Computer Organization (View More...)
Typical Micro Instructions | lec11 | 00:18 to 00:25 | VIDEO | |
Problem Exercise | lec13 | 12:50 to 18:22 | VIDEO | |
Problem Exercise | lec13 | 18:22 to 29:32 | VIDEO |
Cryptography and Network Security (View More...)
Modes of Operation of Block Ciphers | lec18 | 29:48 to 35:03 | VIDEO | |
Stream Ciphers | lec19 | 14:43 to 17:03 | VIDEO | |
Stream Ciphers | lec19 | 20:30 to 24:10 | VIDEO |
Data Communication (View More...)
Introduction and Course Outline | lec1 | 11:43 to 12:28 | VIDEO | |
Multiplexing | lec11 | 23:59 to 26:31 | VIDEO | |
Multiplexer Applications-1 | lec13 | 5:13 to 8:58 | VIDEO |
High Performance Computer Architecture (View More...)
In Quest of Higher ILP | lec11 | 22:14 to 25:52 | VIDEO | |
Virtual Machines | lec31 | 24:14 to 29:10 | VIDEO | |
Virtual Machines | lec31 | 29:10 to 32:51 | VIDEO |
High Performance Computing (View More...)
Module No. # 03 | lec11 | 10:06 to 14:18 | VIDEO | |
Module No. # 03 | lec11 | 14:18 to 17:10 | VIDEO | |
Module No. # 03 | lec11 | 17:10 to 19:28 | VIDEO |
Principles of Programming Languages (View More...)
Typed Lambda Calculus | lec31 | 31:08 to 34:48 | VIDEO | |
Typed Lambda Calculus | lec31 | 34:48 to 37:58 | VIDEO | |
Typed Lambda Calculus | lec31 | 37:58 to 43:34 | VIDEO |
No Records Found