Course |
Course title |
Extend of
teaching |
Comple-
tion |
Seme-
ster |
Recomm.
sem. |
Cre-
dits |
Instruc-
tor |
Cat. |
NIE-ADP |
Architecture and Design patterns |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Borský J. |
18102 |
NIE-AM1 |
Middleware Architectures 1 |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Dojčinovski M., Kuchař J., Vitvar T. |
18102 |
NIE-EHW |
Embedded Hardware |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Schmidt J. |
18103 |
NIE-ESW |
Embedded Software |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Kubátová H., Skrbek M. |
18103 |
NIE-TES |
Systems Theory |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Ratschan S. |
18103 |
NIE-EPC |
Effective C++ programming |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Langr D. |
18104 |
NIE-MTI |
Modern Internet Technologies |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Moucha A. |
18104 |
NIE-REV |
Reverse Engineering |
1P+2C |
Z,ZK |
Z |
1 |
5 |
Dostál J., Kokeš J. |
18106 |
NIE-SBF |
System Security and Forensics |
2P+1C |
Z,ZK |
Z |
1 |
5 |
Fornůsek S. |
18106 |
NI-NON |
Nonlinear Continuous Optimization and Numerical Methods |
2P+1C |
Z,ZK |
Z |
|
5 |
Kruis J. |
18101 |
NI-MVI |
Computational Intelligence Methods |
2P+1C |
Z,ZK |
Z |
|
5 |
Kordík P. |
18105 |
NI-ADM |
Data Mining Algorithms |
2P+1C |
Z,ZK |
L |
|
5 |
Da Silva Alves R., Kordík P., Vašata D. |
18105 |
NIE-PIS |
Advanced Information Systems |
2P+1C |
Z,ZK |
L |
2 |
5 |
Kroha P., Pavlíčková P. |
18102 |
NIE-FME |
Formal Methods and Specifications |
2P+1C |
Z,ZK |
L |
2 |
5 |
Ratschan S. |
18102 |
NIE-NSS |
Normalized Software Systems |
2P |
ZK |
L |
2 |
5 |
Pergl R., Suchánek M. |
18102 |
NIE-SIM |
Digital Circuit Simulation and Verification |
2P+1C |
Z,ZK |
L |
2 |
5 |
Kohlík M. |
18103 |
NIE-BVS |
Embedded Security |
2P+2C |
Z,ZK |
L |
2 |
5 |
Novotný M. |
18103 |
NIE-BKO |
Error Control Codes |
2P+1C |
Z,ZK |
L |
2 |
5 |
Kubalík P. |
18103 |
NIE-GPU |
GPU Architectures and Programming |
2P+1C |
Z,ZK |
L |
2 |
5 |
Šimeček I. |
18104 |
NIE-VCC |
Virtualization and Cloud Computing |
2P+1C |
Z,ZK |
L |
2 |
5 |
Fesl J., Vondra T. |
18104 |
NIE-HWB |
Hardware Security |
2P+2C |
Z,ZK |
L |
2 |
5 |
Buček J. |
18106 |
NIE-MKY |
Mathematics for Cryptology |
3P+1C |
Z,ZK |
L |
2 |
5 |
Jureček M., Lórencz R. |
18106 |
NIE-SIB |
Network Security |
2P+1C |
Z,ZK |
L |
2 |
5 |
Fornůsek S. |
18106 |
NIE-PDB |
Advanced Database Systems |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Svoboda M. |
18102 |
NIE-NUR |
User Interface Design |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Pavlíček J. |
18102 |
NIE-TSP |
Testing and Reliability |
2P+2C |
Z,ZK |
Z |
3 |
5 |
Fišer P. |
18103 |
NIE-DSV |
Distributed Systems and Computing |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Janeček J., Tvrdík P. |
18104 |
NIE-MCC |
Multicore CPU Computing |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Šimeček I., Langr D. |
18104 |
NIE-KRY |
Advanced Cryptology |
2P+2C |
Z,ZK |
Z |
3 |
5 |
Lórencz R. |
18106 |
NIE-AIB |
Algorithms of Information Security |
2P+1C |
Z,ZK |
Z |
3 |
5 |
Jureček M. |
18106 |
|