CAS in Informatik |
Fokusfächer und Wahlfächer |
Nummer | Titel | Typ | ECTS | Umfang | Dozierende |
---|
252-0237-00L | Concepts of Object-Oriented Programming | W | 6 KP | 3V + 2U | P. Müller |
252-0286-00L | System Construction | W | 4 KP | 2V + 1U | F. Friedrich Wicker |
252-0293-00L | Wireless and Mobile Computing for Entertainment Applications | W | 4 KP | 2V + 1U | S. Mangold |
252-0341-01L | Information Retrieval | W | 4 KP | 2V + 1U | T. Hofmann |
252-0373-00L | Mobile and Personal Information Systems | W | 4 KP | 2V + 1U | M. Norrie |
252-0417-00L | Randomized Algorithms and Probabilistic Methods | W | 7 KP | 3V + 2U + 1A | A. Steger,
E. Welzl |
252-0437-00L | Verteilte Algorithmen | W | 4 KP | 3V | F. Mattern |
252-0463-00L | Security Engineering | W | 5 KP | 2V + 2U | D. Basin |
252-0535-00L | Machine Learning | W | 8 KP | 3V + 2U + 2A | J. M. Buhmann |
252-0543-01L | Computer Graphics | W | 6 KP | 3V + 2U | M. Gross,
J. Novak |
252-0546-00L | Physically-Based Simulation in Computer Graphics | W | 4 KP | 2V + 1U | B. Solenthaler,
B. Thomaszewski |
252-1407-00L | Algorithmic Game Theory | W | 7 KP | 3V + 2U + 1A | P. Widmayer,
P. Penna |
252-1411-00L | Security of Wireless Networks | W | 5 KP | 2V + 1U + 1A | S. Capkun |
252-1414-00L | System Security | W | 5 KP | 2V + 2U | S. Capkun,
A. Perrig |
252-1425-00L | Geometry: Combinatorics and Algorithms | W | 6 KP | 2V + 2U + 1A | B. Gärtner,
E. Welzl,
M. Hoffmann,
A. Pilz |
263-2800-00L | Design of Parallel and High-Performance Computing | W | 7 KP | 3V + 2U + 1A | T. Hoefler,
M. Püschel |
263-3010-00L | Big Data | W | 6 KP | 2V + 2U + 1A | G. Fourny |
263-3210-00L | Deep Learning Maximale Teilnehmerzahl: 120 | W | 4 KP | 2V + 1U | T. Hofmann |
252-3610-00L | Smart Energy | W | 3 KP | 2G | F. Mattern,
V. Tiefenbeck |
263-3800-00L | Advanced Operating Systems | W | 6 KP | 2V + 2U + 1A | T. Roscoe |
263-4640-00L | Network Security | W | 6 KP | 2V + 1U + 2A | A. Perrig,
T. P. Dübendorfer,
S. Frei |
263-4650-00L | Specification and Proof of Probabilistic Programs with Applications to Security | W | 4 KP | 2V + 1U | A. McIver,
C. C. Morgan |
263-4655-00L | Lattice Cryptography | W | 4 KP | 2V + 1U | V. Lyubashevsky |
263-5001-00L | Introduction to Finite Elements and Sparse Linear System Solving | W | 4 KP | 2V + 1U | P. Arbenz |
263-5200-00L | Data Mining: Learning from Large Data Sets | W | 4 KP | 2V + 1U | A. Krause |
263-5210-00L | Probabilistic Artificial Intelligence | W | 4 KP | 2V + 1U | S. Tschiatschek |
263-5902-00L | Computer Vision | W | 6 KP | 3V + 1U + 1A | L. Van Gool,
V. Ferrari,
A. Geiger |
263-5903-00L | Computational Regularity | W | 4 KP | 2V + 1U | Y. Liu,
M. R. Oswald |
227-0778-00L | Hardware/Software Codesign | W | 6 KP | 2V + 2U | L. Thiele |
401-0647-00L | Introduction to Mathematical Optimization | W | 5 KP | 2V + 1U | D. Adjiashvili |
636-0007-00L | Computational Systems Biology | W | 6 KP | 3V + 2U | J. Stelling |
636-0017-00L | Computational Biology | W | 4 KP | 3G | T. Stadler,
C. Magnus |