Course |
Course title |
Extend of
teaching |
Comple-
tion |
Seme-
ster |
Recomm.
sem. |
Cre-
dits |
Instruc-
tor |
Cat. |
NI-EVY |
Efficient Text Pattern Matching |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Holub J. |
18101 |
NI-MPJ |
Modelling of Programming Languages |
2P+1C |
Z,ZK |
Z |
1 |
5 |
|
18101 |
NI-NON |
Nonlinear Continuous Optimization and Numerical Methods |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Kruis J. |
18101 |
NI-SYP |
Parsing and Compilers |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Janoušek J. |
18101 |
NI-PAS |
Advanced Aspects of Business |
2P+1C |
Z,ZK |
Z |
1 |
4 |
Buchtela D., Kučera Z. |
18102 |
NI-ADP |
Architecture and Design patterns |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Borský J., Křikava F. |
18102 |
NI-MEP |
Modelling of Enterprise Processes |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Pergl R., Skotnica M. |
18102 |
NI-EHW |
Embedded Hardware |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Schmidt J. |
18103 |
NI-ESW |
Embedded Software |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Kubátová H., Skrbek M. |
18103 |
NI-TES |
Systems Theory |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Ratschan S. |
18103 |
NI-EPC |
Effective C++ programming |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Langr D. |
18104 |
NI-MTI |
Modern Internet Technologies |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Moucha A. |
18104 |
NI-UMI |
Artificial intelligence |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Surynek P. |
18105 |
NI-PDD |
Data Preprocessing |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Jiřina M. |
18105 |
NI-REV |
Reverse Engineering |
1P+2C |
Z,ZK |
Z |
1 |
5 |
Dostál J., Kokeš J., Lórencz R. |
18106 |
NI-SBF |
System Security and Forensics |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Fornůsek S., Svetlík M. |
18106 |
NI-GEN |
Code Generators |
2P+1C |
Z,ZK |
L |
2 |
5 |
Máj P. |
18101 |
NI-KOD |
Data Compression |
2P+1C |
Z,ZK |
L |
2 |
5 |
Holub J. |
18101 |
NI-GAK |
Graph theory and combinatorics |
2P+2C |
Z,ZK |
L |
2 |
5 |
Valla T. |
18101 |
NI-RUN |
Runtime Systems |
2P+1C |
Z,ZK |
L |
2 |
5 |
Siek K. |
18101 |
NI-APR |
Selected Methods for Program Analysis |
2P+1C |
Z,ZK |
L |
2 |
5 |
Křikava F. |
18101 |
NI-BUI |
Business Informatics |
2P+2C |
Z,ZK |
L |
2 |
5 |
Pavlíčková P. |
18102 |
NI-PIS |
Enterprise Information Systems |
2P+1C |
Z,ZK |
L |
2 |
5 |
Závrbský M. |
18102 |
NI-FME |
Formal Methods and Specifications |
2P+1C |
Z,ZK |
L |
2 |
5 |
Ratschan S. |
18102 |
NI-NSS |
Normalized Software Systems |
2P |
ZK |
L |
2 |
5 |
Pergl R., Verelst J. |
18102 |
NI-SIM |
Digital Circuit Simulation and Verification |
2P+1C |
Z,ZK |
L |
2 |
5 |
Kohlík M. |
18103 |
NI-BVS |
Embedded Security |
2P+2C |
Z,ZK |
L |
2 |
5 |
Novotný M. |
18103 |
NI-BKO |
Error Control Codes |
2P+1C |
Z,ZK |
L |
2 |
5 |
Kubalík P., Pluháček A. |
18103 |
NI-GPU |
GPU Architectures and Programming |
2P+1C |
Z,ZK |
L |
2 |
5 |
Šimeček I. |
18104 |
NI-BML |
Bayesian Methods for Machine Learning |
2P+1C |
KZ |
L |
2 |
5 |
Dedecius K., Tichý O. |
18105 |
NI-ADM |
Data Mining Algorithms |
2P+1C |
Z,ZK |
L |
2 |
5 |
Da Silva Alves R., Kordík P., Vašata D. |
18105 |
NI-PON |
Selected Topics in Optimization and Numerical mathematics |
2P+1C |
Z,ZK |
L |
2 |
5 |
Klouda K., Starosta Š., Vašata D. |
18105 |
NI-HWB |
Hardware Security |
2P+2C |
Z,ZK |
L |
2 |
5 |
Buček J., Lórencz R. |
18106 |
NI-MKY |
Mathematics for Cryptology |
3P+1C |
Z,ZK |
L |
2 |
5 |
Jureček M. |
18106 |
NI-SIB |
Network Security |
2P+1C |
Z,ZK |
L |
2 |
5 |
Dostál J. |
18106 |
NI-DSS |
Decision Support Systems |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Buchtela D., Pavlíčková P., Pergl R. |
18102 |
NI-TSW |
Software Product Development |
1P+2C |
KZ |
Z |
3 |
4 |
Pavlíčková P. |
18102 |
NI-NUR |
User Interface Design |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Pavlíček J. |
18102 |
NI-TSP |
Testing and Reliability |
2P+2C |
Z,ZK |
Z |
3 |
5 |
Fišer P. |
18103 |
NI-DSV |
Distributed Systems and Computing |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Tvrdík P. |
18104 |
NI-MCC |
Multicore CPU Computing |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Šimeček I., Langr D. |
18104 |
NI-OSY |
Operating Systems and Systems Programming |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Zemánek P. |
18104 |
NI-MVI |
Computational Intelligence Methods |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Kordík P. |
18105 |
NI-SCR |
Statistical Analysis of Time Series |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Dedecius K. |
18105 |
NI-KRY |
Advanced Cryptology |
2P+2C |
Z,ZK |
Z |
3 |
5 |
Lórencz R. |
18106 |
NI-AIB |
Algorithms of Information Security |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Jureček M., Lórencz R. |
18106 |
|