Suchergebnis: Lehrveranstaltungen im Frühjahrssemester 2019
Informatik Master | |||||||||||||||
Vertiefungsfächer | |||||||||||||||
Vertiefung General Studies | |||||||||||||||
Kernfächer der Vertiefung General Studies | |||||||||||||||
Nummer | Titel | Typ | ECTS | Umfang | Dozierende | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
252-0407-00L | Cryptography Foundations Takes place the last time in this form. | W | 7 KP | 3V + 2U + 1A | |||||||||||
252-0407-00 V | Cryptography Foundations | 3 Std. |
| U. Maurer | |||||||||||
252-0407-00 U | Cryptography Foundations | 2 Std. |
| U. Maurer | |||||||||||
252-0407-00 A | Cryptography Foundations Project Work, no fixed presence required. | 1 Std. | U. Maurer | ||||||||||||
252-0538-00L | Shape Modeling and Geometry Processing | W | 5 KP | 2V + 1U + 1A | |||||||||||
252-0538-00 V | Shape Modeling and Geometry Processing | 2 Std. |
| O. Sorkine Hornung | |||||||||||
252-0538-00 U | Shape Modeling and Geometry Processing | 1 Std. |
| O. Sorkine Hornung | |||||||||||
252-0538-00 A | Shape Modeling and Geometry Processing | 1 Std. | O. Sorkine Hornung | ||||||||||||
261-5110-00L | Optimization for Data Science | W | 8 KP | 3V + 2U + 2A | |||||||||||
261-5110-00 V | Optimization for Data Science | 3 Std. |
| B. Gärtner, D. Steurer | |||||||||||
261-5110-00 U | Optimization for Data Science | 2 Std. |
| B. Gärtner, D. Steurer | |||||||||||
261-5110-00 A | Optimization for Data Science | 2 Std. | B. Gärtner, D. Steurer | ||||||||||||
263-2300-00L | How To Write Fast Numerical Code Number of participants limited to 84. Prerequisite: Master student, solid C programming skills. Takes place the last time in this form. | W | 6 KP | 3V + 2U | |||||||||||
263-2300-00 V | How To Write Fast Numerical Code | 3 Std. |
| M. Püschel | |||||||||||
263-2300-00 U | How To Write Fast Numerical Code | 2 Std. |
| M. Püschel | |||||||||||
263-2925-00L | Program Analysis for System Security and Reliability | W | 5 KP | 2V + 1U + 1A | |||||||||||
263-2925-00 V | Program Analysis for System Security and Reliability | 2 Std. |
| M. Vechev | |||||||||||
263-2925-00 U | Program Analysis for System Security and Reliability | 1 Std. |
| M. Vechev | |||||||||||
263-2925-00 A | Program Analysis for System Security and Reliability | 1 Std. | M. Vechev | ||||||||||||
263-3800-00L | Advanced Operating Systems | W | 6 KP | 2V + 2U + 1A | |||||||||||
263-3800-00 V | Advanced Operating Systems | 2 Std. |
| T. Roscoe | |||||||||||
263-3800-00 U | Advanced Operating Systems | 2 Std. |
| T. Roscoe | |||||||||||
263-3800-00 A | Advanced Operating Systems Project Work, no fixed presence required. | 1 Std. | T. Roscoe | ||||||||||||
227-0558-00L | Principles of Distributed Computing | W | 6 KP | 2V + 2U + 1A | |||||||||||
227-0558-00 V | Principles of Distributed Computing | 2 Std. |
| R. Wattenhofer, M. Ghaffari | |||||||||||
227-0558-00 U | Principles of Distributed Computing In Gruppen | 2 Std. |
| R. Wattenhofer, M. Ghaffari | |||||||||||
227-0558-00 A | Principles of Distributed Computing No presence required. Creative task outside the regular weekly exercises. | 1 Std. | R. Wattenhofer, M. Ghaffari |
- Seite 1 von 1