1 | Computer science | Foundations Of Cyber
Physical Systems | Lecture 35:
Reachability
analysis (Contd.) | UG | 14-03-2025Friday | Time | 08:00:00 - 09:01:05 || 07:42:40 - 08:00:00 (2025-03-15) || |
2 | Computer science | Programming in
Modern C++ | C++11 and beyond:
Non-class Types and
Template Features | UG | 14-03-2025Friday | Time | 09:01:05 - 09:58:33 || |
3 | Computer science | Online Privacy | Conducting (user,
lab, online) studies | UG | 14-03-2025Friday | Time | 09:58:33 - 10:58:21 || |
4 | Computer science | Operating Systems:
An Introduction | Introduction to
Operating Systems
Part-2 | UG | 14-03-2025Friday | Time | 10:58:21 - 11:56:20 || |
5 | Computer science | Synthesis of Digital
Systems | VHDL: Introduction
to Hardware
Description
Languages & VHDL
Basics | UG | 14-03-2025Friday | Time | 11:56:20 - 13:00:37 || |
6 | Computer science | Introduction to Game
Theory and Mechanism
Design | Strategy, Utility in
Bayesian Games | UG | 14-03-2025Friday | Time | 13:00:37 - 13:17:55 || |
7 | Computer science | Introduction to Game
Theory and Mechanism
Design | Equilibrium in
Bayesian Games | UG | 14-03-2025Friday | Time | 13:17:55 - 13:33:42 || |
8 | Computer science | Introduction to Game
Theory and Mechanism
Design | Examples of Bayesian
Equilibrium | UG | 14-03-2025Friday | Time | 13:33:42 - 13:59:41 || |
9 | Computer science | Randomized
Algorithms | Hashing | UG | 14-03-2025Friday | Time | 13:59:41 - 14:43:28 || |
10 | Computer science | Cryptography and
Network Security | Lecture 39: Key
Exchange | UG | 14-03-2025Friday | Time | 14:43:28 - 15:14:45 || |
11 | Computer science | Cryptography and
Network Security | Lecture 40: Hash
Function | UG | 14-03-2025Friday | Time | 15:14:45 - 15:49:13 || |
12 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:81 | UG | 14-03-2025Friday | Time | 15:49:13 - 16:11:28 || |
13 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:82 | UG | 14-03-2025Friday | Time | 16:11:28 - 16:49:10 || |
14 | Computer science | Affective Computing | Lec-14 | UG | 14-03-2025Friday | Time | 16:49:10 - 17:50:23 || |
15 | Computer science | Comprehensive View
of Speech Processing | Linear Prediction
Analysis of Speech 1 | UG | 14-03-2025Friday | Time | 17:50:23 - 18:54:39 || |
16 | Computer science | Introduction to
Machine Learning | The BIRCH Algorithm | UG | 14-03-2025Friday | Time | 18:54:39 - 19:16:06 || |
17 | Computer science | Introduction to
Machine Learning | The CURE Algorithm | UG | 14-03-2025Friday | Time | 19:16:06 - 19:36:23 || |
18 | Computer science | Introduction to
Machine Learning | Density Based
Clustering | UG | 14-03-2025Friday | Time | 19:36:23 - 19:54:30 || |
19 | Computer science | Data Structure and
Algorithms using
Java | Array Data
Structures | UG | 14-03-2025Friday | Time | 19:54:30 - 20:30:39 || |
20 | Computer science | Embedded
SystemsDesign
Verification and
Test | Syntax and Semantics
of CTL | UG | 14-03-2025Friday | Time | 20:30:39 - 21:48:25 || |
21 | Computer science | Getting Started with
Competitive
Programming | DSU - Implementation | UG | 14-03-2025Friday | Time | 21:48:25 - 22:10:30 || |
22 | Computer science | Getting Started with
Competitive
Programming | Destroying Array - I
(Problem Statement
and Solution) | UG | 14-03-2025Friday | Time | 22:10:30 - 22:27:16 || |
23 | Computer science | Computational
Complexity Theory | Lec-30 | UG | 14-03-2025Friday | Time | 22:27:16 - 23:48:38 || |
24 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain in Supply
Chain – I | UG | 14-03-2025Friday | Time | 23:48:38 - 00:03:47 || |
25 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain in Supply
Chain – II | UG | 14-03-2025Friday | Time | 00:03:47 - 00:22:42 (2025-03-15) || |
26 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain in Other
Industries | UG | 14-03-2025Friday | Time | 00:22:42 - 00:42:53 (2025-03-15) || |
27 | Computer science | Joy of Computing
Using Python | Recursion | UG | 14-03-2025Friday | Time | 00:42:53 - 01:45:37 (2025-03-15) || |
28 | Computer science | RealTime Systems | QoS Models & Soft
Real-Time
Communication in a
LAN | UG | 14-03-2025Friday | Time | 01:45:37 - 02:30:58 (2025-03-15) || |
29 | Computer science | Selected Topics in
Algorithms | Lecture 05 : Flow
Decomposition | UG | 14-03-2025Friday | Time | 02:30:58 - 03:01:19 (2025-03-15) || |
30 | Computer science | Selected Topics in
Algorithms | Lecture 06 : Maximum
Bipartite Matching,
Fattest Augmenting
Path | UG | 14-03-2025Friday | Time | 03:01:19 - 03:33:27 (2025-03-15) || |
31 | Computer science | Applied Natural
Language Processing | Lecture-5 | UG | 14-03-2025Friday | Time | 03:33:27 - 04:09:31 (2025-03-15) || |
32 | Computer science | Applied Natural
Language Processing | Lecture-6 | UG | 14-03-2025Friday | Time | 04:09:31 - 04:37:26 (2025-03-15) || |
33 | Computer science | Foundation of Cloud
IoT Edge ML | Lecture 08 | UG | 14-03-2025Friday | Time | 04:37:26 - 05:36:23 (2025-03-15) || |
34 | Computer science | Secure Computation:
Part I | Oblivious Transfer
(OT) | UG | 14-03-2025Friday | Time | 05:36:23 - 06:14:32 (2025-03-15) || |
35 | Computer science | Secure Computation:
Part I | RSA Assumption and
RSA Hard-Core
Predicate | UG | 14-03-2025Friday | Time | 06:14:32 - 06:39:02 (2025-03-15) || |
36 | Computer science | MultiCore Computer
Architecture Storage
& Interconnects | Introduction to
Instruction Pipeline | UG | 14-03-2025Friday | Time | 06:39:02 - 07:42:40 (2025-03-15) || |
37 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain in
Government – I
(Advantages) | UG | 15-03-2025Saturday | Time | 08:00:00 - 08:33:41 || 07:56:29 - 08:00:00 (2025-03-16) || |
38 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain in
Government – II
(Use Cases) | UG | 15-03-2025Saturday | Time | 08:33:41 - 08:59:49 || |
39 | Computer science | Joy of Computing
Using Python | Snakes & Ladders:
Not on the Board | UG | 15-03-2025Saturday | Time | 08:59:49 - 10:00:54 || |
40 | Computer science | RealTime Systems | Review of Basic
Database Concepts | UG | 15-03-2025Saturday | Time | 10:00:54 - 10:32:24 || |
41 | Computer science | RealTime Systems | Applications and
Issues of Real-Time
Database | UG | 15-03-2025Saturday | Time | 10:32:24 - 11:08:34 || |
42 | Computer science | Selected Topics in
Algorithms | Lecture 07 :
Karger's Algorithm | UG | 15-03-2025Saturday | Time | 11:08:34 - 11:41:09 || |
43 | Computer science | Selected Topics in
Algorithms | Lecture 08 :
Augmenting Path | UG | 15-03-2025Saturday | Time | 11:41:09 - 12:11:33 || |
44 | Computer science | Applied Natural
Language Processing | Lecture-7 | UG | 15-03-2025Saturday | Time | 12:11:33 - 12:34:46 || |
45 | Computer science | Applied Natural
Language Processing | Lecture-8 | UG | 15-03-2025Saturday | Time | 12:34:46 - 12:52:16 || |
46 | Computer science | Foundation of Cloud
IoT Edge ML | Lecture 09 | UG | 15-03-2025Saturday | Time | 12:52:16 - 14:01:36 || |
47 | Computer science | Secure Computation:
Part I | Bit OT Based on RSA
Assumption and
Hard-Core Predicate | UG | 15-03-2025Saturday | Time | 14:01:36 - 14:39:10 || |
48 | Computer science | Secure Computation:
Part I | Discrete Logarithm
and DDH Assumption | UG | 15-03-2025Saturday | Time | 14:39:10 - 15:06:56 || |
49 | Computer science | MultiCore Computer
Architecture Storage
& Interconnects | Introduction to
Superscalar
Pipelines | UG | 15-03-2025Saturday | Time | 15:06:56 - 16:07:51 || |
50 | Computer science | Foundations Of Cyber
Physical Systems | Lecture 35:
Reachability
analysis (Contd.) | UG | 15-03-2025Saturday | Time | 16:07:51 - 17:08:56 || |
51 | Computer science | Programming in
Modern C++ | C++11 and beyond:
Non-class Types and
Template Features | UG | 15-03-2025Saturday | Time | 17:08:56 - 18:06:24 || |
52 | Computer science | Online Privacy | Conducting (user,
lab, online) studies | UG | 15-03-2025Saturday | Time | 18:06:24 - 19:06:12 || |
53 | Computer science | Operating Systems:
An Introduction | Introduction to
Operating Systems
Part-2 | UG | 15-03-2025Saturday | Time | 19:06:12 - 20:04:11 || |
54 | Computer science | Synthesis of Digital
Systems | VHDL: Introduction
to Hardware
Description
Languages & VHDL
Basics | UG | 15-03-2025Saturday | Time | 20:04:11 - 21:08:28 || |
55 | Computer science | Introduction to Game
Theory and Mechanism
Design | Strategy, Utility in
Bayesian Games | UG | 15-03-2025Saturday | Time | 21:08:28 - 21:25:46 || |
56 | Computer science | Introduction to Game
Theory and Mechanism
Design | Equilibrium in
Bayesian Games | UG | 15-03-2025Saturday | Time | 21:25:46 - 21:41:33 || |
57 | Computer science | Introduction to Game
Theory and Mechanism
Design | Examples of Bayesian
Equilibrium | UG | 15-03-2025Saturday | Time | 21:41:33 - 22:07:32 || |
58 | Computer science | Randomized
Algorithms | Hashing | UG | 15-03-2025Saturday | Time | 22:07:32 - 22:51:19 || |
59 | Computer science | Cryptography and
Network Security | Lecture 39: Key
Exchange | UG | 15-03-2025Saturday | Time | 22:51:19 - 23:22:36 || |
60 | Computer science | Cryptography and
Network Security | Lecture 40: Hash
Function | UG | 15-03-2025Saturday | Time | 23:22:36 - 23:57:04 || |
61 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:81 | UG | 15-03-2025Saturday | Time | 23:57:04 - 00:19:19 || |
62 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:82 | UG | 15-03-2025Saturday | Time | 00:19:19 - 00:57:01 (2025-03-16) || |
63 | Computer science | Affective Computing | Lec-14 | UG | 15-03-2025Saturday | Time | 00:57:01 - 01:58:14 (2025-03-16) || |
64 | Computer science | Comprehensive View
of Speech Processing | Linear Prediction
Analysis of Speech 1 | UG | 15-03-2025Saturday | Time | 01:58:14 - 03:02:30 (2025-03-16) || |
65 | Computer science | Introduction to
Machine Learning | The BIRCH Algorithm | UG | 15-03-2025Saturday | Time | 03:02:30 - 03:23:57 (2025-03-16) || |
66 | Computer science | Introduction to
Machine Learning | The CURE Algorithm | UG | 15-03-2025Saturday | Time | 03:23:57 - 03:44:14 (2025-03-16) || |
67 | Computer science | Introduction to
Machine Learning | Density Based
Clustering | UG | 15-03-2025Saturday | Time | 03:44:14 - 04:02:21 (2025-03-16) || |
68 | Computer science | Data Structure and
Algorithms using
Java | Array Data
Structures | UG | 15-03-2025Saturday | Time | 04:02:21 - 04:38:30 (2025-03-16) || |
69 | Computer science | Embedded
SystemsDesign
Verification and
Test | Syntax and Semantics
of CTL | UG | 15-03-2025Saturday | Time | 04:38:30 - 05:56:16 (2025-03-16) || |
70 | Computer science | Getting Started with
Competitive
Programming | DSU - Implementation | UG | 15-03-2025Saturday | Time | 05:56:16 - 06:18:21 (2025-03-16) || |
71 | Computer science | Getting Started with
Competitive
Programming | Destroying Array - I
(Problem Statement
and Solution) | UG | 15-03-2025Saturday | Time | 06:18:21 - 06:35:07 (2025-03-16) || |
72 | Computer science | Computational
Complexity Theory | Lec-30 | UG | 15-03-2025Saturday | Time | 06:35:07 - 07:56:29 (2025-03-16) || |
73 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:83 | UG | 17-03-2025Monday | Time | 08:00:00 - 08:32:32 || 07:53:49 - 08:00:00 (2025-03-18) || |
74 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:84 | UG | 17-03-2025Monday | Time | 08:32:32 - 08:55:26 || |
75 | Computer science | Affective Computing | Lec-15 | UG | 17-03-2025Monday | Time | 08:55:26 - 10:00:44 || |
76 | Computer science | Comprehensive View
of Speech Processing | Linear Prediction
Analysis of Speech 2 | UG | 17-03-2025Monday | Time | 10:00:44 - 10:57:17 || |
77 | Computer science | Introduction to
Machine Learning | Gaussian Mixture
Models | UG | 17-03-2025Monday | Time | 10:57:17 - 11:59:39 || |
78 | Computer science | Data Structure and
Algorithms using
Java | Programming for
Arrays | UG | 17-03-2025Monday | Time | 11:59:39 - 12:58:37 || |
79 | Computer science | Embedded
SystemsDesign
Verification and
Test | Equivalence between
CTL formulas | UG | 17-03-2025Monday | Time | 12:58:37 - 14:02:01 || |
80 | Computer science | Getting Started with
Competitive
Programming | Destroying Array -
II (Implementation) | UG | 17-03-2025Monday | Time | 14:02:01 - 14:16:45 || |
81 | Computer science | Getting Started with
Competitive
Programming | War - I (Problem
Statement) | UG | 17-03-2025Monday | Time | 14:16:45 - 14:38:23 || |
82 | Computer science | Getting Started with
Competitive
Programming | War - II (Solution)
& War - III
(Implementation) | UG | 17-03-2025Monday | Time | 14:38:23 - 15:11:14 || |
83 | Computer science | Computational
Complexity Theory | Lec-31 | UG | 17-03-2025Monday | Time | 15:11:14 - 15:56:45 || |
84 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain in
Government – I
(Advantages) | UG | 17-03-2025Monday | Time | 15:56:45 - 16:30:26 || |
85 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain in
Government – II
(Use Cases) | UG | 17-03-2025Monday | Time | 16:30:26 - 16:56:34 || |
86 | Computer science | Joy of Computing
Using Python | Snakes & Ladders:
Not on the Board | UG | 17-03-2025Monday | Time | 16:56:34 - 17:57:39 || |
87 | Computer science | RealTime Systems | Review of Basic
Database Concepts | UG | 17-03-2025Monday | Time | 17:57:39 - 18:29:09 || |
88 | Computer science | RealTime Systems | Applications and
Issues of Real-Time
Database | UG | 17-03-2025Monday | Time | 18:29:09 - 19:05:19 || |
89 | Computer science | Selected Topics in
Algorithms | Lecture 07 :
Karger's Algorithm | UG | 17-03-2025Monday | Time | 19:05:19 - 19:37:54 || |
90 | Computer science | Selected Topics in
Algorithms | Lecture 08 :
Augmenting Path | UG | 17-03-2025Monday | Time | 19:37:54 - 20:08:18 || |
91 | Computer science | Applied Natural
Language Processing | Lecture-7 | UG | 17-03-2025Monday | Time | 20:08:18 - 20:31:31 || |
92 | Computer science | Applied Natural
Language Processing | Lecture-8 | UG | 17-03-2025Monday | Time | 20:31:31 - 20:49:01 || |
93 | Computer science | Foundation of Cloud
IoT Edge ML | Lecture 09 | UG | 17-03-2025Monday | Time | 20:49:01 - 21:58:21 || |
94 | Computer science | Secure Computation:
Part I | Bit OT Based on RSA
Assumption and
Hard-Core Predicate | UG | 17-03-2025Monday | Time | 21:58:21 - 22:35:55 || |
95 | Computer science | Secure Computation:
Part I | Discrete Logarithm
and DDH Assumption | UG | 17-03-2025Monday | Time | 22:35:55 - 23:03:41 || |
96 | Computer science | MultiCore Computer
Architecture Storage
& Interconnects | Introduction to
Superscalar
Pipelines | UG | 17-03-2025Monday | Time | 23:03:41 - 00:04:36 || |
97 | Computer science | Foundations Of Cyber
Physical Systems | Lecture 35:
Reachability
analysis (Contd.) | UG | 17-03-2025Monday | Time | 00:04:36 - 01:05:41 (2025-03-18) || |
98 | Computer science | Programming in
Modern C++ | C++11 and beyond:
Non-class Types and
Template Features | UG | 17-03-2025Monday | Time | 01:05:41 - 02:03:09 (2025-03-18) || |
99 | Computer science | Online Privacy | Conducting (user,
lab, online) studies | UG | 17-03-2025Monday | Time | 02:03:09 - 03:02:57 (2025-03-18) || |
100 | Computer science | Operating Systems:
An Introduction | Introduction to
Operating Systems
Part-2 | UG | 17-03-2025Monday | Time | 03:02:57 - 04:00:56 (2025-03-18) || |
101 | Computer science | Synthesis of Digital
Systems | VHDL: Introduction
to Hardware
Description
Languages & VHDL
Basics | UG | 17-03-2025Monday | Time | 04:00:56 - 05:05:13 (2025-03-18) || |
102 | Computer science | Introduction to Game
Theory and Mechanism
Design | Strategy, Utility in
Bayesian Games | UG | 17-03-2025Monday | Time | 05:05:13 - 05:22:31 (2025-03-18) || |
103 | Computer science | Introduction to Game
Theory and Mechanism
Design | Equilibrium in
Bayesian Games | UG | 17-03-2025Monday | Time | 05:22:31 - 05:38:18 (2025-03-18) || |
104 | Computer science | Introduction to Game
Theory and Mechanism
Design | Examples of Bayesian
Equilibrium | UG | 17-03-2025Monday | Time | 05:38:18 - 06:04:17 (2025-03-18) || |
105 | Computer science | Randomized
Algorithms | Hashing | UG | 17-03-2025Monday | Time | 06:04:17 - 06:48:04 (2025-03-18) || |
106 | Computer science | Cryptography and
Network Security | Lecture 39: Key
Exchange | UG | 17-03-2025Monday | Time | 06:48:04 - 07:19:21 (2025-03-18) || |
107 | Computer science | Cryptography and
Network Security | Lecture 40: Hash
Function | UG | 17-03-2025Monday | Time | 07:19:21 - 07:53:49 (2025-03-18) || |
108 | Computer science | Foundations Of Cyber
Physical Systems | Lecture 36:
Reachability
analysis (Contd.) | UG | 18-03-2025Tuesday | Time | 08:00:00 - 09:00:49 || 07:54:57 - 08:00:00 (2025-03-19) || |
109 | Computer science | Programming in
Modern C++ | Compatibility of C
and C++: Part 1:
Significant Features | UG | 18-03-2025Tuesday | Time | 09:00:49 - 09:29:08 || |
110 | Computer science | Programming in
Modern C++ | C++11 and beyond:
Resource Management
by Smart Pointers:
Part 1 | UG | 18-03-2025Tuesday | Time | 09:29:08 - 10:04:17 || |
111 | Computer science | Online Privacy | Research paper
reading | UG | 18-03-2025Tuesday | Time | 10:04:17 - 11:00:14 || |
112 | Computer science | Operating Systems:
An Introduction | Introduction to
Operating Systems
Part-3 | UG | 18-03-2025Tuesday | Time | 11:00:14 - 11:53:25 || |
113 | Computer science | Synthesis of Digital
Systems | VHDL: Modelling
Timing - Events &
Transactions | UG | 18-03-2025Tuesday | Time | 11:53:25 - 12:51:11 || |
114 | Computer science | Introduction to Game
Theory and Mechanism
Design | Introduction to
Mechanism Design | UG | 18-03-2025Tuesday | Time | 12:51:11 - 13:24:30 || |
115 | Computer science | Introduction to Game
Theory and Mechanism
Design | Revelation Principle | UG | 18-03-2025Tuesday | Time | 13:24:30 - 14:01:17 || |
116 | Computer science | Randomized
Algorithms | Probabilistically
checkable proofs - I | UG | 18-03-2025Tuesday | Time | 14:01:17 - 14:46:08 || |
117 | Computer science | Cryptography and
Network Security | Lecture 41:
Universal Hashing | UG | 18-03-2025Tuesday | Time | 14:46:08 - 15:18:23 || |
118 | Computer science | Cryptography and
Network Security | Lecture 42:
Cryptographic Hash
Function | UG | 18-03-2025Tuesday | Time | 15:18:23 - 15:50:21 || |
119 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:83 | UG | 18-03-2025Tuesday | Time | 15:50:21 - 16:22:53 || |
120 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:84 | UG | 18-03-2025Tuesday | Time | 16:22:53 - 16:45:47 || |
121 | Computer science | Affective Computing | Lec-15 | UG | 18-03-2025Tuesday | Time | 16:45:47 - 17:51:05 || |
122 | Computer science | Comprehensive View
of Speech Processing | Linear Prediction
Analysis of Speech 2 | UG | 18-03-2025Tuesday | Time | 17:51:05 - 18:47:38 || |
123 | Computer science | Introduction to
Machine Learning | Gaussian Mixture
Models | UG | 18-03-2025Tuesday | Time | 18:47:38 - 19:50:00 || |
124 | Computer science | Data Structure and
Algorithms using
Java | Programming for
Arrays | UG | 18-03-2025Tuesday | Time | 19:50:00 - 20:48:58 || |
125 | Computer science | Embedded
SystemsDesign
Verification and
Test | Equivalence between
CTL formulas | UG | 18-03-2025Tuesday | Time | 20:48:58 - 21:52:22 || |
126 | Computer science | Getting Started with
Competitive
Programming | Destroying Array -
II (Implementation) | UG | 18-03-2025Tuesday | Time | 21:52:22 - 22:07:06 || |
127 | Computer science | Getting Started with
Competitive
Programming | War - I (Problem
Statement) | UG | 18-03-2025Tuesday | Time | 22:07:06 - 22:28:44 || |
128 | Computer science | Getting Started with
Competitive
Programming | War - II (Solution)
& War - III
(Implementation) | UG | 18-03-2025Tuesday | Time | 22:28:44 - 23:01:35 || |
129 | Computer science | Computational
Complexity Theory | Lec-31 | UG | 18-03-2025Tuesday | Time | 23:01:35 - 23:47:06 || |
130 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain in
Government – I
(Advantages) | UG | 18-03-2025Tuesday | Time | 23:47:06 - 00:20:47 || |
131 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain in
Government – II
(Use Cases) | UG | 18-03-2025Tuesday | Time | 00:20:47 - 00:46:55 (2025-03-19) || |
132 | Computer science | Joy of Computing
Using Python | Snakes & Ladders:
Not on the Board | UG | 18-03-2025Tuesday | Time | 00:46:55 - 01:48:00 (2025-03-19) || |
133 | Computer science | RealTime Systems | Review of Basic
Database Concepts | UG | 18-03-2025Tuesday | Time | 01:48:00 - 02:19:30 (2025-03-19) || |
134 | Computer science | RealTime Systems | Applications and
Issues of Real-Time
Database | UG | 18-03-2025Tuesday | Time | 02:19:30 - 02:55:40 (2025-03-19) || |
135 | Computer science | Selected Topics in
Algorithms | Lecture 07 :
Karger's Algorithm | UG | 18-03-2025Tuesday | Time | 02:55:40 - 03:28:15 (2025-03-19) || |
136 | Computer science | Selected Topics in
Algorithms | Lecture 08 :
Augmenting Path | UG | 18-03-2025Tuesday | Time | 03:28:15 - 03:58:39 (2025-03-19) || |
137 | Computer science | Applied Natural
Language Processing | Lecture-7 | UG | 18-03-2025Tuesday | Time | 03:58:39 - 04:21:52 (2025-03-19) || |
138 | Computer science | Applied Natural
Language Processing | Lecture-8 | UG | 18-03-2025Tuesday | Time | 04:21:52 - 04:39:22 (2025-03-19) || |
139 | Computer science | Foundation of Cloud
IoT Edge ML | Lecture 09 | UG | 18-03-2025Tuesday | Time | 04:39:22 - 05:48:42 (2025-03-19) || |
140 | Computer science | Secure Computation:
Part I | Bit OT Based on RSA
Assumption and
Hard-Core Predicate | UG | 18-03-2025Tuesday | Time | 05:48:42 - 06:26:16 (2025-03-19) || |
141 | Computer science | Secure Computation:
Part I | Discrete Logarithm
and DDH Assumption | UG | 18-03-2025Tuesday | Time | 06:26:16 - 06:54:02 (2025-03-19) || |
142 | Computer science | MultiCore Computer
Architecture Storage
& Interconnects | Introduction to
Superscalar
Pipelines | UG | 18-03-2025Tuesday | Time | 06:54:02 - 07:54:57 (2025-03-19) || |
143 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain in
Government – III
(Digital Identity) | UG | 19-03-2025Wednesday | Time | 08:00:00 - 08:29:13 || 07:37:16 - 08:00:00 (2025-03-20) || |
144 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain in
Government – IV
(Hyperledger Indy) | UG | 19-03-2025Wednesday | Time | 08:29:13 - 09:03:30 || |
145 | Computer science | Joy of Computing
Using Python | Spiral Traversing | UG | 19-03-2025Wednesday | Time | 09:03:30 - 10:04:16 || |
146 | Computer science | RealTime Systems | Characteristics of
Temporal Data | UG | 19-03-2025Wednesday | Time | 10:04:16 - 10:43:31 || |
147 | Computer science | Selected Topics in
Algorithms | Lecture 09 : Edmonds
Blossom Algorithm | UG | 19-03-2025Wednesday | Time | 10:43:31 - 11:16:18 || |
148 | Computer science | Selected Topics in
Algorithms | Lecture 10 : Edmond
- Karp Algorithm
(Contd.) | UG | 19-03-2025Wednesday | Time | 11:16:18 - 11:48:33 || |
149 | Computer science | Applied Natural
Language Processing | Lecture-9 | UG | 19-03-2025Wednesday | Time | 11:48:33 - 12:13:15 || |
150 | Computer science | Applied Natural
Language Processing | Lecture-10 | UG | 19-03-2025Wednesday | Time | 12:13:15 - 12:29:39 || |
151 | Computer science | Applied Natural
Language Processing | Contextual
understanding of
text | UG | 19-03-2025Wednesday | Time | 12:29:39 - 12:43:10 || |
152 | Computer science | Foundation of Cloud
IoT Edge ML | Lecture 10 | UG | 19-03-2025Wednesday | Time | 12:43:10 - 13:04:49 || |
153 | Computer science | Foundation of Cloud
IoT Edge ML | Lecture 11 | UG | 19-03-2025Wednesday | Time | 13:04:49 - 13:57:37 || |
154 | Computer science | Secure Computation:
Part I | OT Based on the DDH
Assumption | UG | 19-03-2025Wednesday | Time | 13:57:37 - 14:23:37 || |
155 | Computer science | Secure Computation:
Part I | Pre-Processing Phase
for the GMW Protocol | UG | 19-03-2025Wednesday | Time | 14:23:37 - 14:58:21 || |
156 | Computer science | MultiCore Computer
Architecture Storage
& Interconnects | Instruction Pipeline
& Performance - I | UG | 19-03-2025Wednesday | Time | 14:58:21 - 15:50:10 || |
157 | Computer science | Foundations Of Cyber
Physical Systems | Lecture 36:
Reachability
analysis (Contd.) | UG | 19-03-2025Wednesday | Time | 15:50:10 - 16:50:59 || |
158 | Computer science | Programming in
Modern C++ | Compatibility of C
and C++: Part 1:
Significant Features | UG | 19-03-2025Wednesday | Time | 16:50:59 - 17:19:18 || |
159 | Computer science | Programming in
Modern C++ | C++11 and beyond:
Resource Management
by Smart Pointers:
Part 1 | UG | 19-03-2025Wednesday | Time | 17:19:18 - 17:54:27 || |
160 | Computer science | Online Privacy | Research paper
reading | UG | 19-03-2025Wednesday | Time | 17:54:27 - 18:50:24 || |
161 | Computer science | Operating Systems:
An Introduction | Introduction to
Operating Systems
Part-3 | UG | 19-03-2025Wednesday | Time | 18:50:24 - 19:43:35 || |
162 | Computer science | Synthesis of Digital
Systems | VHDL: Modelling
Timing - Events &
Transactions | UG | 19-03-2025Wednesday | Time | 19:43:35 - 20:41:21 || |
163 | Computer science | Introduction to Game
Theory and Mechanism
Design | Introduction to
Mechanism Design | UG | 19-03-2025Wednesday | Time | 20:41:21 - 21:14:40 || |
164 | Computer science | Introduction to Game
Theory and Mechanism
Design | Revelation Principle | UG | 19-03-2025Wednesday | Time | 21:14:40 - 21:51:27 || |
165 | Computer science | Randomized
Algorithms | Probabilistically
checkable proofs - I | UG | 19-03-2025Wednesday | Time | 21:51:27 - 22:36:18 || |
166 | Computer science | Cryptography and
Network Security | Lecture 41:
Universal Hashing | UG | 19-03-2025Wednesday | Time | 22:36:18 - 23:08:33 || |
167 | Computer science | Cryptography and
Network Security | Lecture 42:
Cryptographic Hash
Function | UG | 19-03-2025Wednesday | Time | 23:08:33 - 23:40:31 || |
168 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:83 | UG | 19-03-2025Wednesday | Time | 23:40:31 - 00:13:03 || |
169 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:84 | UG | 19-03-2025Wednesday | Time | 00:13:03 - 00:35:57 (2025-03-20) || |
170 | Computer science | Affective Computing | Lec-15 | UG | 19-03-2025Wednesday | Time | 00:35:57 - 01:41:15 (2025-03-20) || |
171 | Computer science | Comprehensive View
of Speech Processing | Linear Prediction
Analysis of Speech 2 | UG | 19-03-2025Wednesday | Time | 01:41:15 - 02:37:48 (2025-03-20) || |
172 | Computer science | Introduction to
Machine Learning | Gaussian Mixture
Models | UG | 19-03-2025Wednesday | Time | 02:37:48 - 03:40:10 (2025-03-20) || |
173 | Computer science | Data Structure and
Algorithms using
Java | Programming for
Arrays | UG | 19-03-2025Wednesday | Time | 03:40:10 - 04:39:08 (2025-03-20) || |
174 | Computer science | Embedded
SystemsDesign
Verification and
Test | Equivalence between
CTL formulas | UG | 19-03-2025Wednesday | Time | 04:39:08 - 05:42:32 (2025-03-20) || |
175 | Computer science | Getting Started with
Competitive
Programming | Destroying Array -
II (Implementation) | UG | 19-03-2025Wednesday | Time | 05:42:32 - 05:57:16 (2025-03-20) || |
176 | Computer science | Getting Started with
Competitive
Programming | War - I (Problem
Statement) | UG | 19-03-2025Wednesday | Time | 05:57:16 - 06:18:54 (2025-03-20) || |
177 | Computer science | Getting Started with
Competitive
Programming | War - II (Solution)
& War - III
(Implementation) | UG | 19-03-2025Wednesday | Time | 06:18:54 - 06:51:45 (2025-03-20) || |
178 | Computer science | Computational
Complexity Theory | Lec-31 | UG | 19-03-2025Wednesday | Time | 06:51:45 - 07:37:16 (2025-03-20) || |
179 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:85 | UG | 20-03-2025Thursday | Time | 08:00:00 - 08:23:08 || 07:34:26 - 07:57:34 (2025-03-21) || |
180 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:86 | UG | 20-03-2025Thursday | Time | 08:23:08 - 08:58:20 || 07:57:34 - 08:00:00 (2025-03-21) || |
181 | Computer science | Affective Computing | Lec-16 | UG | 20-03-2025Thursday | Time | 08:58:20 - 09:41:25 || |
182 | Computer science | Comprehensive View
of Speech Processing | Linear Prediction
Analysis of Speech 3 | UG | 20-03-2025Thursday | Time | 09:41:25 - 10:35:58 || |
183 | Computer science | Introduction to
Machine Learning | Expectation
Maximization | UG | 20-03-2025Thursday | Time | 10:35:58 - 11:08:39 || |
184 | Computer science | Introduction to
Machine Learning | Expectation
Maximization
Continued | UG | 20-03-2025Thursday | Time | 11:08:39 - 11:47:15 || |
185 | Computer science | Data Structure and
Algorithms using
Java | Class ArrayList for
Arrays | UG | 20-03-2025Thursday | Time | 11:47:15 - 12:21:20 || |
186 | Computer science | Data Structure and
Algorithms using
Java | Arrays for Arrays | UG | 20-03-2025Thursday | Time | 12:21:20 - 12:53:17 || |
187 | Computer science | Embedded
SystemsDesign
Verification and
Test | Model Checking
Algorithm | UG | 20-03-2025Thursday | Time | 12:53:17 - 14:08:32 || |
188 | Computer science | Getting Started with
Competitive
Programming | Graph Foundations | UG | 20-03-2025Thursday | Time | 14:08:32 - 14:38:53 || |
189 | Computer science | Getting Started with
Competitive
Programming | BFS and DFS | UG | 20-03-2025Thursday | Time | 14:38:53 - 15:11:45 || |
190 | Computer science | Computational
Complexity Theory | Lec-32 | UG | 20-03-2025Thursday | Time | 15:11:45 - 15:53:55 || |
191 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain in
Government – III
(Digital Identity) | UG | 20-03-2025Thursday | Time | 15:53:55 - 16:23:08 || |
192 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain in
Government – IV
(Hyperledger Indy) | UG | 20-03-2025Thursday | Time | 16:23:08 - 16:57:25 || |
193 | Computer science | Joy of Computing
Using Python | Spiral Traversing | UG | 20-03-2025Thursday | Time | 16:57:25 - 17:58:11 || |
194 | Computer science | RealTime Systems | Characteristics of
Temporal Data | UG | 20-03-2025Thursday | Time | 17:58:11 - 18:37:26 || |
195 | Computer science | Selected Topics in
Algorithms | Lecture 09 : Edmonds
Blossom Algorithm | UG | 20-03-2025Thursday | Time | 18:37:26 - 19:10:13 || |
196 | Computer science | Selected Topics in
Algorithms | Lecture 10 : Edmond
- Karp Algorithm
(Contd.) | UG | 20-03-2025Thursday | Time | 19:10:13 - 19:42:28 || |
197 | Computer science | Applied Natural
Language Processing | Lecture-9 | UG | 20-03-2025Thursday | Time | 19:42:28 - 20:07:10 || |
198 | Computer science | Applied Natural
Language Processing | Lecture-10 | UG | 20-03-2025Thursday | Time | 20:07:10 - 20:23:34 || |
199 | Computer science | Applied Natural
Language Processing | Contextual
understanding of
text | UG | 20-03-2025Thursday | Time | 20:23:34 - 20:37:05 || |
200 | Computer science | Foundation of Cloud
IoT Edge ML | Lecture 10 | UG | 20-03-2025Thursday | Time | 20:37:05 - 20:58:44 || |
201 | Computer science | Foundation of Cloud
IoT Edge ML | Lecture 11 | UG | 20-03-2025Thursday | Time | 20:58:44 - 21:51:32 || |
202 | Computer science | Secure Computation:
Part I | OT Based on the DDH
Assumption | UG | 20-03-2025Thursday | Time | 21:51:32 - 22:17:32 || |
203 | Computer science | Secure Computation:
Part I | Pre-Processing Phase
for the GMW Protocol | UG | 20-03-2025Thursday | Time | 22:17:32 - 22:52:16 || |
204 | Computer science | MultiCore Computer
Architecture Storage
& Interconnects | Instruction Pipeline
& Performance - I | UG | 20-03-2025Thursday | Time | 22:52:16 - 23:44:05 || |
205 | Computer science | Foundations Of Cyber
Physical Systems | Lecture 36:
Reachability
analysis (Contd.) | UG | 20-03-2025Thursday | Time | 23:44:05 - 00:44:54 || |
206 | Computer science | Programming in
Modern C++ | Compatibility of C
and C++: Part 1:
Significant Features | UG | 20-03-2025Thursday | Time | 00:44:54 - 01:13:13 (2025-03-21) || |
207 | Computer science | Programming in
Modern C++ | C++11 and beyond:
Resource Management
by Smart Pointers:
Part 1 | UG | 20-03-2025Thursday | Time | 01:13:13 - 01:48:22 (2025-03-21) || |
208 | Computer science | Online Privacy | Research paper
reading | UG | 20-03-2025Thursday | Time | 01:48:22 - 02:44:19 (2025-03-21) || |
209 | Computer science | Operating Systems:
An Introduction | Introduction to
Operating Systems
Part-3 | UG | 20-03-2025Thursday | Time | 02:44:19 - 03:37:30 (2025-03-21) || |
210 | Computer science | Synthesis of Digital
Systems | VHDL: Modelling
Timing - Events &
Transactions | UG | 20-03-2025Thursday | Time | 03:37:30 - 04:35:16 (2025-03-21) || |
211 | Computer science | Introduction to Game
Theory and Mechanism
Design | Introduction to
Mechanism Design | UG | 20-03-2025Thursday | Time | 04:35:16 - 05:08:35 (2025-03-21) || |
212 | Computer science | Introduction to Game
Theory and Mechanism
Design | Revelation Principle | UG | 20-03-2025Thursday | Time | 05:08:35 - 05:45:22 (2025-03-21) || |
213 | Computer science | Randomized
Algorithms | Probabilistically
checkable proofs - I | UG | 20-03-2025Thursday | Time | 05:45:22 - 06:30:13 (2025-03-21) || |
214 | Computer science | Cryptography and
Network Security | Lecture 41:
Universal Hashing | UG | 20-03-2025Thursday | Time | 06:30:13 - 07:02:28 (2025-03-21) || |
215 | Computer science | Cryptography and
Network Security | Lecture 42:
Cryptographic Hash
Function | UG | 20-03-2025Thursday | Time | 07:02:28 - 07:34:26 (2025-03-21) || |