Artificial Intelligence IIT Kgp (View More...)
First Order Logic | lec13 | 49:18 to 54:01 | VIDEO | |
Reasoning using First -Order Logic | lec14 | 28:02 to 30:20 | VIDEO | |
Reasoning using First -Order Logic | lec14 | 30:20 to 34:30 | VIDEO |
Biometrics (View More...)
lec1 | lec1 | 22:53 to 45:23 | VIDEO | |
lec12 | lec12 | 03:14 to 15:13 | VIDEO | |
lec18 | lec18 | 41:21 to 44:42 | VIDEO |
Computer Networks (View More...)
Stop and Wait Protocol | lec17 | 46:36 to 47:28 | VIDEO | |
ATM Signaling, Routing and LAN Emulation | lec25 | 38:07 to 38:40 | VIDEO | |
IP Version 4 | lec28 | 56:48 to upto | VIDEO |
Cryptography and Network Security (View More...)
Symmetric Key Ciphers | lec10 | 47:12 to 49:48 | VIDEO | |
Block Cipher Standards (DES) | lec11 | 06:08 to 09:52 | VIDEO | |
Block Cipher Standards (DES) | lec11 | 19:57 to 22:05 | VIDEO |
Database Design (View More...)
Constraints and Triggers | lec14 | 37:20 to 39:11 | VIDEO | |
Constraints and Triggers | lec14 | 39:11 to 40:50 | VIDEO | |
Constraints and Triggers | lec14 | 40:50 to 44:08 | VIDEO |
Internet Technology (View More...)
Review of Network Technologies | lec2 | 20:27 to 22:21 | VIDEO | |
Streaming Multimedia Applications | lec37 | 03:06 to 05:40 | VIDEO | |
Streaming Multimedia Applications | lec37 | 05:40 to 08:03 | VIDEO |
Real Time Systems (View More...)
Real Time Communications | lec31 | 48:03 to 49:10 | VIDEO | |
Real-Time Communication in a LAN | lec34 | 03:53 to 06:58 | VIDEO | |
Performance of Two Real-Time Communication Protocols | lec36 | 10:08 to 12:42 | VIDEO |
System Analysis and Design (View More...)
lec11 | lec11 | 06:06 to 35:36 | VIDEO | |
lec27 | lec27 | 26:57 to 29:40 | VIDEO | |
lec28 | lec28 | 31:54 to 44:33 | VIDEO |
Theory of Automata, Formal Languages and Computation (View More...)
Problems and Solutions | lec25 | 19:08 to 19:20 | VIDEO | |
Problems and Solutions | lec25 | 19:20 to 19:46 | VIDEO | |
Problems and Solutions | lec25 | 19:46 to 20:02 | VIDEO |
No Records Found