Skip navigation
Skip to navigation
Skip to the bottom
Simulate organization breadcrumb open
Simulate organization breadcrumb close
Friedrich-Alexander-Universität
Hardware/Software Co-Design
FAU
To the central FAU website
Friedrich-Alexander-Universität
Technische Fakultät
Department Elektrotechnik-Elektronik-Informationstechnik
Please enter the search term for searching into the documents of this website:
Suche öffnen
English
Deutsch
Department Informatik
UnivIS
Lageplan
Friedrich-Alexander-Universität
Technische Fakultät
Department Elektrotechnik-Elektronik-Informationstechnik
Friedrich-Alexander-Universität
Hardware/Software Co-Design
Navigation
Navigation close
Chair
News
Staff
Jobs
Contact
Portal Chair
Research
Groups
Projects
Publications
Industrial partners
Portal Research
Teaching
Theses
Teaching events
Study program
General stuff
Study Abroad
Portal Teaching
Home
Teaching
Teaching events
Lectures
Lectures
In page navigation:
Teaching
Theses
Teaching events
Lectures
Approximate Computing
Approximationsalgorithmen
Berechenbarkeit und Formale Sprachen
Cyber-Physical Systems
Effiziente kombinatorische Algorithmen
Eingebettete Systeme
Ereignisgesteuerte Systeme
Grundlagen der Technischen Informatik - Sommersemester
Grundlagen der Technischen Informatik - Wintersemester
Hardware-Software-Co-Design
Komplexitätstheorie
Parallele Systeme
Randomisierte Algorithmen
Reconfigurable Computing
Security in Embedded Hardware
Swarm Intelligence
Theory of Communication in Parallel Systems
Lab excercises
Seminars
Study program
General stuff
Study Abroad
Lectures
Lectures in the winter semester 2024/2025
Berechenbarkeit und Formale Sprachen
Cyber-Physical Systems
Effiziente kombinatorische Algorithmen
Grundlagen der Technischen Informatik
Eingebettete Systeme
Ereignisgesteuerte Systeme
Reconfigurable Computing
Lectures in the summer semester 2025
Approximationsalgorithmen
Approximate Computing
Cyber-Physical Systems
Grundlagen der Technischen Informatik
Hardware-Software-Co-Design
Komplexitätstheorie
Parallele Systeme
Randomisierte Algorithmen
Security in Embedded Hardware