This course is a continuation of high school calculus, but goes deeper into the theoretical foundations and develops the methods further in order to deal with more complicated cases. The course also ...
For many countries in Western Europe, World War II and Axis occupation marked the greatest crisis in twentieth century history. Taking the example of France, Norway, and Denmark, the course will show ...
The course introduces basic programming in the Python programming language. The programming themes are illustrated in a series of mathematical examples. The mathematical themes are synchronized with ...
The course provides a review of data structures such as stacks, trees, graphs, hash tables and priority queues, as well as algorithms for sorting, searching, insertion, and so on. Various ...
This course will run every fall starting from the fall of 2025. In 2025, the course will run both in the spring and fall. This course addresses emerging regulatory issues related to artificial ...
The course studies legal rules on data protection — i.e., a set of norms that specifically govern the processing of data relating to persons (personal data) in order to protect, at least partly, the ...
In this course there will be established project groups of 3-4 people that are to work together with a project over one whole semester. The topic for the project will be within renewable energy, ...
This course offers a broad introduction to information systems theories. In lectures and seminars these theories are used to discuss and analyse information systems practices in organizations, such as ...
The subject of structural geology will provide knowledge of structures that are formed as a result of deformation in rocks. The course provides a good understanding of structural geology and tectonics ...
This is an introductory course in English-language literature written by, about, or for gay men and lesbians in the twentieth century. We will study a variety of representations of homosexuality in a ...
Network and communications security is an important part of information security: a large portion of IT-related attacks are performed either using network connections or are directed at network ...
The course gives an introduction to the quantum mechanical basis for understanding the structure of materials. Emphasis is given to understanding the theory behind the density functional theory (DFT), ...