Computer Architecture (View More...)
Performance (contd..) | lec10 | 14:11 to 16:47 | VIDEO | |
Processor Design (Contd..) | lec18 | 39:45 to 44:13 | VIDEO | |
History of Computers | lec2 | 17:19 to 21:23 | VIDEO |
Computer Organization (View More...)
Segmentation | lec22 | 48:50 to upto | VIDEO | |
Address Translation and Protection | lec23 | 17:20 to 23:37 | VIDEO | |
Address Translation and Protection | lec23 | 23:37 to 30:17 | VIDEO |
Cryptography and Network Security (View More...)
Modes of Operation of Block Ciphers | lec18 | 29:48 to 35:03 | VIDEO | |
Pseudorandomness | lec22 | 37:24 to 38:13 | VIDEO | |
The Diffie-Hellman Problem and Security of ElGamal Systems | lec33 | 02:05 to 06:04 | VIDEO |
Database Design (View More...)
Constraints and Triggers | lec14 | 50:09 to 52:01 | VIDEO | |
Constraints and Triggers | lec14 | 53:42 to 54:16 | VIDEO | |
Constraints and Triggers | lec14 | 54:16 to 55:04 | VIDEO |
High Performance Computer Architecture (View More...)
In Quest of Higher ILP | lec11 | 06:57 to 11:16 | VIDEO | |
In Quest of Higher ILP | lec11 | 22:14 to 25:52 | VIDEO | |
In Quest of Higher ILP | lec11 | 27:03 to 29:37 | VIDEO |
High Performance Computing (View More...)
Module No. # 03 | lec12 | 01:32 to 04:07 | VIDEO | |
Module No. # 03 | lec12 | 05:10 to 11:47 | VIDEO | |
Module No. # 03 | lec12 | 11:47 to 16:40 | VIDEO |
Internet Technology (View More...)
HTML -Part II | lec15 | 03:43 to 07:27 | VIDEO | |
HTML -Part II | lec15 | 11:16 to 12:47 | VIDEO | |
HTML -Part II | lec15 | 15:00 to 16:44 | VIDEO |
Real Time Systems (View More...)
An Analysis of Priority Ceiling Protocol | lec15 | 04:33 to 05:27 | VIDEO | |
Review of Computer Networking | lec33 | 11:37 to 12:36 | VIDEO | |
Review of Computer Networking | lec33 | 13:48 to 14:00 | VIDEO |
Software Engineering (View More...)
Overview of Phases (Part 1) | lec3 | 02:02 to 03:53 | VIDEO | |
Overview of Phases (Part 1) | lec3 | 03:53 to 07:33 | VIDEO | |
Overview of Phases (Part 1) | lec3 | 24:49 to 26:22 | VIDEO |
No Records Found