Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
CRYPTOGRAPHY AND APPLICATIONS - MODULE 1 | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
INFORMATION SECURITY COMPLIANCE, CERTIFICATION AND DIGITAL FORENSICS | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
Group SCELTA AFFINI II ANNO CFU (University training credits) required: 6 |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
AFFECTIVE COMPUTING | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
APPROXIMATION ALGORITHMS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
ANALYSIS OF NUMERICAL METHODS | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
APPLIED IMAGE AND SIGNAL PROCESSING | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
COMPUTATIONAL INTELLIGENCE | 6 | II |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
MEDICAL IMAGING | 6 | I |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
HUMAN-COMPUTER INTERACTION | 6 | II |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
KNOWLEDGE REPRESENTATION AND AUTOMATED REASONING | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
NUMERICAL METHODS FOR INFORMATION TECHNOLOGIES | 6 | I |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |
STATISTICAL METHODS FOR DATA SCIENCE | 6 | II |