Computational Geometry (View More...)
Voronoi Diagrams Nearest Neighbour Searching | lec16 | 38:36 to 47:02 | VIDEO | |
Triangulation of Arbitratry polygon | lec18 | 27:26 to 36:29 | VIDEO | |
Delaunay Triangulation | lec19 | 31:40 to 33:42 | VIDEO |
Cryptography and Network Security (View More...)
Secret Sharing Schemes | lec37 | 06:25 to 07:43 | VIDEO | |
Secret Sharing Schemes | lec37 | 07:43 to 09:02 | VIDEO | |
Secret Sharing Schemes | lec37 | 22:17 to 25:09 | VIDEO |
High Performance Computer Architecture (View More...)
Virtual Machines | lec31 | 24:14 to 29:10 | VIDEO | |
Virtual Machines | lec31 | 29:10 to 32:51 | VIDEO | |
Virtual Machines | lec31 | 32:51 to 37:53 | VIDEO |
High Performance Computing (View More...)
Module No. # 05 | lec21 | 19:51 to 25:12 | VIDEO | |
Module No. # 09 | lec38 | 17:00 to 24:15 | VIDEO | |
Module No. # 09 | lec38 | 27:07 to 27:07 | VIDEO |
Natural Language Processing (View More...)
Introduction | lec1 | 01:40 to 11:09 | VIDEO | |
Introduction | lec1 | 11:23 to 28:48 | VIDEO | |
Stages of NLP | lec2 | 10:54 to 18:04 | VIDEO |
No Records Found