|
|
Séptimo Sem |
Octavo Sem |
. |
|
Unidades de Conocimiento |
CS231 |
CS251 |
CS261 |
CS341 |
CS391 |
CS401 |
FG350 |
CS281 |
CS2H1 |
CS342 |
CS3I1 |
CS3P1 |
CS402 |
FG205 |
Total |
 |
GV Conceptos Fundamentales (2 horas Core-Tier1, 1 horas Core-Tier2) |
|
6 |
|
|
|
|
|
|
|
|
|
|
|
|
6 |
 |
GV Rendering Básico |
|
12 |
|
|
|
|
|
|
|
|
|
|
|
|
12 |
 |
GV Modelado Geométrico |
|
15 |
|
|
|
|
|
|
|
|
|
|
|
|
15 |
 |
GV Renderizado Avanzado |
|
6 |
|
|
|
|
|
|
|
|
|
|
|
|
6 |
 |
GV Animación por computadora |
|
4 |
|
|
|
|
|
|
|
|
|
|
|
|
4 |
 |
HCI Fundamentos (4 horas Core-Tier1) |
|
|
|
|
|
|
|
|
8 |
|
|
|
|
|
8 |
 |
HCI Diseño de Interacción (4 horas Core-Tier2) |
|
|
|
|
|
|
|
|
8 |
|
|
|
|
|
8 |
 |
HCI Programación de Sistemas Interactivos |
|
2 |
|
|
|
|
|
|
|
|
|
|
|
|
2 |
 |
HCI Diseño y Testing centrados en el usuario |
|
|
|
|
|
|
|
|
16 |
|
|
|
|
|
16 |
 |
HCI Nuevas Tecnologías Interactivas |
|
|
|
|
|
|
|
|
8 |
|
|
|
|
|
8 |
 |
HCI Colaboración y Comunicación |
|
|
|
|
|
|
|
|
8 |
|
|
|
|
|
8 |
 |
IAS Fundamentos y Conceptos en Seguridad (1 horas Core-Tier1, 2 horas Core-Tier2) |
|
|
|
|
|
|
|
|
|
|
25 |
|
|
|
25 |
 |
IAS Principios de Diseño Seguro (1 horas Core-Tier1, 2 horas Core-Tier2) |
|
|
|
|
|
|
|
|
|
|
25 |
|
|
|
25 |
 |
IAS Programación Defensiva (1 horas Core-Tier1, 2 horas Core-Tier2) |
|
|
|
|
|
|
|
|
|
|
25 |
|
|
|
25 |
 |
IAS Ataques y Amenazas (1 horas Core-Tier2) |
|
|
|
|
|
|
|
|
|
|
25 |
|
|
|
25 |
 |
IAS Seguridad de Red (2 horas Core-Tier2) |
|
|
|
|
|
|
|
|
|
|
25 |
|
|
|
25 |
 |
IAS Criptografía (1 horas Core-Tier2) |
|
|
|
|
|
|
|
|
|
|
25 |
|
|
|
25 |
 |
IAS Seguridad en la Web |
|
|
|
|
|
|
|
|
|
|
25 |
|
|
|
25 |
 |
IAS Seguridad de plataformas |
|
|
|
|
|
|
|
|
|
|
25 |
|
|
|
25 |
 |
IAS Investigación digital (Digital Forensics) |
|
|
|
|
|
|
|
|
|
|
25 |
|
|
|
25 |
 |
IAS Seguridad en Ingeniería de Software |
|
|
|
|
|
|
|
|
|
|
25 |
|
|
|
25 |
 |
IS Cuestiones fundamentales (1 horas Core-Tier2) |
|
|
2 |
|
|
|
|
|
|
|
|
|
|
|
2 |
 |
IS Estrategias de búsquedas básicas (4 horas Core-Tier2) |
|
|
2 |
|
|
|
|
|
|
|
|
|
|
|
2 |
 |
IS Aprendizaje Automático Básico (2 horas Core-Tier2) |
|
|
4 |
|
|
|
|
|
|
|
|
|
|
|
4 |
 |
IS Búsqueda Avanzada |
|
|
18 |
|
|
|
|
|
|
|
|
|
|
|
18 |
 |
IS Razonamiento Bajo Incertidumbre |
|
|
18 |
|
|
|
|
|
|
|
|
|
|
|
18 |
 |
IS Agentes |
|
|
2 |
|
|
|
|
|
|
|
|
|
|
|
2 |
 |
IS Procesamiento del Lenguaje Natural |
|
|
12 |
|
|
|
|
|
|
|
|
|
|
|
12 |
 |
IS Aprendizaje de máquina avanzado |
|
|
20 |
|
|
|
|
|
|
|
|
|
|
|
20 |
 |
IS Visión y percepción por computador |
|
|
12 |
|
|
|
|
|
|
|
|
|
|
|
12 |
 |
NC Introducción (1.5 horas Core-Tier1) |
5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
5 |
 |
NC Aplicaciones en red (1.5 horas Core-Tier1) |
5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
5 |
 |
NC Entrega confiable de datos (2 horas Core-Tier2) |
10 |
|
|
|
|
|
|
|
|
|
|
|
|
|
10 |
 |
NC Ruteo y reenvío (1.5 horas Core-Tier2) |
12 |
|
|
|
|
|
|
|
|
|
|
|
|
|
12 |
 |
NC Redes de área local (1.5 horas Core-Tier2) |
10 |
|
|
|
|
|
|
|
|
|
|
|
|
|
10 |
 |
NC Asignación de recursos (1 horas Core-Tier2) |
12 |
|
|
|
|
|
|
|
|
|
|
|
|
|
12 |
 |
NC Celulares (1 horas Core-Tier2) |
5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
5 |
 |
NC Redes sociales |
5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
5 |
 |
PD Fundamentos de paralelismo (2 horas Core-Tier1) |
|
|
|
|
|
|
|
|
|
|
|
18 |
|
|
18 |
 |
PD Descomposición en paralelo (1 horas Core-Tier1, 2 horas Core-Tier2) |
|
|
|
|
|
|
|
|
|
|
|
18 |
|
|
18 |
 |
PD Comunicación y coordinación (1 horas Core-Tier1, 3 horas Core-Tier2) |
|
|
|
|
|
|
|
|
|
|
|
18 |
|
|
18 |
 |
PD Análisis y programación de algoritmos paralelos (3 horas Core-Tier2) |
|
|
|
|
|
|
|
|
|
|
|
18 |
|
|
18 |
 |
PD Arquitecturas paralelas (1 horas Core-Tier1, 2 horas Core-Tier2) |
|
|
|
|
|
|
|
|
|
|
|
12 |
|
|
12 |
 |
PD Desempeño en paralelo |
|
|
|
|
|
|
|
|
|
|
|
18 |
|
|
18 |
 |
PL Programación orientada a objetos (4 horas Core-Tier1, 6 horas Core-Tier2) |
|
|
|
12 |
|
|
|
|
|
|
|
|
|
|
12 |
 |
PL Programación funcional (3 horas Core-Tier1, 4 horas Core-Tier2) |
|
|
|
18 |
|
|
|
|
|
|
|
|
|
|
18 |
 |
PL Programación reactiva y dirigida por eventos (2 horas Core-Tier2) |
|
|
|
12 |
|
|
|
|
|
|
|
|
|
|
12 |
 |
PL Representación de programas (1 horas Core-Tier2) |
|
|
|
|
|
|
|
|
|
5 |
|
|
|
|
5 |
 |
PL Traducción y ejecución de lenguajes (3 horas Core-Tier2) |
|
|
|
|
|
|
|
|
|
10 |
|
|
|
|
10 |
 |
PL Análisis de sintaxis |
|
|
|
|
|
|
|
|
|
10 |
|
|
|
|
10 |
 |
PL Análisis semántico de compiladores |
|
|
|
|
|
|
|
|
|
15 |
|
|
|
|
15 |
 |
PL Generación de código |
|
|
|
|
|
|
|
|
|
20 |
|
|
|
|
20 |
 |
PL Sistemas de tipos |
|
|
|
18 |
|
|
|
|
|
|
|
|
|
|
18 |
 |
PL Pragmática de lenguajes |
|
|
|
12 |
|
|
|
|
|
|
|
|
|
|
12 |
 |
PL Programación lógica |
|
|
|
12 |
|
|
|
|
|
|
|
|
|
|
12 |
 |
SE Procesos de Software (2 horas Core-Tier1, 1 horas Core-Tier2) |
|
|
|
|
12 |
|
|
|
|
|
|
|
|
|
12 |
 |
SE Gestión de Proyectos de Software (2 horas Core-Tier2) |
|
|
|
|
18 |
|
|
|
|
|
|
|
|
|
18 |
 |
SE Evolución de Software (2 horas Core-Tier2) |
|
|
|
|
12 |
|
|
|
|
|
|
|
|
|
12 |
 |
SP Contexto Social (1 horas Core-Tier1, 2 horas Core-Tier2) |
|
|
|
|
|
|
|
4 |
|
|
|
|
|
|
4 |
 |
SP Herramientas de Análisis (2 horas Core-Tier1) |
|
|
|
|
|
|
|
2 |
|
|
|
|
|
|
2 |
 |
SP Ética Profesional (2 horas Core-Tier1, 2 horas Core-Tier2) |
|
|
|
|
|
|
|
4 |
|
|
|
|
|
|
4 |
 |
SP Propiedad Intelectual (2 horas Core-Tier1) |
|
|
|
|
|
|
|
4 |
|
|
|
|
|
|
4 |
 |
SP Privacidad y Libertades Civiles (2 horas Core-Tier1) |
|
|
|
|
|
|
|
4 |
|
|
|
|
|
|
4 |
 |
SP Historia |
|
|
|
|
|
|
|
2 |
|
|
|
|
|
|
2 |
 |
SP Economía de la Computación |
|
|
|
|
|
|
|
2 |
|
|
|
|
|
|
2 |
 |
SP Políticas de seguridad, Leyes y crímenes computacionales |
|
|
|
|
|
|
|
2 |
|
|
|
|
|
|
2 |
|
Total |
64 |
45 |
90 |
84 |
42 |
0 |
0 |
24 |
48 |
60 |
250 |
102 |
0 |
0 |
|