reliability |
2P+2C |
Z,ZK |
Z |
3 |
5 |
Fišer P. |
18103 |
NIE-MVI |
Computational Intelligence Methods |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Čepek M., Kordík P. |
18105 |
NIE-KRY |
Advanced Cryptology |
2P+2C |
Z,ZK |
Z |
3 |
5 |
Lórencz R. |
18106 |
NIE-AIB |
Algorithms of Information Security |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Jureček M. |
18106 |
|