Computational Geometry (View More...)
Voronoi Diagrams Nearest Neighbour Searching | lec16 | 34:01 to 38:36 | VIDEO | |
Triangulation of Arbitratry polygon | lec18 | 27:26 to 36:29 | VIDEO | |
Delaunay Triangulation | lec19 | 19:51 to 21:51 | VIDEO |
Cryptography and Network Security (View More...)
Secret Sharing Schemes | lec37 | 06:25 to 07:43 | VIDEO | |
Secret Sharing Schemes | lec37 | 07:43 to 09:02 | VIDEO | |
Secret Sharing Schemes | lec37 | 26:35 to 29:57 | VIDEO |
Data Communication (View More...)
Multiplexing | lec11 | 5:06 to 7:17 | VIDEO | |
Multiplexing (Contdâ¦.) | lec12 | 21:36 to 24:34 | VIDEO | |
Multiplexing (Contdâ¦.) | lec12 | 3:10 to 6:14 | VIDEO |
Design Verification and Test of Digital VLSI Circuits (View More...)
Introduction to Model Checking | lec19 | 02:56 to 05:03 | VIDEO | |
Introduction to Model Checking | lec19 | 05:03 to 07:15 | VIDEO | |
Introduction to Model Checking | lec19 | 07:15 to 10:41 | VIDEO |
High Performance Computing (View More...)
Module No. # 09 | lec38 | 17:00 to 24:15 | VIDEO | |
Module No. # 09 | lec38 | 25:03 to 25:33 | VIDEO | |
Module No. # 09 | lec38 | 27:07 to 27:07 | VIDEO |
Real Time Systems (View More...)
Resource Sharing among Real-Time Tasks | lec13 | 01:01 to 01:42 | VIDEO | |
Resource Sharing among Real-Time Tasks | lec13 | 01:42 to 02:45 | VIDEO | |
Resource Sharing among Real-Time Tasks | lec13 | 03:36 to 04:59 | VIDEO |
No Records Found