Cryptography and Network Security (View More...)
Symmetric Key Ciphers | lec10 | 42:33 to 45:09 | VIDEO | |
Symmetric Key Ciphers | lec10 | 46:07 to 47:12 | VIDEO | |
Symmetric Key Ciphers | lec10 | 47:12 to 49:48 | VIDEO |
Logic for CS (View More...)
The Completeness Theorem | lec10 | 28:25 to 33:39 | VIDEO | |
The Semantics of Predicate Logic | lec18 | 30:33 to 37:58 | VIDEO | |
The Semantics of Predicate Logic | lec18 | 40:37 to 43:55 | VIDEO |
Natural Language Processing (View More...)
AI and Probability; HMM | lec16 | 32:37 to 41:13 | VIDEO | |
AI and Probability; HMM | lec16 | 42:22 to 45:32 | VIDEO | |
HMM | lec17 | 32:08 to 33:36 | VIDEO |
Principles of Programming Languages (View More...)
Lecture Title: Structured Data | lec21 | 04:43 to 8:10 | VIDEO | |
Lecture Title: Structured Data | lec21 | 21:34 to 25:44 | VIDEO | |
Lecture Title: Structured Data | lec21 | 36:00 to 42:35 | VIDEO |
Probability and Statistics (View More...)
Testing of Hypothesis-I | lec33 | 25:49 to 30:49 | VIDEO | |
Testing of Hypothesis-I | lec33 | 39:05 to 43:22 | VIDEO | |
Testing of Hypothesis-I | lec33 | 43:22 to 49:29 | VIDEO |
Software Engineering (View More...)
Overview of Phases (Part 1) | lec3 | 18:09 to 21:04 | VIDEO | |
Project Scope Management | lec30 | 42:43 to 01:07 | VIDEO | |
Quality Management System - I | lec35 | 11:10 to 14:54 | VIDEO |
No Records Found