1 | Computer science | Blockchain
Architecture Design
& use cases | Permissioned
Blockchain – V
(Practical Byzantine
Fault Tolerance) | UG | 12-02-2025Wednesday | Time | 08:00:00 - 08:42:28 || 07:51:44 - 08:00:00 (2025-02-13) || |
2 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain for
Enterprise -
Overview | UG | 12-02-2025Wednesday | Time | 08:42:28 - 09:04:32 || |
3 | Computer science | Joy of Computing
Using Python | Magic Square: Hit &
Trial | UG | 12-02-2025Wednesday | Time | 09:04:32 - 09:59:44 || |
4 | Computer science | RealTime Systems | Windows as RTOS | UG | 12-02-2025Wednesday | Time | 09:59:44 - 10:32:15 || |
5 | Computer science | RealTime Systems | POSIX | UG | 12-02-2025Wednesday | Time | 10:32:15 - 11:03:35 || |
6 | Computer science | GPU Architectures &
Programming | OpenCL -
Heterogeneous
Computing (Contd.) | UG | 12-02-2025Wednesday | Time | 11:03:35 - 11:33:15 || |
7 | Computer science | GPU Architectures &
Programming | Heterogeneous
Computing (Contd.) | UG | 12-02-2025Wednesday | Time | 11:33:15 - 12:05:18 || |
8 | Computer science | Social Network
Analysis | SNA Chapter 9
Lecture 10 | UG | 12-02-2025Wednesday | Time | 12:05:18 - 12:23:13 || |
9 | Computer science | Social Network
Analysis | SNA Chapter 9
Lecture 11 | UG | 12-02-2025Wednesday | Time | 12:23:13 - 13:00:59 || |
10 | Computer science | Big Data Computing | Spark Graphx & Graph
Analytics Part II | UG | 12-02-2025Wednesday | Time | 13:00:59 - 13:35:31 || |
11 | Computer science | Big Data Computing | Flight data analysis
using spark graphx | UG | 12-02-2025Wednesday | Time | 13:35:31 - 14:01:19 || |
12 | Computer science | Secure Computation:
Part I | Shared
Circuit-Evaluation
via GRR
Degree-Reduction
Method | UG | 12-02-2025Wednesday | Time | 14:01:19 - 14:50:27 || |
13 | Computer science | Probability for
Computer Science | lec19 | UG | 12-02-2025Wednesday | Time | 14:50:27 - 15:24:19 || |
14 | Computer science | Probability for
Computer Science | lec20 | UG | 12-02-2025Wednesday | Time | 15:24:19 - 16:00:43 || |
15 | Computer science | Foundations Of Cyber
Physical Systems | Lec 19: Dynamical
system modeling,
stability,
controller
design(Contd.) | UG | 12-02-2025Wednesday | Time | 16:00:43 - 16:27:04 || |
16 | Computer science | Foundations Of Cyber
Physical Systems | Lec 20: Dynamical
system modeling,
stability,
controller
design(Contd.) | UG | 12-02-2025Wednesday | Time | 16:27:04 - 16:57:43 || |
17 | Computer science | Programming in
Modern C++ | Input-Output:
Streams in C++ | UG | 12-02-2025Wednesday | Time | 16:57:43 - 17:32:41 || |
18 | Computer science | Programming in
Modern C++ | C++ Standard
Library: Part 1
(Generic
Programming) | UG | 12-02-2025Wednesday | Time | 17:32:41 - 18:05:44 || |
19 | Computer science | Online Privacy | Privacy concepts and
studies | UG | 12-02-2025Wednesday | Time | 18:05:44 - 18:50:08 || |
20 | Computer science | Online Privacy | Fair Information
Practices | UG | 12-02-2025Wednesday | Time | 18:50:08 - 19:13:29 || |
21 | Computer science | Operating System
Fundamentals | Memory Management
(Contd.) | UG | 12-02-2025Wednesday | Time | 19:13:29 - 19:43:41 || |
22 | Computer science | Operating System
Fundamentals | Memory Management
(Contd.) | UG | 12-02-2025Wednesday | Time | 19:43:41 - 20:13:35 || |
23 | Computer science | CBased VLSI Design | Introduction to
Hardware Security | UG | 12-02-2025Wednesday | Time | 20:13:35 - 20:36:17 || |
24 | Computer science | CBased VLSI Design | HLS for Security | UG | 12-02-2025Wednesday | Time | 20:36:17 - 21:00:49 || |
25 | Computer science | Introduction to Game
Theory and Mechanism
Design | Proof of the chess
theorem | UG | 12-02-2025Wednesday | Time | 21:00:49 - 21:30:34 || |
26 | Computer science | Introduction to Game
Theory and Mechanism
Design | Dominance | UG | 12-02-2025Wednesday | Time | 21:30:34 - 21:54:33 || |
27 | Computer science | Randomized
Algorithms | Primality Testing | UG | 12-02-2025Wednesday | Time | 21:54:33 - 22:45:15 || |
28 | Computer science | Cryptography and
Network Security | Lecture 21: Advanced
Encryption Standard
(AES) | UG | 12-02-2025Wednesday | Time | 22:45:15 - 23:19:45 || |
29 | Computer science | Cryptography and
Network Security | Lecture 21: Advanced
Encryption Standard
(AES)(Contd.) | UG | 12-02-2025Wednesday | Time | 23:19:45 - 23:57:11 || |
30 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:62 | UG | 12-02-2025Wednesday | Time | 23:57:11 - 00:27:37 || |
31 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:63 | UG | 12-02-2025Wednesday | Time | 00:27:37 - 00:50:58 (2025-02-13) || |
32 | Computer science | Affective Computing | Lecture 1
Fundamentals of
Affective computing | UG | 12-02-2025Wednesday | Time | 00:50:58 - 01:49:14 (2025-02-13) || |
33 | Computer science | Comprehensive View
of Speech Processing | Knowledge Sources in
Speech | UG | 12-02-2025Wednesday | Time | 01:49:14 - 02:50:53 (2025-02-13) || |
34 | Computer science | Introduction to
Machine Learning | Sampling
Distributions & Z
Test | UG | 12-02-2025Wednesday | Time | 02:50:53 - 03:20:03 (2025-02-13) || |
35 | Computer science | Introduction to
Machine Learning | Students t-tet | UG | 12-02-2025Wednesday | Time | 03:20:03 - 03:36:56 (2025-02-13) || |
36 | Computer science | Introduction to
Machine Learning | The Two Sample &
Paired Sample t
tests | UG | 12-02-2025Wednesday | Time | 03:36:56 - 03:54:04 (2025-02-13) || |
37 | Computer science | Data Mining | Regression I | UG | 12-02-2025Wednesday | Time | 03:54:04 - 04:25:43 (2025-02-13) || |
38 | Computer science | Data Mining | Regression II | UG | 12-02-2025Wednesday | Time | 04:25:43 - 04:50:47 (2025-02-13) || |
39 | Computer science | Embedded
SystemsDesign
Verification and
Test | Introduction to
Hardware Design | UG | 12-02-2025Wednesday | Time | 04:50:47 - 05:49:06 (2025-02-13) || |
40 | Computer science | Getting Started with
Competitive
Programming | Reversort | UG | 12-02-2025Wednesday | Time | 05:49:06 - 06:56:54 (2025-02-13) || |
41 | Computer science | Computational
Complexity Theory | Lec-18 | UG | 12-02-2025Wednesday | Time | 06:56:54 - 07:39:02 (2025-02-13) || |
42 | Computer science | Computational
Complexity Theory | Lec-19 | UG | 12-02-2025Wednesday | Time | 07:39:02 - 07:51:44 (2025-02-13) || |
43 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:64 | UG | 13-02-2025Thursday | Time | 08:00:00 - 08:23:12 || 07:56:37 - 08:00:00 (2025-02-14) || |
44 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:65 | UG | 13-02-2025Thursday | Time | 08:23:12 - 08:59:54 || |
45 | Computer science | Affective Computing | Lecture 2
Fundamentals of
Affective computing
Applications | UG | 13-02-2025Thursday | Time | 08:59:54 - 10:00:01 || |
46 | Computer science | Comprehensive View
of Speech Processing | Processing &
Analysis of Speech | UG | 13-02-2025Thursday | Time | 10:00:01 - 10:57:56 || |
47 | Computer science | Introduction to
Machine Learning | Confidence Intervals | UG | 13-02-2025Thursday | Time | 10:57:56 - 11:12:14 || |
48 | Computer science | Introduction to
Machine Learning | Bagging, Committee
Machines& Stacking | UG | 13-02-2025Thursday | Time | 11:12:14 - 12:00:57 || |
49 | Computer science | Data Mining | Regression III | UG | 13-02-2025Thursday | Time | 12:00:57 - 12:24:48 || |
50 | Computer science | Data Mining | Regression IV | UG | 13-02-2025Thursday | Time | 12:24:48 - 12:54:23 || |
51 | Computer science | Embedded
SystemsDesign
Verification and
Test | Hardware
Architectural
Synthesis – 1 | UG | 13-02-2025Thursday | Time | 12:54:23 - 13:18:46 || |
52 | Computer science | Embedded
SystemsDesign
Verification and
Test | Hardware
Architectural
Synthesis – 2 | UG | 13-02-2025Thursday | Time | 13:18:46 - 13:59:34 || |
53 | Computer science | Getting Started with
Competitive
Programming | Engineering
Reversort | UG | 13-02-2025Thursday | Time | 13:59:34 - 14:54:39 || |
54 | Computer science | Computational
Complexity Theory | Lec-20 | UG | 13-02-2025Thursday | Time | 14:54:39 - 15:12:17 || |
55 | Computer science | Computational
Complexity Theory | Lec-21 | UG | 13-02-2025Thursday | Time | 15:12:17 - 15:59:26 || |
56 | Computer science | Blockchain
Architecture Design
& use cases | Permissioned
Blockchain – V
(Practical Byzantine
Fault Tolerance) | UG | 13-02-2025Thursday | Time | 15:59:26 - 16:41:54 || |
57 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain for
Enterprise -
Overview | UG | 13-02-2025Thursday | Time | 16:41:54 - 17:03:58 || |
58 | Computer science | Joy of Computing
Using Python | Magic Square: Hit &
Trial | UG | 13-02-2025Thursday | Time | 17:03:58 - 17:59:10 || |
59 | Computer science | RealTime Systems | Windows as RTOS | UG | 13-02-2025Thursday | Time | 17:59:10 - 18:31:41 || |
60 | Computer science | RealTime Systems | POSIX | UG | 13-02-2025Thursday | Time | 18:31:41 - 19:03:01 || |
61 | Computer science | GPU Architectures &
Programming | OpenCL -
Heterogeneous
Computing (Contd.) | UG | 13-02-2025Thursday | Time | 19:03:01 - 19:32:41 || |
62 | Computer science | GPU Architectures &
Programming | Heterogeneous
Computing (Contd.) | UG | 13-02-2025Thursday | Time | 19:32:41 - 20:04:44 || |
63 | Computer science | Social Network
Analysis | SNA Chapter 9
Lecture 10 | UG | 13-02-2025Thursday | Time | 20:04:44 - 20:22:39 || |
64 | Computer science | Social Network
Analysis | SNA Chapter 9
Lecture 11 | UG | 13-02-2025Thursday | Time | 20:22:39 - 21:00:25 || |
65 | Computer science | Big Data Computing | Spark Graphx & Graph
Analytics Part II | UG | 13-02-2025Thursday | Time | 21:00:25 - 21:34:57 || |
66 | Computer science | Big Data Computing | Flight data analysis
using spark graphx | UG | 13-02-2025Thursday | Time | 21:34:57 - 22:00:45 || |
67 | Computer science | Secure Computation:
Part I | Shared
Circuit-Evaluation
via GRR
Degree-Reduction
Method | UG | 13-02-2025Thursday | Time | 22:00:45 - 22:49:53 || |
68 | Computer science | Probability for
Computer Science | lec19 | UG | 13-02-2025Thursday | Time | 22:49:53 - 23:23:45 || |
69 | Computer science | Probability for
Computer Science | lec20 | UG | 13-02-2025Thursday | Time | 23:23:45 - 00:00:09 || |
70 | Computer science | Foundations Of Cyber
Physical Systems | Lec 19: Dynamical
system modeling,
stability,
controller
design(Contd.) | UG | 13-02-2025Thursday | Time | 00:00:09 - 00:26:30 (2025-02-14) || |
71 | Computer science | Foundations Of Cyber
Physical Systems | Lec 20: Dynamical
system modeling,
stability,
controller
design(Contd.) | UG | 13-02-2025Thursday | Time | 00:26:30 - 00:57:09 (2025-02-14) || |
72 | Computer science | Programming in
Modern C++ | Input-Output:
Streams in C++ | UG | 13-02-2025Thursday | Time | 00:57:09 - 01:32:07 (2025-02-14) || |
73 | Computer science | Programming in
Modern C++ | C++ Standard
Library: Part 1
(Generic
Programming) | UG | 13-02-2025Thursday | Time | 01:32:07 - 02:05:10 (2025-02-14) || |
74 | Computer science | Online Privacy | Privacy concepts and
studies | UG | 13-02-2025Thursday | Time | 02:05:10 - 02:49:34 (2025-02-14) || |
75 | Computer science | Online Privacy | Fair Information
Practices | UG | 13-02-2025Thursday | Time | 02:49:34 - 03:12:55 (2025-02-14) || |
76 | Computer science | Operating System
Fundamentals | Memory Management
(Contd.) | UG | 13-02-2025Thursday | Time | 03:12:55 - 03:43:07 (2025-02-14) || |
77 | Computer science | Operating System
Fundamentals | Memory Management
(Contd.) | UG | 13-02-2025Thursday | Time | 03:43:07 - 04:13:01 (2025-02-14) || |
78 | Computer science | CBased VLSI Design | Introduction to
Hardware Security | UG | 13-02-2025Thursday | Time | 04:13:01 - 04:35:43 (2025-02-14) || |
79 | Computer science | CBased VLSI Design | HLS for Security | UG | 13-02-2025Thursday | Time | 04:35:43 - 05:00:15 (2025-02-14) || |
80 | Computer science | Introduction to Game
Theory and Mechanism
Design | Proof of the chess
theorem | UG | 13-02-2025Thursday | Time | 05:00:15 - 05:30:00 (2025-02-14) || |
81 | Computer science | Introduction to Game
Theory and Mechanism
Design | Dominance | UG | 13-02-2025Thursday | Time | 05:30:00 - 05:53:59 (2025-02-14) || |
82 | Computer science | Randomized
Algorithms | Primality Testing | UG | 13-02-2025Thursday | Time | 05:53:59 - 06:44:41 (2025-02-14) || |
83 | Computer science | Cryptography and
Network Security | Lecture 21: Advanced
Encryption Standard
(AES) | UG | 13-02-2025Thursday | Time | 06:44:41 - 07:19:11 (2025-02-14) || |
84 | Computer science | Cryptography and
Network Security | Lecture 21: Advanced
Encryption Standard
(AES)(Contd.) | UG | 13-02-2025Thursday | Time | 07:19:11 - 07:56:37 (2025-02-14) || |
85 | Computer science | Foundations Of Cyber
Physical Systems | Lec 21: Dynamical
system modeling,
stability,
controller
design(Contd.) | UG | 14-02-2025Friday | Time | 08:00:00 - 08:24:52 || |
86 | Computer science | Foundations Of Cyber
Physical Systems | Lec 22: Dynamical
system modeling,
stability,
controller
design(Contd.) | UG | 14-02-2025Friday | Time | 08:24:52 - 08:53:25 || |
87 | Computer science | Programming in
Modern C++ | C++ Standard
Library: Part 2
(STL) | UG | 14-02-2025Friday | Time | 08:53:25 - 09:29:27 || |
88 | Computer science | Programming in
Modern C++ | C++ Standard
Library: Part 3
(STL) | UG | 14-02-2025Friday | Time | 09:29:27 - 10:05:14 || |
89 | Computer science | Online Privacy | Right to Privacy
Contextual Integrity | UG | 14-02-2025Friday | Time | 10:05:14 - 10:32:16 || |
90 | Computer science | Online Privacy | Privacy Policy (Part
I) | UG | 14-02-2025Friday | Time | 10:32:16 - 11:19:11 || |
91 | Computer science | Operating System
Fundamentals | Memory Management
(Contd.) | UG | 14-02-2025Friday | Time | 11:19:11 - 11:50:11 || |
92 | Computer science | Operating System
Fundamentals | Memory Management
(Contd.) | UG | 14-02-2025Friday | Time | 11:50:11 - 12:12:41 || |
93 | Computer science | CBased VLSI Design | Attacks on RTL Logic
locking | UG | 14-02-2025Friday | Time | 12:12:41 - 12:58:34 || |
94 | Computer science | Introduction to Game
Theory and Mechanism
Design | Nash equilibrium | UG | 14-02-2025Friday | Time | 12:58:34 - 13:19:53 || |
95 | Computer science | Introduction to Game
Theory and Mechanism
Design | Maxmin strategies | UG | 14-02-2025Friday | Time | 13:19:53 - 13:37:24 || |
96 | Computer science | Introduction to Game
Theory and Mechanism
Design | Elimination of
dominated strategies | UG | 14-02-2025Friday | Time | 13:37:24 - 13:52:12 || |
97 | Computer science | Randomized
Algorithms | Miller Rabin
Algorithm | UG | 14-02-2025Friday | Time | 13:52:12 - 14:32:08 || |
98 | Computer science | Randomized
Algorithms | All pair shortest
path-I | UG | 14-02-2025Friday | Time | 14:32:08 - 14:58:11 || |
99 | Computer science | Cryptography and
Network Security | Lecture 23:
Introduction to
Public Key
Cryptosystem,
Diffie-Hellman Key
Exchange. | UG | 14-02-2025Friday | Time | 14:58:11 - 15:29:47 || |
100 | Computer science | Cryptography and
Network Security | Lecture 24: Knapsack
Cryptosystem | UG | 14-02-2025Friday | Time | 15:29:47 - 16:02:46 || |
101 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:64 | UG | 14-02-2025Friday | Time | 16:02:46 - 16:25:58 || |
102 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:65 | UG | 14-02-2025Friday | Time | 16:25:58 - 17:02:40 || |
103 | Computer science | Affective Computing | Lecture 2
Fundamentals of
Affective computing
Applications | UG | 14-02-2025Friday | Time | 17:02:40 - 18:02:47 || |
104 | Computer science | Comprehensive View
of Speech Processing | Processing &
Analysis of Speech | UG | 14-02-2025Friday | Time | 18:02:47 - 19:00:42 || |
105 | Computer science | Introduction to
Machine Learning | Confidence Intervals | UG | 14-02-2025Friday | Time | 19:00:42 - 19:15:00 || |
106 | Computer science | Introduction to
Machine Learning | Bagging, Committee
Machines& Stacking | UG | 14-02-2025Friday | Time | 19:15:00 - 20:03:43 || |
107 | Computer science | Data Mining | Regression III | UG | 14-02-2025Friday | Time | 20:03:43 - 20:27:34 || |
108 | Computer science | Data Mining | Regression IV | UG | 14-02-2025Friday | Time | 20:27:34 - 20:57:09 || |
109 | Computer science | Embedded
SystemsDesign
Verification and
Test | Hardware
Architectural
Synthesis – 1 | UG | 14-02-2025Friday | Time | 20:57:09 - 21:21:32 || |
110 | Computer science | Embedded
SystemsDesign
Verification and
Test | Hardware
Architectural
Synthesis – 2 | UG | 14-02-2025Friday | Time | 21:21:32 - 22:02:20 || |
111 | Computer science | Getting Started with
Competitive
Programming | Engineering
Reversort | UG | 14-02-2025Friday | Time | 22:02:20 - 22:57:25 || |
112 | Computer science | Computational
Complexity Theory | Lec-20 | UG | 14-02-2025Friday | Time | 22:57:25 - 23:15:03 || |
113 | Computer science | Computational
Complexity Theory | Lec-21 | UG | 14-02-2025Friday | Time | 23:15:03 - 00:02:12 || |
114 | Computer science | Blockchain
Architecture Design
& use cases | Permissioned
Blockchain – V
(Practical Byzantine
Fault Tolerance) | UG | 14-02-2025Friday | Time | 00:02:12 - 00:44:40 (2025-02-15) || |
115 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain for
Enterprise -
Overview | UG | 14-02-2025Friday | Time | 00:44:40 - 01:06:44 (2025-02-15) || |
116 | Computer science | Joy of Computing
Using Python | Magic Square: Hit &
Trial | UG | 14-02-2025Friday | Time | 01:06:44 - 02:01:56 (2025-02-15) || |
117 | Computer science | RealTime Systems | Windows as RTOS | UG | 14-02-2025Friday | Time | 02:01:56 - 02:34:27 (2025-02-15) || |
118 | Computer science | RealTime Systems | POSIX | UG | 14-02-2025Friday | Time | 02:34:27 - 03:05:47 (2025-02-15) || |
119 | Computer science | GPU Architectures &
Programming | OpenCL -
Heterogeneous
Computing (Contd.) | UG | 14-02-2025Friday | Time | 03:05:47 - 03:35:27 (2025-02-15) || |
120 | Computer science | GPU Architectures &
Programming | Heterogeneous
Computing (Contd.) | UG | 14-02-2025Friday | Time | 03:35:27 - 04:07:30 (2025-02-15) || |
121 | Computer science | Social Network
Analysis | SNA Chapter 9
Lecture 10 | UG | 14-02-2025Friday | Time | 04:07:30 - 04:25:25 (2025-02-15) || |
122 | Computer science | Social Network
Analysis | SNA Chapter 9
Lecture 11 | UG | 14-02-2025Friday | Time | 04:25:25 - 05:03:11 (2025-02-15) || |
123 | Computer science | Big Data Computing | Spark Graphx & Graph
Analytics Part II | UG | 14-02-2025Friday | Time | 05:03:11 - 05:37:43 (2025-02-15) || |
124 | Computer science | Big Data Computing | Flight data analysis
using spark graphx | UG | 14-02-2025Friday | Time | 05:37:43 - 06:03:31 (2025-02-15) || |
125 | Computer science | Secure Computation:
Part I | Shared
Circuit-Evaluation
via GRR
Degree-Reduction
Method | UG | 14-02-2025Friday | Time | 06:03:31 - 06:52:39 (2025-02-15) || |
126 | Computer science | Probability for
Computer Science | lec19 | UG | 14-02-2025Friday | Time | 06:52:39 - 07:26:31 (2025-02-15) || |
127 | Computer science | Probability for
Computer Science | lec20 | UG | 14-02-2025Friday | Time | 07:26:31 - 08:00:00 (2025-02-15) || |
128 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain
Components and
Concepts | UG | 15-02-2025Saturday | Time | 08:00:00 - 08:20:03 || |
129 | Computer science | Blockchain
Architecture Design
& use cases | Hyperledger Fabric
– Transaction Flow | UG | 15-02-2025Saturday | Time | 08:20:03 - 08:49:12 || |
130 | Computer science | Blockchain
Architecture Design
& use cases | Hyperledger Fabric
Details | UG | 15-02-2025Saturday | Time | 08:49:12 - 09:07:57 || |
131 | Computer science | Joy of Computing
Using Python | Dobble Game: spot
the similarity | UG | 15-02-2025Saturday | Time | 09:07:57 - 10:00:52 || |
132 | Computer science | RealTime Systems | Unix-Based Real-Time
Operating Systems | UG | 15-02-2025Saturday | Time | 10:00:52 - 10:30:08 || |
133 | Computer science | RealTime Systems | A survey of some
contemporary
Real-Time Operating
Systems | UG | 15-02-2025Saturday | Time | 10:30:08 - 11:04:27 || |
134 | Computer science | GPU Architectures &
Programming | Efficient Neural
Network
Training/Inferencing | UG | 15-02-2025Saturday | Time | 11:04:27 - 11:37:15 || |
135 | Computer science | GPU Architectures &
Programming | Efficient Neural
Network
Training/Inferencing
(Contd.) | UG | 15-02-2025Saturday | Time | 11:37:15 - 12:12:23 || |
136 | Computer science | Social Network
Analysis | SNA Tutorial 5 | UG | 15-02-2025Saturday | Time | 12:12:23 - 12:55:27 || |
137 | Computer science | Social Network
Analysis | SNA Chapter 10
Lecture 1 | UG | 15-02-2025Saturday | Time | 12:55:27 - 13:16:59 || |
138 | Computer science | Foundation of Cloud
IoT Edge ML | Lecture 01:
Introduction to Edge
Computing | UG | 15-02-2025Saturday | Time | 13:16:59 - 13:54:29 || |
139 | Computer science | Secure Computation:
Part I | Shared
Circuit-Evaluation
in the
Pre-processing Model | UG | 15-02-2025Saturday | Time | 13:54:29 - 14:55:46 || |
140 | Computer science | Probability for
Computer Science | lec21 | UG | 15-02-2025Saturday | Time | 14:55:46 - 15:29:37 || |
141 | Computer science | Probability for
Computer Science | lec22 | UG | 15-02-2025Saturday | Time | 15:29:37 - 15:58:55 || |
142 | Computer science | Foundations Of Cyber
Physical Systems | Lec 21: Dynamical
system modeling,
stability,
controller
design(Contd.) | UG | 15-02-2025Saturday | Time | 15:58:55 - 16:23:47 || |
143 | Computer science | Foundations Of Cyber
Physical Systems | Lec 22: Dynamical
system modeling,
stability,
controller
design(Contd.) | UG | 15-02-2025Saturday | Time | 16:23:47 - 16:52:20 || |
144 | Computer science | Programming in
Modern C++ | C++ Standard
Library: Part 2
(STL) | UG | 15-02-2025Saturday | Time | 16:52:20 - 17:28:22 || |
145 | Computer science | Programming in
Modern C++ | C++ Standard
Library: Part 3
(STL) | UG | 15-02-2025Saturday | Time | 17:28:22 - 18:04:09 || |
146 | Computer science | Online Privacy | Right to Privacy
Contextual Integrity | UG | 15-02-2025Saturday | Time | 18:04:09 - 18:31:11 || |
147 | Computer science | Online Privacy | Privacy Policy (Part
I) | UG | 15-02-2025Saturday | Time | 18:31:11 - 19:18:06 || |
148 | Computer science | Operating System
Fundamentals | Memory Management
(Contd.) | UG | 15-02-2025Saturday | Time | 19:18:06 - 19:49:06 || |
149 | Computer science | Operating System
Fundamentals | Memory Management
(Contd.) | UG | 15-02-2025Saturday | Time | 19:49:06 - 20:11:36 || |
150 | Computer science | CBased VLSI Design | Attacks on RTL Logic
locking | UG | 15-02-2025Saturday | Time | 20:11:36 - 20:57:29 || |
151 | Computer science | Introduction to Game
Theory and Mechanism
Design | Nash equilibrium | UG | 15-02-2025Saturday | Time | 20:57:29 - 21:18:48 || |
152 | Computer science | Introduction to Game
Theory and Mechanism
Design | Maxmin strategies | UG | 15-02-2025Saturday | Time | 21:18:48 - 21:36:19 || |
153 | Computer science | Introduction to Game
Theory and Mechanism
Design | Elimination of
dominated strategies | UG | 15-02-2025Saturday | Time | 21:36:19 - 21:51:07 || |
154 | Computer science | Randomized
Algorithms | Miller Rabin
Algorithm | UG | 15-02-2025Saturday | Time | 21:51:07 - 22:31:03 || |
155 | Computer science | Randomized
Algorithms | All pair shortest
path-I | UG | 15-02-2025Saturday | Time | 22:31:03 - 22:57:06 || |
156 | Computer science | Cryptography and
Network Security | Lecture 23:
Introduction to
Public Key
Cryptosystem,
Diffie-Hellman Key
Exchange. | UG | 15-02-2025Saturday | Time | 22:57:06 - 23:28:42 || |
157 | Computer science | Cryptography and
Network Security | Lecture 24: Knapsack
Cryptosystem | UG | 15-02-2025Saturday | Time | 23:28:42 - 00:01:41 || |
158 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:64 | UG | 15-02-2025Saturday | Time | 00:01:41 - 00:24:53 (2025-02-16) || |
159 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:65 | UG | 15-02-2025Saturday | Time | 00:24:53 - 01:01:35 (2025-02-16) || |
160 | Computer science | Affective Computing | Lecture 2
Fundamentals of
Affective computing
Applications | UG | 15-02-2025Saturday | Time | 01:01:35 - 02:01:42 (2025-02-16) || |
161 | Computer science | Comprehensive View
of Speech Processing | Processing &
Analysis of Speech | UG | 15-02-2025Saturday | Time | 02:01:42 - 02:59:37 (2025-02-16) || |
162 | Computer science | Introduction to
Machine Learning | Confidence Intervals | UG | 15-02-2025Saturday | Time | 02:59:37 - 03:13:55 (2025-02-16) || |
163 | Computer science | Introduction to
Machine Learning | Bagging, Committee
Machines& Stacking | UG | 15-02-2025Saturday | Time | 03:13:55 - 04:02:38 (2025-02-16) || |
164 | Computer science | Data Mining | Regression III | UG | 15-02-2025Saturday | Time | 04:02:38 - 04:26:29 (2025-02-16) || |
165 | Computer science | Data Mining | Regression IV | UG | 15-02-2025Saturday | Time | 04:26:29 - 04:56:04 (2025-02-16) || |
166 | Computer science | Embedded
SystemsDesign
Verification and
Test | Hardware
Architectural
Synthesis – 1 | UG | 15-02-2025Saturday | Time | 04:56:04 - 05:20:27 (2025-02-16) || |
167 | Computer science | Embedded
SystemsDesign
Verification and
Test | Hardware
Architectural
Synthesis – 2 | UG | 15-02-2025Saturday | Time | 05:20:27 - 06:01:15 (2025-02-16) || |
168 | Computer science | Getting Started with
Competitive
Programming | Engineering
Reversort | UG | 15-02-2025Saturday | Time | 06:01:15 - 06:56:20 (2025-02-16) || |
169 | Computer science | Computational
Complexity Theory | Lec-20 | UG | 15-02-2025Saturday | Time | 06:56:20 - 07:13:58 (2025-02-16) || |
170 | Computer science | Computational
Complexity Theory | Lec-21 | UG | 15-02-2025Saturday | Time | 07:13:58 - 08:00:00 (2025-02-16) || |
171 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:66 | UG | 17-02-2025Monday | Time | 08:00:00 - 08:25:08 || |
172 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:67 | UG | 17-02-2025Monday | Time | 08:25:08 - 08:57:42 || |
173 | Computer science | Affective Computing | Emotion Psychology | UG | 17-02-2025Monday | Time | 08:57:42 - 09:25:11 || |
174 | Computer science | Affective Computing | Emotion Theory | UG | 17-02-2025Monday | Time | 09:25:11 - 10:06:30 || |
175 | Computer science | Comprehensive View
of Speech Processing | LTI System :
Concepts of
Convolution &
Correlation | UG | 17-02-2025Monday | Time | 10:06:30 - 11:03:00 || |
176 | Computer science | Introduction to
Machine Learning | Boosting | UG | 17-02-2025Monday | Time | 11:03:00 - 11:59:56 || |
177 | Computer science | Data Mining | Dimensionality
Reduction - I | UG | 17-02-2025Monday | Time | 11:59:56 - 12:25:13 || |
178 | Computer science | Data Mining | Dimensionality
Reduction - II | UG | 17-02-2025Monday | Time | 12:25:13 - 13:00:47 || |
179 | Computer science | Embedded
SystemsDesign
Verification and
Test | Hardware
Architectural
Synthesis – 3 | UG | 17-02-2025Monday | Time | 13:00:47 - 13:17:52 || |
180 | Computer science | Embedded
SystemsDesign
Verification and
Test | Hardware
Architectural
Synthesis – 4 | UG | 17-02-2025Monday | Time | 13:17:52 - 13:58:34 || |
181 | Computer science | Getting Started with
Competitive
Programming | Number Game | UG | 17-02-2025Monday | Time | 13:58:34 - 14:54:13 || |
182 | Computer science | Computational
Complexity Theory | Lec-22 | UG | 17-02-2025Monday | Time | 14:54:13 - 15:59:47 || |
183 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain
Components and
Concepts | UG | 17-02-2025Monday | Time | 15:59:47 - 16:19:50 || |
184 | Computer science | Blockchain
Architecture Design
& use cases | Hyperledger Fabric
– Transaction Flow | UG | 17-02-2025Monday | Time | 16:19:50 - 16:48:59 || |
185 | Computer science | Blockchain
Architecture Design
& use cases | Hyperledger Fabric
Details | UG | 17-02-2025Monday | Time | 16:48:59 - 17:07:44 || |
186 | Computer science | Joy of Computing
Using Python | Dobble Game: spot
the similarity | UG | 17-02-2025Monday | Time | 17:07:44 - 18:00:39 || |
187 | Computer science | RealTime Systems | Unix-Based Real-Time
Operating Systems | UG | 17-02-2025Monday | Time | 18:00:39 - 18:29:55 || |
188 | Computer science | RealTime Systems | A survey of some
contemporary
Real-Time Operating
Systems | UG | 17-02-2025Monday | Time | 18:29:55 - 19:04:14 || |
189 | Computer science | GPU Architectures &
Programming | Efficient Neural
Network
Training/Inferencing | UG | 17-02-2025Monday | Time | 19:04:14 - 19:37:02 || |
190 | Computer science | GPU Architectures &
Programming | Efficient Neural
Network
Training/Inferencing
(Contd.) | UG | 17-02-2025Monday | Time | 19:37:02 - 20:12:10 || |
191 | Computer science | Social Network
Analysis | SNA Tutorial 5 | UG | 17-02-2025Monday | Time | 20:12:10 - 20:55:14 || |
192 | Computer science | Social Network
Analysis | SNA Chapter 10
Lecture 1 | UG | 17-02-2025Monday | Time | 20:55:14 - 21:16:46 || |
193 | Computer science | Foundation of Cloud
IoT Edge ML | Lecture 01:
Introduction to Edge
Computing | UG | 17-02-2025Monday | Time | 21:16:46 - 21:54:16 || |
194 | Computer science | Secure Computation:
Part I | Shared
Circuit-Evaluation
in the
Pre-processing Model | UG | 17-02-2025Monday | Time | 21:54:16 - 22:55:33 || |
195 | Computer science | Probability for
Computer Science | lec21 | UG | 17-02-2025Monday | Time | 22:55:33 - 23:29:24 || |
196 | Computer science | Probability for
Computer Science | lec22 | UG | 17-02-2025Monday | Time | 23:29:24 - 23:58:42 || |
197 | Computer science | Foundations Of Cyber
Physical Systems | Lec 21: Dynamical
system modeling,
stability,
controller
design(Contd.) | UG | 17-02-2025Monday | Time | 23:58:42 - 00:23:34 || |
198 | Computer science | Foundations Of Cyber
Physical Systems | Lec 22: Dynamical
system modeling,
stability,
controller
design(Contd.) | UG | 17-02-2025Monday | Time | 00:23:34 - 00:52:07 (2025-02-18) || |
199 | Computer science | Programming in
Modern C++ | C++ Standard
Library: Part 2
(STL) | UG | 17-02-2025Monday | Time | 00:52:07 - 01:28:09 (2025-02-18) || |
200 | Computer science | Programming in
Modern C++ | C++ Standard
Library: Part 3
(STL) | UG | 17-02-2025Monday | Time | 01:28:09 - 02:03:56 (2025-02-18) || |
201 | Computer science | Online Privacy | Right to Privacy
Contextual Integrity | UG | 17-02-2025Monday | Time | 02:03:56 - 02:30:58 (2025-02-18) || |
202 | Computer science | Online Privacy | Privacy Policy (Part
I) | UG | 17-02-2025Monday | Time | 02:30:58 - 03:17:53 (2025-02-18) || |
203 | Computer science | Operating System
Fundamentals | Memory Management
(Contd.) | UG | 17-02-2025Monday | Time | 03:17:53 - 03:48:53 (2025-02-18) || |
204 | Computer science | Operating System
Fundamentals | Memory Management
(Contd.) | UG | 17-02-2025Monday | Time | 03:48:53 - 04:11:23 (2025-02-18) || |
205 | Computer science | CBased VLSI Design | Attacks on RTL Logic
locking | UG | 17-02-2025Monday | Time | 04:11:23 - 04:57:16 (2025-02-18) || |
206 | Computer science | Introduction to Game
Theory and Mechanism
Design | Nash equilibrium | UG | 17-02-2025Monday | Time | 04:57:16 - 05:18:35 (2025-02-18) || |
207 | Computer science | Introduction to Game
Theory and Mechanism
Design | Maxmin strategies | UG | 17-02-2025Monday | Time | 05:18:35 - 05:36:06 (2025-02-18) || |
208 | Computer science | Introduction to Game
Theory and Mechanism
Design | Elimination of
dominated strategies | UG | 17-02-2025Monday | Time | 05:36:06 - 05:50:54 (2025-02-18) || |
209 | Computer science | Randomized
Algorithms | Miller Rabin
Algorithm | UG | 17-02-2025Monday | Time | 05:50:54 - 06:30:50 (2025-02-18) || |
210 | Computer science | Randomized
Algorithms | All pair shortest
path-I | UG | 17-02-2025Monday | Time | 06:30:50 - 06:56:53 (2025-02-18) || |
211 | Computer science | Cryptography and
Network Security | Lecture 23:
Introduction to
Public Key
Cryptosystem,
Diffie-Hellman Key
Exchange. | UG | 17-02-2025Monday | Time | 06:56:53 - 07:28:29 (2025-02-18) || |
212 | Computer science | Cryptography and
Network Security | Lecture 24: Knapsack
Cryptosystem | UG | 17-02-2025Monday | Time | 07:28:29 - 08:00:00 (2025-02-18) || |
213 | Computer science | Foundations Of Cyber
Physical Systems | Lec 23: Dynamical
system modeling,
stability,
controller
design(Contd.) | UG | 18-02-2025Tuesday | Time | 08:00:00 - 08:32:44 || 07:59:37 - 08:00:00 (2025-02-19) || |
214 | Computer science | Foundations Of Cyber
Physical Systems | Lecture 24:
Delay-aware Design;
Platform effect on
Stability/Performance | UG | 18-02-2025Tuesday | Time | 08:32:44 - 08:57:14 || |
215 | Computer science | Programming in
Modern C++ | How to design a UDT
like built-in
types?: Part 3:
Updates and Mixes of
UDTs | UG | 18-02-2025Tuesday | Time | 08:57:14 - 09:58:44 || |
216 | Computer science | Online Privacy | Privacy Policy (Part
II) | UG | 18-02-2025Tuesday | Time | 09:58:44 - 10:22:14 || |
217 | Computer science | Online Privacy | Privacy-based
technologies&
decision making | UG | 18-02-2025Tuesday | Time | 10:22:14 - 11:02:33 || |
218 | Computer science | Operating System
Fundamentals | Virtual Memory | UG | 18-02-2025Tuesday | Time | 11:02:33 - 11:34:45 || |
219 | Computer science | Operating System
Fundamentals | Virtual Memory
(Contd.) | UG | 18-02-2025Tuesday | Time | 11:34:45 - 12:05:07 || |
220 | Computer science | CBased VLSI Design | Introduction to
Logic Synthesis | UG | 18-02-2025Tuesday | Time | 12:05:07 - 13:00:55 || |
221 | Computer science | Introduction to Game
Theory and Mechanism
Design | Preservation of PSNE | UG | 18-02-2025Tuesday | Time | 13:00:55 - 13:15:05 || |
222 | Computer science | Introduction to Game
Theory and Mechanism
Design | Matrix games | UG | 18-02-2025Tuesday | Time | 13:15:05 - 13:32:52 || |
223 | Computer science | Introduction to Game
Theory and Mechanism
Design | Relation between
Maxmin and PSNE in
matrix | UG | 18-02-2025Tuesday | Time | 13:32:52 - 14:03:03 || |
224 | Computer science | Randomized
Algorithms | All pair shortest
path-II | UG | 18-02-2025Tuesday | Time | 14:03:03 - 14:57:02 || |
225 | Computer science | Cryptography and
Network Security | Lecture 25: RSA
Cryptosystem | UG | 18-02-2025Tuesday | Time | 14:57:02 - 15:30:39 || |
226 | Computer science | Cryptography and
Network Security | Lecture 26: More on
RSA | UG | 18-02-2025Tuesday | Time | 15:30:39 - 16:00:55 || |
227 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:66 | UG | 18-02-2025Tuesday | Time | 16:00:55 - 16:26:03 || |
228 | Computer science | Artificial
Intelligence: Search
methods for problem
solving | LEC:67 | UG | 18-02-2025Tuesday | Time | 16:26:03 - 16:58:37 || |
229 | Computer science | Affective Computing | Emotion Psychology | UG | 18-02-2025Tuesday | Time | 16:58:37 - 17:26:06 || |
230 | Computer science | Affective Computing | Emotion Theory | UG | 18-02-2025Tuesday | Time | 17:26:06 - 18:07:25 || |
231 | Computer science | Comprehensive View
of Speech Processing | LTI System :
Concepts of
Convolution &
Correlation | UG | 18-02-2025Tuesday | Time | 18:07:25 - 19:03:55 || |
232 | Computer science | Introduction to
Machine Learning | Boosting | UG | 18-02-2025Tuesday | Time | 19:03:55 - 20:00:51 || |
233 | Computer science | Data Mining | Dimensionality
Reduction - I | UG | 18-02-2025Tuesday | Time | 20:00:51 - 20:26:08 || |
234 | Computer science | Data Mining | Dimensionality
Reduction - II | UG | 18-02-2025Tuesday | Time | 20:26:08 - 21:01:42 || |
235 | Computer science | Embedded
SystemsDesign
Verification and
Test | Hardware
Architectural
Synthesis – 3 | UG | 18-02-2025Tuesday | Time | 21:01:42 - 21:18:47 || |
236 | Computer science | Embedded
SystemsDesign
Verification and
Test | Hardware
Architectural
Synthesis – 4 | UG | 18-02-2025Tuesday | Time | 21:18:47 - 21:59:29 || |
237 | Computer science | Getting Started with
Competitive
Programming | Number Game | UG | 18-02-2025Tuesday | Time | 21:59:29 - 22:55:08 || |
238 | Computer science | Computational
Complexity Theory | Lec-22 | UG | 18-02-2025Tuesday | Time | 22:55:08 - 00:00:42 || |
239 | Computer science | Blockchain
Architecture Design
& use cases | Blockchain
Components and
Concepts | UG | 18-02-2025Tuesday | Time | 00:00:42 - 00:20:45 (2025-02-19) || |
240 | Computer science | Blockchain
Architecture Design
& use cases | Hyperledger Fabric
– Transaction Flow | UG | 18-02-2025Tuesday | Time | 00:20:45 - 00:49:54 (2025-02-19) || |
241 | Computer science | Blockchain
Architecture Design
& use cases | Hyperledger Fabric
Details | UG | 18-02-2025Tuesday | Time | 00:49:54 - 01:08:39 (2025-02-19) || |
242 | Computer science | Joy of Computing
Using Python | Dobble Game: spot
the similarity | UG | 18-02-2025Tuesday | Time | 01:08:39 - 02:01:34 (2025-02-19) || |
243 | Computer science | RealTime Systems | Unix-Based Real-Time
Operating Systems | UG | 18-02-2025Tuesday | Time | 02:01:34 - 02:30:50 (2025-02-19) || |
244 | Computer science | RealTime Systems | A survey of some
contemporary
Real-Time Operating
Systems | UG | 18-02-2025Tuesday | Time | 02:30:50 - 03:05:09 (2025-02-19) || |
245 | Computer science | GPU Architectures &
Programming | Efficient Neural
Network
Training/Inferencing | UG | 18-02-2025Tuesday | Time | 03:05:09 - 03:37:57 (2025-02-19) || |
246 | Computer science | GPU Architectures &
Programming | Efficient Neural
Network
Training/Inferencing
(Contd.) | UG | 18-02-2025Tuesday | Time | 03:37:57 - 04:13:05 (2025-02-19) || |
247 | Computer science | Social Network
Analysis | SNA Tutorial 5 | UG | 18-02-2025Tuesday | Time | 04:13:05 - 04:56:09 (2025-02-19) || |
248 | Computer science | Social Network
Analysis | SNA Chapter 10
Lecture 1 | UG | 18-02-2025Tuesday | Time | 04:56:09 - 05:17:41 (2025-02-19) || |
249 | Computer science | Foundation of Cloud
IoT Edge ML | Lecture 01:
Introduction to Edge
Computing | UG | 18-02-2025Tuesday | Time | 05:17:41 - 05:55:11 (2025-02-19) || |
250 | Computer science | Secure Computation:
Part I | Shared
Circuit-Evaluation
in the
Pre-processing Model | UG | 18-02-2025Tuesday | Time | 05:55:11 - 06:56:28 (2025-02-19) || |
251 | Computer science | Probability for
Computer Science | lec21 | UG | 18-02-2025Tuesday | Time | 06:56:28 - 07:30:19 (2025-02-19) || |
252 | Computer science | Probability for
Computer Science | lec22 | UG | 18-02-2025Tuesday | Time | 07:30:19 - 07:59:37 (2025-02-19) || |