Biometrics (View More...)
lec13 | lec13 | 18:39 to 19:48 | VIDEO | |
Offline Signature Recognition | lec17 | 16:07 to 16:37 | VIDEO | |
Offline Signature Recognition | lec17 | 22:35 to 22:55 | VIDEO |
Compiler Design IISc Bangalore (View More...)
An Overview of a Compiler | lec1 | 00:54 to 02:28 | VIDEO | |
An Overview of a Compiler | lec1 | 02:28 to 06:10 | VIDEO | |
An Overview of a Compiler Part 2 and Run-Time Environments | lec2 | 00:18 to 00:26 | VIDEO |
Computational Geometry (View More...)
Voronoi Diagrams Nearest Neighbour Searching | lec16 | 00:33 to 04:20 | VIDEO | |
Voronoi Diagrams Nearest Neighbour Searching | lec16 | 04:20 to 08:15 | VIDEO | |
Voronoi Diagrams Nearest Neighbour Searching | lec16 | 08:15 to 19:23 | VIDEO |
Computer Architecture (View More...)
Memory Hierarchy: Basic Idea | lec28 | 00:31 to 00:34 | VIDEO | |
Memory Hierarchy: Basic Idea | lec28 | 00:34 to 00:39 | VIDEO | |
Memory Hierarchy: Basic Idea | lec28 | 00:42 to 00:46 | VIDEO |
Computer Graphics- Sukhedu Das (View More...)
CRT Display Devices | lec2 | 26:05 to 26:43 | VIDEO | |
CRT Display Devices | lec2 | 26:43 to 31:42 | VIDEO | |
CRT Display Devices | lec2 | 31:42 to 42:59 | VIDEO |
Computer Organization (View More...)
CPU Memory Interaction | lec16 | 41:22 to 48:54 | VIDEO | |
Cache Organization (Contdâ¦.) | lec18 | 08:07 to 15:22 | VIDEO | |
Cache Organization (Contdâ¦.) | lec18 | 15:22 to 22:43 | VIDEO |
Cryptography and Network Security (View More...)
Block Cipher Standards (DES) | lec11 | 02:51 to 04:52 | VIDEO | |
Block Cipher Standards (DES) | lec11 | 06:08 to 09:52 | VIDEO | |
Block Cipher Standards (DES) | lec11 | 19:57 to 22:05 | VIDEO |
Design Verification and Test of Digital VLSI Circuits (View More...)
Binary Decision Diagram: Introduction and Construction | lec23 | 05:15 to 07:19 | VIDEO | |
Binary Decision Diagram: Introduction and Construction | lec23 | 44:42 to 45:50 | VIDEO | |
Binary Decision Diagram: Introduction and Construction | lec23 | 60:25 to upto | VIDEO |
Electronic Design Automation (View More...)
Synthesis: Part 4 | lec11 | 07:54 to 12:55 | VIDEO | |
Synthesis: Part 4 | lec11 | 12:55 to 15:14 | VIDEO | |
Synthesis: Part 5 | lec12 | 15:30 to 21:52 | VIDEO |
Real Time Systems (View More...)
Resource Sharing among Real-Time Tasks | lec13 | 35:15 to 38:59 | VIDEO | |
Highest Locker and Priority Ceiling Protocols | lec14 | 21:10 to 23:11 | VIDEO | |
Highest Locker and Priority Ceiling Protocols | lec14 | 37:01 to 43:24 | VIDEO |
Software Engineering (View More...)
Data Modeling- ER diagrams, Mapping to relational model | lec11 | 38:04 to 39:00 | VIDEO | |
Data Modelling- ER diagrams, Mapping to relational model | lec12 | 00:56 to 02:55 | VIDEO | |
Data Modelling- ER diagrams, Mapping to relational model | lec12 | 02:55 to 04:30 | VIDEO |
No Records Found