Professional Documents
Culture Documents
10.10.2014
Zeit
Raum
Grund
Montag
Stamm
Spezi/V
Grund
Drug Design
Hartmann
001
Dienstag
Stamm
Spezi/V
Grund
CompArch
Paul
Mittwoch
Stamm
Spezi/V
Grund
TCI 1
Herfet
Donnerstag
Stamm
Spezi/V
Grund
Spezi/V
Verification
Hermanns
CompGraph
Slusallek
002
AdvImAna
Weickert
Strafrecht I
Koriath
003
08-10
Freitag
Stamm
GnterHotz-HS
Pharm.Chemie
Ducho
PartDiffEqu
Apushkinskaya
TheoInf
Blser
MfI 3
Zhle
E2 5 HS I
BioINF
R001
SR
AlgoDat
Hoefer
001
002
003
10-12 GnterHotz-HS
EinfAlgZahl
Markwig
StaticProgAna
Hack
AutomPlanning
Hoffmann
HMI I
Schuster
AutomReas
Weidenbach
AdvTop InfRetr
Berberich R024
TheoDistrSys
Lenzen
CompAlg
Sagraloff
EinfAlgZahl
Markwig
StaticProgAna
Hack
Verification
Hermanns
DB
Dittrich
DiffEquIPCV
Weickert
Statik
Diebels
DiffEquIPCV
Weickert
Image Comp
Weickert
MfI 1
Hein
Prog1
Finkbeiner
MfI 1
Hein
E2 5 HS I
BioINF
R001
Perc in CG
Myszkowski019
SR
QuanModCheck
Krcal016
StatLearnII
Lengauer007
TCI 1
Herfet
001
CompLog II
Smolka
Tensorrechnung
Diebels
002
PartDiffEqu
Apushkinskaya
003
12-14
CompArch
Paul
ConvAna
Weickert
CompLog II
Smolka
Cybersicherheit
Backes
ModSim
Bortolussi
Medieninfo
Krger A.
Gr.AlgoDat
Seidel R.
GnterHotz-HS
MfI 3
Zhle
E2 5 HS I
BioInf3007
Helms 13-15h
BioINF
R001
SR
DistrSys
Druschel029
001
CompAlg
Sagraloff
DistrSys
Druschel029
ModSim
Bortolussi
FMI
Herfet 9.05
AlgoDat
Hoefer
ApplCryp
Kate
AutomReas
Weidenbach
002
Image Comp
Weickert
PdPsychDiag
Sparfeldt
003
14-16 GnterHotz-HS
E2 5 HS I
Prog1
Finkbeiner
BioInf 3 SR007
Helms
IT-Forensics
Sorge
SR
HMI I
Schuster
BioInf 1SR007
Keller
BioInf 1 SR007
Keller
FMI
Herfet 9.05
PattSpeech
KlakowSR1
ProbGraphMod
Schiele024
ConvAna
Weickert
Fachrichtung
Reindel
CompGraph
Slusallek
ML
Andres
EingSyst
Finkbeiner
003
GnterHotz-HS
Unix
Spurk
Medieninfo
Krger A.
TheoInf
Blser
Ideen d. Informatik
Mehlhorn
001
16-18
ModSim
Bortolussi
Perspektiven
Wolf
BioINF
R001
002
AutomPlanning
Hoffmann
ML
Andres
Lehrenu.Lernen 1
Stark
Security
Maffei
Security
Maffei
E2 5 HS I
BioINF
R001
Text to Speech
Mbius,C7 3, 1.12
SR
001
18-20
002
003
GnterHotz-HS
E2 5 HS I
BioINF
R001
BildGLG
Brnken
BrgVermRecht
Wrdinger
IntrodTLA+
Lu R024
Grundvorlesung:
Wolf: Perspektiven der Informatik
Finkbeiner: Programmierung 1
Krger: Grundlagen der Medieninformatik
Blser: Grundzge der Theoretische Informatik
Seidel R.:Grundzge von Algorithmen und Datenstrukturen
Hein: MfI 1
Zhle: MfI 3
Bioinformatik 1
Finkbeiner: Einfhrung in Eingebettete Systeme
Backes: Grundlagen der Cybersicherheit
Proseminar:
Weickert/Schmidt: Naturinspirierte Optimierungsmethoden
Maffei: Security and Privacy - A Beginners Guide
Sorge: Datenschutz in Technik und Recht
Garg: Logics in Security
Seminar:
Steiner: Voicebuilding for Text-to-speech Synthesis
Horacek: Diskursphnomene
Weickert/Schmidt: Surface Processing: Theory and Applications
Klakow: The Fillmor Files - Outstanding linguistic contributions by an OWL
Mehlhorn: Reading Group in Algorithms (A)
Lessel: Gamified Life: Integration of Gamification elements into everyday life
Slusallek: Tomography as an Inverse Rendering Problem
Hammer: Browser Security
Schulz: Probabilistic Methods for the Analysis of Next Generation Sequencing
Zeller/Bhme/Galeotti: Automated Debugging
Bulling/Sugano: Egocentric Computer Vision
Miettinen: Multi-View Data Mining
Dittrich: Database Systems 2
Sosnovsky: Computer-based educational technologies
Hoffmann: Heuristic Search for MDPs
Vreeken: Information Theory
Garg:
Freie Leistungspunkte:
Spurk: Unix-Kurs
Backes: Masterpraktikum Android Security Lab
Core lectures:
Druschel: Distributed Systems
Maffei: Security
Herfet: Telecommunications 1
Slusallek: Computer Graphics
Paul: Computer Architecture
Weidenbach: Automated Reasoning
Hermanns: Verification
Hoefer: Algorithms and Data Structures
Sagraloff: Computer Algebra
Dittrich: Database Systems
Andres/Fritz: Machine Learning
Advanced course:
Herfet: Future Media Internet
Klakow: Speech Technology - Pattern and Speech Recognition
Hoffmann: Automatic Planning
Bortolussi: Modelling and Simulation
Hammer/Hack/Reineke: Static Programm Analysis
Krcal: Quantitative Model Checking
Rossow: Software Reverse Engineering (block course
Schiele: Probabilistic Graphical Models and their Applications
Schrder: Public-Key Encryption
Weickert: Differential Equations in Image Processing and Computer Vision
Weickert/Peter: Image Compression
Weickert/Hoeltgen: Convex Analysis for Image Processing
Schulze-Pillot: Computational Number Theory
Sorge: IT-Forensics
Weickert/Hoffmann: Advanced Image Analysis
Mbius: Text to Speech Synthesis
Klakow: Relationsextraktion mit RapidMiner
Kate: Applied Cryptography
Berberich: Advanced Topics in Information Retrieval
Lenzen: Theory of Distributed Systems
Karrenbauer: Integer Programming
Myszkowski/Ritschel/Didyk: Perception in Computer Graphics
Smolka: Computational Logic II
Lu: An Introduction to TLA +
Lengauer: Statistical Learning II