Sie sind auf Seite 1von 2

Kollisionstabelle WS 2014

10.10.2014
Zeit

Raum
Grund

Montag
Stamm

Spezi/V

Grund

Drug Design
Hartmann

001

Dienstag
Stamm

Spezi/V

Grund

CompArch
Paul

Mittwoch
Stamm

Spezi/V

Grund

TCI 1
Herfet

Donnerstag
Stamm
Spezi/V

Grund

Spezi/V

Verification
Hermanns
CompGraph
Slusallek

002
AdvImAna
Weickert
Strafrecht I
Koriath

003
08-10

Freitag
Stamm

GnterHotz-HS

Pharm.Chemie
Ducho

PartDiffEqu
Apushkinskaya
TheoInf
Blser

MfI 3
Zhle

E2 5 HS I
BioINF
R001
SR
AlgoDat
Hoefer

001
002
003
10-12 GnterHotz-HS

EinfAlgZahl
Markwig
StaticProgAna
Hack
AutomPlanning
Hoffmann
HMI I
Schuster

AutomReas
Weidenbach

AdvTop InfRetr
Berberich R024

TheoDistrSys
Lenzen

CompAlg
Sagraloff

EinfAlgZahl
Markwig
StaticProgAna
Hack

Verification
Hermanns

DB
Dittrich

DiffEquIPCV
Weickert

Statik
Diebels
DiffEquIPCV
Weickert

Image Comp
Weickert
MfI 1
Hein

Prog1
Finkbeiner

MfI 1
Hein

E2 5 HS I
BioINF
R001
Perc in CG
Myszkowski019

SR

QuanModCheck
Krcal016

StatLearnII
Lengauer007

TCI 1
Herfet

001

CompLog II
Smolka
Tensorrechnung
Diebels

002
PartDiffEqu
Apushkinskaya

003
12-14

Static Prog Ana

CompArch
Paul

ConvAna
Weickert
CompLog II
Smolka

Cybersicherheit
Backes
ModSim
Bortolussi

Medieninfo
Krger A.
Gr.AlgoDat
Seidel R.

GnterHotz-HS

MfI 3
Zhle

E2 5 HS I

BioInf3007
Helms 13-15h

BioINF
R001
SR

DistrSys
Druschel029

001

CompAlg
Sagraloff

DistrSys
Druschel029
ModSim
Bortolussi

FMI
Herfet 9.05

AlgoDat
Hoefer

ApplCryp
Kate
AutomReas
Weidenbach

002
Image Comp
Weickert
PdPsychDiag
Sparfeldt

003
14-16 GnterHotz-HS
E2 5 HS I

Prog1
Finkbeiner

BioInf 3 SR007
Helms
IT-Forensics
Sorge

SR

HMI I
Schuster

BioInf 1SR007
Keller

BioInf 1 SR007
Keller
FMI
Herfet 9.05

PattSpeech
KlakowSR1

ProbGraphMod
Schiele024

ConvAna
Weickert

Fachrichtung
Reindel
CompGraph
Slusallek

ML
Andres
EingSyst
Finkbeiner

003
GnterHotz-HS

Unix
Spurk

Medieninfo
Krger A.

TheoInf
Blser

Ideen d. Informatik
Mehlhorn

001

16-18

ModSim
Bortolussi

Perspektiven
Wolf

BioINF
R001

002

AutomPlanning
Hoffmann

ML
Andres

Lehrenu.Lernen 1
Stark

Security
Maffei

Security
Maffei

E2 5 HS I
BioINF
R001
Text to Speech
Mbius,C7 3, 1.12

SR
001
18-20

002
003
GnterHotz-HS
E2 5 HS I
BioINF
R001

BildGLG
Brnken

BrgVermRecht
Wrdinger

IntrodTLA+
Lu R024

Grundvorlesung:
Wolf: Perspektiven der Informatik
Finkbeiner: Programmierung 1
Krger: Grundlagen der Medieninformatik
Blser: Grundzge der Theoretische Informatik
Seidel R.:Grundzge von Algorithmen und Datenstrukturen
Hein: MfI 1
Zhle: MfI 3
Bioinformatik 1
Finkbeiner: Einfhrung in Eingebettete Systeme
Backes: Grundlagen der Cybersicherheit
Proseminar:
Weickert/Schmidt: Naturinspirierte Optimierungsmethoden
Maffei: Security and Privacy - A Beginners Guide
Sorge: Datenschutz in Technik und Recht
Garg: Logics in Security

Seminar:
Steiner: Voicebuilding for Text-to-speech Synthesis
Horacek: Diskursphnomene
Weickert/Schmidt: Surface Processing: Theory and Applications
Klakow: The Fillmor Files - Outstanding linguistic contributions by an OWL
Mehlhorn: Reading Group in Algorithms (A)
Lessel: Gamified Life: Integration of Gamification elements into everyday life
Slusallek: Tomography as an Inverse Rendering Problem
Hammer: Browser Security
Schulz: Probabilistic Methods for the Analysis of Next Generation Sequencing
Zeller/Bhme/Galeotti: Automated Debugging
Bulling/Sugano: Egocentric Computer Vision
Miettinen: Multi-View Data Mining
Dittrich: Database Systems 2
Sosnovsky: Computer-based educational technologies
Hoffmann: Heuristic Search for MDPs
Vreeken: Information Theory
Garg:

Freie Leistungspunkte:
Spurk: Unix-Kurs
Backes: Masterpraktikum Android Security Lab

Core lectures:
Druschel: Distributed Systems
Maffei: Security
Herfet: Telecommunications 1
Slusallek: Computer Graphics
Paul: Computer Architecture
Weidenbach: Automated Reasoning
Hermanns: Verification
Hoefer: Algorithms and Data Structures
Sagraloff: Computer Algebra
Dittrich: Database Systems
Andres/Fritz: Machine Learning

Advanced course:
Herfet: Future Media Internet
Klakow: Speech Technology - Pattern and Speech Recognition
Hoffmann: Automatic Planning
Bortolussi: Modelling and Simulation
Hammer/Hack/Reineke: Static Programm Analysis
Krcal: Quantitative Model Checking
Rossow: Software Reverse Engineering (block course
Schiele: Probabilistic Graphical Models and their Applications
Schrder: Public-Key Encryption
Weickert: Differential Equations in Image Processing and Computer Vision
Weickert/Peter: Image Compression
Weickert/Hoeltgen: Convex Analysis for Image Processing
Schulze-Pillot: Computational Number Theory
Sorge: IT-Forensics
Weickert/Hoffmann: Advanced Image Analysis
Mbius: Text to Speech Synthesis
Klakow: Relationsextraktion mit RapidMiner
Kate: Applied Cryptography
Berberich: Advanced Topics in Information Retrieval
Lenzen: Theory of Distributed Systems
Karrenbauer: Integer Programming
Myszkowski/Ritschel/Didyk: Perception in Computer Graphics
Smolka: Computational Logic II
Lu: An Introduction to TLA +
Lengauer: Statistical Learning II

Das könnte Ihnen auch gefallen