Course |
Course title |
Extend of
teaching |
Comple-
tion |
Seme-
ster |
Recomm.
sem. |
Cre-
dits |
Instruc-
tor |
Cat. |
NI-EVY |
Efficient Text Pattern Matching |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Holub J. |
18101 |
NI-MPJ |
Modelling of Programming Languages |
2P+1C |
Z,ZK |
Z |
1 |
5 |
|
18101 |
NI-NON |
Nonlinear Continuous Optimization and Numerical Methods |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Kruis J. |
18101 |
NI-ADP |
Architecture and Design patterns |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Borský J., Křikava F., Zimolka J. |
18102 |
NI-EHW |
Embedded Hardware |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Schmidt J. |
18103 |
NI-ESW |
Embedded Software |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Kubátová H., Skrbek M. |
18103 |
NI-EPC |
Effective C++ programming |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Langr D. |
18104 |
NI-MTI |
Modern Internet Technologies |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Moucha A. |
18104 |
NI-UMI |
Artificial intelligence |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Surynek P. |
18105 |
NI-SBF |
System Security and Forensics |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Fornůsek S., Svetlík M. |
18106 |
NI-SLA |
Sublinear algorithms |
2P+1C |
Z,ZK |
Z |
|
5 |
Knop D. |
18101 |
NI-GEN |
Code Generators |
2P+1C |
Z,ZK |
Z |
2 |
5 |
Janoušek J., Máj P. |
18101 |
NI-KOD |
Data Compression |
2P+1C |
Z,ZK |
L |
2 |
5 |
Holub J. |
18101 |
NI-GAK |
Graph theory and combinatorics |
2P+2C |
Z,ZK |
L |
2 |
5 |
Valla T. |
18101 |
NI-RUN |
Runtime Systems |
2P+1C |
Z,ZK |
L |
2 |
5 |
Křikava F., Vlasák M. |
18101 |
NI-APR |
Selected Methods for Program Analysis |
2P+1C |
Z,ZK |
L |
2 |
5 |
Křikava F. |
18101 |
NI-FME |
Formal Methods and Specifications |
2P+1C |
Z,ZK |
L |
2 |
5 |
Ratschan S. |
18102 |
NI-AM2 |
Middleware Architectures 2 |
2P+1C |
Z,ZK |
L |
2 |
5 |
Vitvar T. |
18102 |
NI-NSS |
Normalized Software Systems |
2P |
ZK |
L |
2 |
5 |
Pergl R., Verelst J. |
18102 |
NI-DDW |
Web Data Mining |
2P+1C |
Z,ZK |
L |
2 |
5 |
Kuchař J. |
18102 |
NI-SIM |
Digital Circuit Simulation and Verification |
2P+1C |
Z,ZK |
L |
2 |
5 |
Kohlík M. |
18103 |
NI-BVS |
Embedded Security |
2P+2C |
Z,ZK |
L |
2 |
5 |
Novotný M. |
18103 |
NI-BKO |
Error Control Codes |
2P+1C |
Z,ZK |
L |
2 |
5 |
Kubalík P., Pluháček A. |
18103 |
NI-GPU |
GPU Architectures and Programming |
2P+1C |
Z,ZK |
L |
2 |
5 |
Šimeček I. |
18104 |
NI-VCC |
Virtualization and Cloud Computing |
2P+1C |
Z,ZK |
L |
2 |
5 |
Fesl J., Vondra T. |
18104 |
NI-BML |
Bayesian Methods for Machine Learning |
2P+1C |
KZ |
L |
2 |
5 |
Dedecius K., Tichý O. |
18105 |
NI-ADM |
Data Mining Algorithms |
2P+1C |
Z,ZK |
L |
2 |
5 |
Da Silva Alves R., Kordík P., Vašata D. |
18105 |
NI-PON |
Selected Topics in Optimization and Numerical mathematics |
2P+1C |
Z,ZK |
L |
2 |
5 |
Klouda K., Starosta Š., Vašata D. |
18105 |
NI-HWB |
Hardware Security |
2P+2C |
Z,ZK |
L |
2 |
5 |
Buček J., Lórencz R. |
18106 |
NI-MKY |
Mathematics for Cryptology |
3P+1C |
Z,ZK |
L |
2 |
5 |
Jureček M. |
18106 |
NI-SIB |
Network Security |
2P+1C |
Z,ZK |
L |
2 |
5 |
Dostál J., Šutovský M. |
18106 |
NI-SYP |
Parsing and Compilers |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Janoušek J. |
18101 |
NI-PDB |
Advanced Database Systems |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Valenta M. |
18102 |
NI-VMM |
Retrieval from Multimedia |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Skopal T. |
18102 |
NI-SWE |
Semantic Web and Knowledge Graphs |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Dojčinovski M., Klímek J. |
18102 |
NI-NUR |
User Interface Design |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Pavlíček J. |
18102 |
NI-TES |
Systems Theory |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Ratschan S. |
18103 |
NI-TSP |
Testing and Reliability |
2P+2C |
Z,ZK |
Z |
3 |
5 |
Fišer P. |
18103 |
NI-DSV |
Distributed Systems and Computing |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Tvrdík P. |
18104 |
NI-MCC |
Multicore CPU Computing |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Šimeček I., Langr D. |
18104 |
NI-OSY |
Operating Systems and Systems Programming |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Zemánek P. |
18104 |
NI-MVI |
Computational Intelligence Methods |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Kordík P. |
18105 |
NI-PDD |
Data Preprocessing |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Jiřina M. |
18105 |
NI-SCR |
Statistical Analysis of Time Series |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Dedecius K. |
18105 |
NI-KRY |
Advanced Cryptology |
2P+2C |
Z,ZK |
Z |
3 |
5 |
Lórencz R. |
18106 |
NI-AIB |
Algorithms of Information Security |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Jureček M., Lórencz R. |
18106 |
NI-REV |
Reverse Engineering |
1P+2C |
Z,ZK |
Z |
3 |
5 |
Dostál J., Kokeš J., Lórencz R. |
18106 |
|