subjectId
Discipline Name
Subject Name
Coordinators
Type
Institute
Content
106101059
Computer Science and Engineering
Design and Analysis of Algorithms
Prof. Abhiram G Ranade,Prof. Ajit A Diwan,Prof. Sundar Viswanathan
Web
IIT Bombay
Select
contents
106101060
Computer Science and Engineering
Design and Analysis of Algorithms
Prof. Abhiram G Ranade,Prof. Ajit A Diwan,Prof. Sundar Viswanathan
Video
IIT Bombay
Select
Overview of the course
Framework for Algorithms Analysis
Algorithms Analysis Framework - II
Asymptotic Notations
Algorithm Design Techniques : Basics
Divide And Conquer-I
Divide And Conquer -II Median Finding
Divide And Conquer -III Surfing Lower Bounds
Divide And Conquer -IV Closest Pair
Greedy Algorithms -I
Greedy Algorithms - II
Greedy Algorithms - III
Greedy Algorithms - IV
Pattern Matching - I
Pattern Matching - II
Combinational Search and Optimization I
Combinational Search and Optimization II
Dynamic Programming
Longest Common Subsequences
Matrix Chain Multiplication
Scheduling with Startup and Holding Costs
Average case Analysis of Quicksort
Bipartite Maximum Matching
Lower Bounds for Sorting
Element Distinctness Lower Bounds
NP-Completeness-I -Motivation
NP - Completeness - II
NP-Completeness - III
NP-Completeness - IV
NP-Completeness - V
NP-Completeness - VI
Approximation Algorithms
Approximation Algorithms
Approximation Algorithms for NP
106101061
Computer Science and Engineering
Software Engineering
Prof. Rushikesh K Joshi,Prof. Umesh Bellur,Prof. N.L. Sarda
Video
IIT Bombay
Select
Introduction to Software Engineering-Challenges
Introduction to Software Engineering
Overview of Phases
Overview of Phases
Requirements Engineering / Specification
Formal Specification
Algebraic Specification Methods
Systems Modeling Overview
Process Modeling - DFD , Function Decomp
Process Modeling - DFD, Function Decomp
Data Modeling - ER Diagrams, Mapping
Data Modeling - ER Diagrams, Mapping
Production Quality Software - Introduction
Software Design - Primary Consideration
Design Patterns
Class and Component Level Design
Architectural Design
Software Testing - I
Software Testing - II
Structural Programming and Some implementation
Software Metrics and Quality
Verification and Validation
Case Study
Case Study
Software Evolution
Agile Development
Software Reuse CBSE
Reuse Continued
Introduction to Project Management
Project Scope Management
Project Time Management
Estimation - I
Estimation - II
Project Quality Management
Quality Management Systems - I
Quality Management Systems
Project Configuration Management
Project Risk Management
Other PM Processes
106102011
Computer Science and Engineering
Computational Geometry
Prof. Sandeep Sen
Video
IIT Delhi
Select
Introduction
Visibility Problems
2D Maxima
Line Sweep Method
Segment Intersection Problem
Line Sweep: Rectangle Union
Convex Hull
Convex Hull Contd
Quick Hull
More Convex Hull Algorithms
Intersection of Half Planes and Duality
Intersection of Half Planes and Duality Contd
Lower Bounds
Planar Point Location
Point Location and Triangulation Contd...
Triangulation of Arbitrary Polygon.
Voronoi Diagram : Properties
Voronoi Diagram Construction
Delaunay Triangulation.
Quick sort and Backward Analysis
Generalized RIC
RIC Continued
Arrangements
Zone Theorem and Application
Levels
Range Searching : Introduction
Orthogonal Range searching
Priority Search Trees
Non - Orthogonal Range Searching
Half - Plane Range Query
Well Separated Partitioning
Quadtrees Epsilon -WSPD
Construction of Epsilon - WSPD
Epsilon - WSPD to Geometric Spanner
Epsilon-Nets & VC Dimension
Epsilon-Nets & VC Dimension contd
Geometric Set Cover
Geometric Set Cover (with Bounded VC Dimension)
Shape Representation
Shape Comparison
106102062
Computer Science and Engineering
Computer Architecture
Prof. Anshul Kumar
Video
IIT Delhi
Select
Introduction to Computer Architecture
History of Computers
Instruction Set Architecture - I
Instruction Set Architecture - II
Instruction Set Architecture - III
Recursive Programs
Architecture Space
Architecture Examples
Performance
Performance
Binary Arithmetic, ALU Design
ALU Design, Overflow
Multiplier Design
Divider Design
Fast Addition , Multiplication
Floating Point Arithmetic
Processor Design - Introduction
Processor Design
Processor Design - Simple Design
Processor Design - Multi Cycle Approach
Processor Design - Control for Multi Cycle
Processor Design Micro programmed Control
Processor Design Exception Handling
Pipelined Processor Design Basic Idea
Pipelined Processor Design: Data path
Pipelined Processor Design: Handling Data
Pipelined Processor Design
Memory Hierarchy : Basic Idea
Memory Hierarchy : Cache Organization
Memory Hierarchy : Cache Organization
Memory Hierarchy : Virtual Memory
Memory Hierarchy : Virtual Memory
Input / Output Subsystem: Introduction
Input / Output Subsystem: Interfaces and buses
Input / Output Subsystem: Interfaces and buses
Input / Output Subsystem: I/O Operations
Input / Output Subsystem: Designing I/O Systems
Concluding Remarks
106102064
Computer Science and Engineering
Data Structures And Algorithms
Prof. Naveen Garg
Video
IIT Delhi
Select
Introduction to Data Structures and Algorithms
Stacks
Queues and Linked Lists
Dictionaries
Hashing
Trees
Tree Walks / Traversals
Ordered Dictionaries
Deletion
Quick Sort
AVL Trees
AVL Trees
Trees
Red Black Trees
Insertion in Red Black Trees
Disk Based Data Structures
Case Study: Searching for Patterns
Tries
Data Compression
Priority Queues
Binary Heaps
Why Sorting
More Sorting
Graphs
Data Structures for Graphs
Two Applications of Breadth First Search
Depth First Search
Applications of DFS
DFS in Directed Graphs
Applications of DFS in Directed Graphs
Minimum Spanning Trees
The Union
Prims Algorithm for Minimum Spanning Trees
Single Source Shortest Paths
Correctness of Dijkstras Algorithm
Single Source Shortest Paths
106102065
Computer Science and Engineering
Introduction to Computer Graphics
Prof. Prem K Kalra
Video
IIT Delhi
Select
Introduction
Raster Graphics
Raster Graphics (Contd.)
Clipping
Polygon Clipping and Polygon Scan Conversion
Transformations
Transformations (contd.)
3D Viewing
3D Viewing (Contd.)
Curves
Assignment - I
Curves (Contd.)
Curves (Contd.)
Curves (Contd.)
Curves (Contd.)
Surfaces
Surfaces(Contd.)
Surfaces(Contd.)
Surfaces(Contd.)
Hierarchical Models
Rendering
Rendering(Contd.)
Rendering(Contd.)
Ray Tracing
Ray Tracing(Contd.)
Ray Tracing(Contd.)
Assignment: Ray Tracing
Hidden Surface Elimination
Hidden Surface Elimination(Contd.)
Hidden Surface Elimination(Contd.)
Fractals
Fractals(Contd.)
Computer Animation
Animation(Contd.)
Animation(Contd.)
106102067
Computer Science and Engineering
Principles of Programming Languages
Prof. S. Arun Kumar
Video
IIT Delhi
Select
Introduction
Syntax
Grammars
Ambiguity
PLO:Syntax
Semantics
Syntactic Classes
Transition Systems
PL0 : Expressions
Binding
Environments
Declarations
Commands
Stores
Summary
Declarations and Commands
Blocks
Qualification
Pragmatics
Data
Structured Data
Sequences
Control
Non- Determinacy
Programming Languages
Programming Languages
Programming Languages
Data as Functions
Data and Fixpoints
Normal Forms
Programming Languages
Monomorphism
Polymorphism
Type Checking
Contexts
Abstracts
Procedures
Meanings
Parameters
The Future
106104120
Computer Science and Engineering
Parallel Algorithm
Prof. Phalguni Gupta
Video
IIT Kanpur
Select
Lecture-01.mp4
Lecture-02.mp4
Lecture-03.mp4
Lecture-04.mp4
Lecture-05.mp4
Lecture-06.mp4
Lecture-07.mp4
Lecture-08.mp4
Lecture-09.mp4
Lecture-10.mp4
Lecture-11.mp4
Lecture-12.mp4
Lecture-13.mp4
Lecture-14.mp4
Lecture-15.mp4
Lecture-16.mp4
Lecture-17.mp4
Lecture-18.mp4
Lecture-19.mp4
Lecture-20.mp4
Lecture-21.mp4
Lecture-22.mp4
Lecture-23.mp4
Lecture-24.mp4
Lecture-25.mp4
106102063
Computer Science and Engineering
Computer Graphics
Prof. Prem K Kalra
web
IIT- Guwahati
Select
contents
106102066
Computer Science and Engineering
Introduction to Problem Solving and Programming
Prof. S. Arun Kumar
web
IIT- Guwahati
Select
contents
106103068
Computer Science and Engineering
Computer Organization and Architecture
Prof. Jatindra Kumar Deka
web
IIT- Guwahati
Select
contents
106103070
Computer Science and Engineering
Theory of Automata and Formal Languages
Dr. Diganta Goswami
web
IIT- Guwahati
Select
contents
106104072
Computer Science and Engineering
Compiler Design
Prof. Sanjeev K Aggarwal
web
IIT- Guwahati
Select
contents
106104073
Computer Science and Engineering
Computer Organisation and Architecture
Prof. Bhaskaran Raman
web
IIT- Guwahati
Select
contents
106105078
Computer Science and Engineering
Artificial Intelligence
Prof. S. Sarkar,Prof. P. Mitra
web
IIT- Guwahati
Select
contents
106103069
Computer Science and Engineering
Data Structures and Program Methodology
Dr. S.V. Rao,Dr. Pradip K Das
web
IIT- Guwahati
Select
contents
106105080
Computer Science and Engineering
Computer Networks
Prof. Ajit Pal
web
IIT- Guwahati
Select
contents
106105086
Computer Science and Engineering
Real Time Systems
Prof. Rajib Mall
web
IIT- Guwahati
Select
contents
106105087
Computer Science and Engineering
Software Engineering
Prof. Rajib Mall
web
IIT- Guwahati
Select
contents
106108098
Computer Science and Engineering
Data Communications
Prof. H.S. Jamadagni
web
IIT- Guwahati
Select
contents
106108099
Computer Science and Engineering
Digital Systems
Prof. N.J. Rao
web
IIT- Guwahati
Select
contents
106108100
Computer Science and Engineering
Microprocessors and Microcontrollers
Prof. Krishna Kumar
web
IIT- Guwahati
Select
contents
106108101
Computer Science and Engineering
Operating Systems
Prof. P.C.P. Bhatt
web
IIT- Guwahati
Select
contents
106108103
Computer Science and Engineering
System Analysis and Design
Prof. V. Rajaraman
web
IIT- Guwahati
Select
contents
106103015
Computer Science and Engineering
Computational Number Theory & Cryptography
Dr. Pinaki Mitra
Web
IIT Guwahati
Select
Complexity of Computation & Complexity Classes
Encoding Scheme
Elementary Number-Theory
Euclid's Algorithm
Modular Arithmetic Groups
Subgroups
Primitive Roots
Generator Computation
Solving modular linear equations
Modular exponentiation
Chinese Remainder Theorem
Discrete Logarithm Problem
Quadratic Residues
Diffie Hellman key Exchange
Cryptosystems Based on Discrete Log
Public Key Cryptosystem & RSA
Choice of the Public Key
Attacks on RSA & Remedies
Rabin Cryptosystem
Pollard-Rho Method
Pollard Rho Analysis
Current state of the art
Large prime variant
Dixon's factorization method
Primality Testing
Fermat Primality Test
AKS PRIMALITY TEST
Elliptic Curve Cryptography
Zero Knowledge Proof
Elliptic Curves
Elgamal Digital Signature Scheme
Blind & Prony Signature
Short signature scheme I
Short signature scheme II
Video Data Cippers
Cryptographic Hash Function
Quadratic-Sieve Factoring
Elliptic Curves(contd.) and Finite Fields
ECDLP
106103016
Computer Science and Engineering
VLSI Design Verification and Test
Prof. Jatindra Kumar Deka,Dr. Santosh Biswas
Web
IIT Guwahati
Select
Introduction to Digital VLSI Design Flow
High Level Design Representation
Transformations for High Level Synthesis
Introduction to HLS: Scheduling, Allocation and Binding Problem
Scheduling Algorithms
Binding and Allocation Algorithms
Two level Boolean Logic Synthesis
Heuristic Minimization of Two-Level
Finite State Machine Synthesis
Multilevel Implementation
Introduction and construction
Ordered Binary Decision Diagram
Operations on Ordered Binary Decision Diagram
Ordered Binary Decision Diagram for Sequential Circuits
Introduction and Basic Operations on Temporal Logic
Syntax and Semantics of CLT
Equivalence between CTL Formulas
Verification Techniques
Model Checking Algorithm
Symbolic Model Checking
Introduction to Digital VLSI Testing
Functional and Structural Testing
Fault Equivalence
Fault Simulation
Testability Measures (SCOAP)
Introduction to Automatic Test Pattern Generation (ATPG) and ATPG Algebras
D-Algorithm
ATPG for Synchronous Sequential Circuits
Scan Chain based Sequential Circuit Testing
Built in Self Test
Memory Testing
106103115
Computer Science and Engineering
Human-Computer Interaction
Dr.Samit Bhattacharya,Pradeep P Yammiyavar
Web
IIT Guwahati
Select
Course objective and overview
Historical evolution of the field
Concept of usability - definition and elaboration
HCI and software engineering
GUI design and aesthetics
Prototyping techniques
Introduction to different types of models
Keystroke Level Model -I
Keystroke Level Model - II
(CMN)GOMS
Individual Models of Human Factors - I
Individual Models of Human Factors - II
A Case Study on Model-Based Design - I
A Case Study on Model-Based Design - II
Shneiderman�s eight golden rules
Norman�s seven principles
Norman�s model of interaction
Nielsen�s ten heuristics with example of its use
Heuristic evaluation
Contextual inquiry
Cognitive walkthrough
Introduction to Empirical Research - I
Introduction to Empirical Research - II
Analysis of Empirical Data
Empirical Research Case Study
Hierarchical task analysis (HTA)
Engineering Task Models and CTT
CTT Example
Introduction to formalism in dialog design, design using FSM
StateCharts
Petri Nets
Use of Formalism
Introduction
Model Human Processor - I
Model Human Processor - II
OOP- Introduction
OOM- Object Oriented Modeling of User Interface Design
Case Study 1- Multi-Key press Hindi Text Input Method on a Mobile Phone
Case Study 2 - GUI design for a mobile phone based Matrimonial application.during emergency
Case Study 3 - Employment Information System for unorganised construction workers on a Mobile Phone.
106103116
Computer Science and Engineering
Design Verification and Test of Digital VLSI Circuits
Prof. Jatindra Kumar Deka,Dr. Santosh Biswas
Video
IIT Guwahati
Select
Introduction to Digital VLSI Design Flow
High Level Design Representation
Transformations for High Level Synthesis
Introduction to HLS: Scheduling, Allocation and Binding Problem
Scheduling Algorithms-1
Scheduling Algorithms-2
Binding and Allocation Algorithms
Two level Boolean Logic Synthesis-1
Two level Boolean Logic Synthesis-2
Two level Boolean Logic Synthesis-3
Heuristic Minimization of Two-Level Circuits
Finite State Machine Synthesis
Multilevel Implementation
Introduction to formal methods for design verification
Temporal Logic: Introduction and Basic Operators
Syntax and Semantics of CTL
Syntax and Semantics of CTL � Continued
Equivalence between CTL Formulas
Introduction to Model Checking
Model Checking Algorithms I
Model Checking Algorithms II
Model Checking with Fairness
Binary Decision Diagram: Introduction and construction
Ordered Binary Decision Diagram
Operation on Ordered Binary Decision Diagram
Ordered Binary Decision Diagram for State Transition Systems
Symbolic Model Checking
Introduction to Digital VLSI Testing
Functional and Structural Testing
Fault Equivalence
Fault Simulation-1
Fault Simulation-2
Fault Simulation-3
Testability Measures (SCOAP)
Introduction to Automatic Test Pattern Generation (ATPG) and ATPG Algebras
D-Algorithm-1
D-Algorithm-2
ATPG for Synchronous Sequential Circuits
Scan Chain based Sequential Circuit Testing-1
Scan Chain based Sequential Circuit Testing-2
Built in Self Test-1
Built in Self Test-2
Memory Testing-1
Memory Testing-2
106104019
Computer Science and Engineering
Computer Algorithms - 2
Prof. Shashank K. Mehta
Video
IIT Kanpur
Select
Lecture-01-Graph_Basics
Lecture-02-Breadth_First_Search
Lecture-03-Dijkstra_Algo
Lecture-04-All Pair Shortest Path
Lecture-05-Matriods
Lecture-06-Minimum Spanning Tree
Lecture-07-Edmond's Matching Algo I
Lecture-08-Edmond's Matching Algo II
Lecture-09-Flow Networks
Lecture-10-Ford Fulkerson Method
Lecture-11-Edmond Karp Algo
Lecture-12-Matrix Inversion
Lecture-13-Matrix Decomposition
Lecture-14-Knuth Morris Pratt Algo
Lecture-15-Rabin Karp Algo
Lecture-16-NFA Simulation
Lecture-17-Integer-Polynomial OpsI
Lecture-18-Integer-Polynomial OpsII
Lecture-19-Integer-Polynomial OpsIII
Lecture-20-Chinese RemainderI
Lecture-21-Chinese RemainderII
Lecture-22-Chinese RemainderIII
Lecture-23-:Discrete Fourier TransformI
Lecture-24-Discrete Fourier TransformII
Lecture-25-Discrete Fourier TransformIII
Lecture-26-Schonhage Strassen Algo
Lecture-27-Linear ProgrammingI
Lecture-28-Linear ProgrammingII
Lecture-29-GeometryI
Lecture-30-GeometryII
Lecture-31-GeometryIII
Lecture-32-Approximation AlgoI
Lecture-33-Approximation AlgoII
Lecture-34-Approximation AlgoIII
Lecture-35-General: Dynamic Programming
106104021
Computer Science and Engineering
Indexing and Searching Techniques in Databases
Dr. Arnab Bhattacharya
Web
IIT Kanpur
Select
Basic Database Queries
Advanced Database Queries
Error Measures
Memory and Disk Accesses
Vector and Metric Spaces
Distance Functions
Earth Mover's Distance (EMD)
Earth Mover's Distance (EMD)
Static and Dynamic Hashing
Linear hashing
Locality Sensitive Hashing and Grid File
One-dimensional Orderings
Index structure
Quadtrees and k-d-trees
Range Trees and Interval Trees
Voronoi Diagrams and Tries
Disk-based Index Structures
General Framework
R-trees
R-trees
R-tree Variants
SS-trees,SR-trees,P-trees
X-tree
Analysis of High Dimensional Data
Analysis of Index Structures
Pyramid Technique and VA-files
M-trees
Dimensionality Reduction
Singular Value Decomposition (SVD)
Principal Component Analysis (PCA)
FastMap
Embedding
Embedding
DFT and DCT
Wavelets
V-optimal Histograms
Aggregation
Incremental Nearest Neighbor
Skyline Queries
Skyline Queries
Reading Material
106104024
Computer Science and Engineering
Parallel Computer Architecture
Dr. Mainak Chaudhuri
Web
IIT Kanpur
Select
Evolution of Processor Architecture
Moore's Law and Multi-cores
Evaluating Performance
Shared Memory Multiprocessors
Pipelining and Hazards
Instruction Issue Algorithms
Virtual Memory, TLB, and Caches
Cache Hierarchy and Memory-level Parallelism
MIPS R10000: A Case Study
Communication Architecture
Design Issues in Parallel Computers
Steps in Writing a Parallel Program
Parallelizing a Sequential Program
Load Balancing and Domain Decomposition
Locality and Communication Optimizations
Multiprocessor Organizations and Cache Coherence
Introduction to Cache Coherence Protocols
Introduction to Cache Coherence
Sequential Consistency and Cache Coherence Protocols
Performance of Coherence Protocols
Introduction to Synchronization
Scalable Locking Primitives
Barriers and Speculative Synchronization
Write Serialization in a Simple Design
Protocols for Split-transaction Buses
Case Studies
Scalable Snooping and AMD Hammer Protocol
Scalable Multiprocessors
Basics of Directory
SGI Origin 2000
Managing Directory Overhead
Protocol Occupancy and Directory Controllers
SCI Protocol
Sequential Consistency and Relaxed Models
Release Consistency and Delayed Consistency
Software Distributed Shared Memory Multiprocessors
Introduction to Routers
Routing Algorithms
Simultaneous Multithreading and Chip-multiprocessing
Case Studies: IBM Power4 and IBM Power5
Case Studies: Intel Montecito and Sun Niagara
106104025
Computer Science and Engineering
Program Optimization for Multi-core Architectures
Prof. Sanjeev K Aggarwal,Dr. Mainak Chaudhuri,Prof. Rajat Moona
Web
IIT Kanpur
Select
Evolution of Processor Architecture
Introduction to Multi-core Architecture
Virtual Memory and Caches
Cache Hierarchy and Memory-level Parallelism
Communication Architectures and Communication Costs
Preliminaries of Parallel Programming
Examples of Shared Memory and Message Passing Programming
Optimizing Shared Memory Performance
Performance Issues in Shared Memory
Introduction to Coherence
Introduction to Snoopy Coherence
Cache Coherence Protocols
Introduction to Atomic Primitives
Scalable Locks and Barriers
Memory Consistency Models and Case Studies of Multi-core
Case Studies of Multi-core
Multiprocessor Organizations and Cache Coherence
Sharing Patterns and Cache Coherence Protocols
What is Parallelization?
The �omp sections� Directive
Clause and Routines
Intel Compilers and Threading Tools
Intel Compilers and Threading Tool
Code Optimization
Supercomputing Applications
SIMD Architecture
Algorithm and Interval
Structural Analysis
Reaching Definition
Analysis
Data Dependence Analysis
Iteration
Data Dependence in Parallel Loops
Symbolic Analysis
Amdahl�s Law
Cycle Shrinking
Multi-core computing CPU Scheduling
Priority and Schedule
Multi-processor Scheduling
Multi-core Computing Synchronization
Solution to Critical Section Problem
Multi-core ComputingInter-process Communication
Multiprocessor Techniques
Cryptography and ECB
106104074
Computer Science and Engineering
Introduction to Problem Solving and Programming
Prof. D. Gupta
Video
IIT Kanpur
Select
Lecture 1
Lecture 2
Lecture 3
Lecture 4
Lecture 5
Lecture 6
Lecture 7
Lecture 8
Lecture 9
Lecture 10
Lecture 11
lecture 12
Lecture 13
Lecture 14
Lecture 15
Lecture 16
Lecture 17
Lecture 18
Lecture 19
Lecture 20
Lecture 21
Lecture 21
Lecture 23
Lecture 24
106104119
Computer Science and Engineering
Biometrics
Prof. Phalguni Gupta
Video
IIT Kanpur
Select
Lecture-01 Biometrics
Lecture-02 Biometrics
Lecture-03 Biometrics
Lecture-04 Biometrics
Lecture-05 Biometrics
Lecture-06 Biometrics
Lecture-07 Biometrics
Lecture-08 Biometrics
Lecture-09 Biometrics
Lecture-10 Biometrics
Lecture-11 Biometrics
Lecture-12 Biometrics
Lecture-13 Biometrics
Lecture-14 Biometrics
Lecture-15 Biometrics
Lecture-16 Biometrics
Lecture-17 Biometrics
Lecture-18 Biometrics
Lecture-19 Biometrics
Lecture-20 Biometrics
Lecture-21 Biometrics
Lecture-22 Biometrics
Lecture-23 Biometrics
Lecture-24 Biometrics
Lecture-25 Biometrics
Lecture-26 Biometrics
106105031
Computer Science and Engineering
Cryptography and Network Security
Dr. Debdeep Mukhopadhyay
Video
IIT Kharagpur
Select
Introduction
Overview on Modern Cryptography
Introduction to Number Theory
Probability and Information Theory
Classical Cryptosystems
Cryptanalysis of Classical Ciphers
Shannons Theory
Shannons Theory (Contd...1)
Shannons Theory (Contd...2)
Symmetric Key Ciphers
Block Cipher Standards (DES)
Block Cipher Standards (AES)
Block Cipher Standards (AES) (Contd.)
Linear Cryptanalysis
Differential Cryptanalysis
Few other Cryptanalytic Techniques
Overview on S-Box Design Principles
Modes of Operation of Block Ciphers
Stream Ciphers
Stream Ciphers (Contd...1)
Stream Ciphers (Contd...2)
Pseudorandomness
Cryptographic Hash Functions
Cryptographic Hash Functions (Contd...1)
Cryptographic Hash Functions (Contd...2)
Message Authentication Codes
More Number Theoretic Results
The RSA Cryptosystem
Primality Testing
Factoring Algorithms
Some Comments on the Security of RSA
Discrete Logarithm Problem (DLP)
The Diffie-Hellman Problem and Security of ElGamal Systems
An Introduction to Elliptic Curve Cryptography
Application of Elliptic Curves to Cryptography
Implementation of Elliptic Curve Cryptography
Secret Sharing Schemes
A Tutorial on Network Protocols
System Security
Firewalls and Intrusion Detection Systems
Side Channel Analysis of Cryptographic Implementations
106105032
Computer Science and Engineering
Digital Image Processing
Dr. G. Harit
Web
IIT Kharagpur
Select
Introduction
Introduction (Contd.)
Introduction (Contd.)
Spatial Domain Filtering
Spatial Domain Filtering (Contd)
Spatial Domain Filtering (Continued)
Spatial Domain Filtering (Contd.)
Spatial Domain Filtering (Contd.)
Filtering in the Frequency Domain
Filtering in the Frequency Domain(Contd.)
Filtering in the Frequency Domain (Contd.)
Filtering in the Frequency Domain (Contd.)
Filtering in the Frequency Domain (Contd.)
Filtering in the Frequency Domain (Contd.)
Image Restoration
Image Restoration (Contd.)
Image Restoration(Contd.)
Image Restoration (Contd.)
Image Restoration (Contd.)
Image Compression
Image Compression (Contd.)
Image Compression(Contd.)
Image Compression (Contd.)
Image Compression (Contd.)
Image Compression (Contd.)
Image Compression (Contd. )
Image Compression ( Contd.)
Wavelet based Image Compression
Wavelet based Image Compression (Contd.)
Wavelet based Image Compression (Contd.)
Morphological Image Processing
Morphological Image Processing (Contd.)
Morphological Image Processing (Contd. )
Morphological Image Processing ( Contd. )
Morphological Image Processing (Contd.)
Image Segmentation
Image Segmentation (Contd.)
Image Segmentation (Contd.)
Image Segmentation (Contd.)
Image Segmentation (Contd .)
Image Segmentation(Contd.)
106105034
Computer Science and Engineering
Low Power VLSI Circuits & Systems
Prof. Ajit Pal
Video
IIT Kharagpur
Select
Introduction & Course Outline
MOS Transistors - I
MOS Transistors - II
MOS Transistors - III
MOS Transistors - IV
MOS Inverters - I
MOS Inverters - II
MOS Inverters - III
MOS Inverters - IV
Static CMOS Circuits - I
Static CMOS Circuits -II
MOS Dynamic Circuits -I
MOS Dynamic Circuits -II
Pass Transistor Logic Circuits - I
Pass Transistor Logic Circuits - II
MOS Memories
Finite State Machines
Switching Power Dissipation
Tutorial - I
Dynamic Power Dissipation
Leakage Power Dissipation
Supply Voltage Scaling - I
Supply Voltage Scaling - II
Supply Voltage Scaling - III
Supply Voltage Scaling - IV
Tutorial - II
Minimizing Switched Capacitance - I
Minimizing Switched Capacitance - II
Minimizing Switched Capacitance - III
Minimizing Switched Capacitance - IV
Minimizing Switched Capacitance - V
Minimizing Leakage Power - I
Minimizing Leakage Power - II
Minimizing Leakage Power - III
Variation Tolerant Design
Adiabatic Logic Circuits
Battery-Driven System Design
CAD Tools for Low Power
Tutorial - III
Course Summary
106105036
Computer Science and Engineering
Real Time Systems
Prof. Rajib Mall
Video
IIT Kharagpur
Select
Introduction
Real - Time System Characteristics
Few Basic Issues
Modelling Timing Constraints
Modelling Timing Constraints (Contd.)
Basics of Real - Time Task Scheduling
Cyclic Scheduler
Event - Driven Scheduling
Rate Monotonic Scheduler
RMA Scheduling : Further Issues
Deadline Monotonic Scheduling and Other Issues
Few Issues in Use of RMA
Resource Sharing Among Real-Time Tasks
Highest Locker and Priority Ceiling Protocols
An Analysis of Priority Ceiling Protocol
Handling Task Dependencies
Real-Time Task Scheduling on Multiprocessors and Distributed Systems
Real-Time Task Scheduling on Multiprocessors and Distributed Systems (Contd.)
Clock Synchronization in Distributed Real-Time Systems
Internal Clock Synchronization in Presence of Byzantine Clocks
A Few Basic Issues in Real-Time Operating Systems
Tutorial - I
A Few Basic Issues in Real-Time Operating Systems (Contd.)
Unix and Windows as RTOS
Real - Time POSIX
Real - Time POSIX (Contd.)
Open Source and Commercial RTOS
Open Source and Commercial RTOS (Contd.)
Benchmarking Real - Time Computer & Operating Systems
Benchmarking Real - Time Computer & Operating Systems (Contd.)
Real - Time Communications
Few Basic Issues in Real - Time Communications
Review of Computer Networking
Real - Time Communication in a LAN
Real - Time Communication in a LAN (Contd.)
Performance of Two Real -Time Communication Protocols
Real - Time Communication over Packet Switched Networks
Real - Time Communication over Packet Switched Networks (Contd.)
Real - Time Communication over Packet Switched Networks (Contd.)
Real - Time Databases
106105077
Computer Science and Engineering
Artificial Intelligence
Prof. Anupam Basu,Prof. S. Sarkar
Video
IIT Kharagpur
Select
Introduction to Artificial Intelligence
Intelligent Agents
State Space Search
Uninformed Search
Informed Search
Informed Search - 2
Two Players Games - I
Two Players Games - II
Constraint Satisfaction Problems - 1
Constraint Satisfaction Problems 2
Knowledge Representation and Logic
Interface in Propositional Logic
First Order Logic
Reasoning Using First Order Logic
Resolution in FOPL
Rule Based System
Rule Based Systems II
Semantic Net
Reasoning in Semantic Net
Frames
Planning - 1
Planning - 2
Planning - 3
Planning - 4
Rule Based Expert System
Reasoning with Uncertainty - I
Reasoning with Uncertainty - II
Reasoning with Uncertainty III
Reasoning with Uncertainty - IV
Fuzzy Reasoning - I
Fuzzy Reasoning - II
Introduction to Learning - I
Introduction to Learning - II
Rule Induction and Decision Trees - I
Rule Induction and Decision Trees - II
Learning Using neural Networks - I
Learning Using Neural Networks - II
Probabilistic Learning
Natural Language Processing - I
Natural Language Processing II
106105079
Computer Science and Engineering
Artificial Intelligence(Prof.P.Dasgupta)
Prof. P. Dasgupta
Video
IIT Kharagpur
Select
Introduction to Artificial Intelligence
Problem Solving by Search
Searching with Costs
Informed State Space Search
Heuristic Search: A* and Beyond
Problem Reduction Search: AND/OR Graphs
Searching Game Trees
Knowledge Based Systems: Logic and Deduction
First Order Logic
Inference in First Order Logic
Resolution - Refutation Proofs
Resolution Refutation Proofs
Logic Programming : Prolog
Prolog Programming
Prolog: Exercising Control
Additional Topics
Introduction to Planning
Partial Order Planning
GraphPLAN and SATPlan
SATPlan
Reasoning under uncertainty
Bayesian Networks
Reasoning with Bayes Networks
Reasoning with Bayes networks (Contd.)
Reasoning under uncertainty: Issues
Learning : Decision Trees
Learning : Neural Networks
Back Propagation Learning
106105081
Computer Science and Engineering
Computer Networks
Prof. Sujoy Ghosh
Video
IIT Kharagpur
Select
Emergence of Networks & Reference Models
Network Topology
Physical Medium - I
Physical Medium - II
Multiplexing (Sharing a Medium)
Telecom Networks
Switches - I
Pocket Switches
SONET/SDH
Fiber Optic Components
Routing and Wavelength Assignment
Protection and Restoration
Multiple Access
Token Based Mac
Data Link Protocols
Error Control
Stop & Wait Protocol
Satellite Communication
Ethernet - CSMA/CD
Modern Ethernet
Local Internetworking
Cellular Networks
Wireless Network
ATM : Asynchronous Transfer Mode
ATM Signaling, Routing and LAN Emulation
Introduction to Routing
RIP - Distance Vector Routing
IP version 4
IP Version 6 & Mobile IP
UDP & Client Server
TCP
IP Multicasting
DHCP and ICMP
DNS & Directory
Congestion Control
QOS & Multimedia
Network Management
Security
FTP - SMTP
HTTP
106105082
Computer Science and Engineering
Data Communication
Prof. Ajit Pal
Video
IIT Kharagpur
Select
Introduction and Course Outline - Data Communication
Layered Architecture
Data and Signal
Transmission Impairments and Channel Capacity
Guided Transmission Media
Unguided Media
Transmission of Digital Signal - I
Transmission of Digital Signal - II
Transmission of Analog Signal - I
Transmission of Analog Signal - II
Multiplexing
Multiplexing
Multiplexing Applications - I
Multiplexing Applications - II
Interfacing to the Media
Error Detection and Correction
Flow and Error Control
Data Link Control
Switching Techniques Circuit Switching
Switching Techniques Packet Switching
Routing - I
Routing - II
Congestion Control
X.25 and Frame Relay
ATM
Medium Access Control - I
Medium Access Control - II
Medium Access Control - III
IEEE 802 LANs
High Speed LANs
Wireless LANs
Cellular Telephone Systems
Satellite Communications
Internet and Internetworking
TCP/IP - I
TCP/IP - II
Multimedia Networks
Audio and Video Compression
Multimedia Services
Secured Communication - I
Secured Communication - II
106105083
Computer Science and Engineering
Electronic Design Automation
Prof. Indranil Sengupta
Video
IIT Kharagpur
Select
Introduction
Verilog: Part - I
Verilog: Part - II
Verilog: Part - III
Verilog: Part - IV
Verilog: Part - V
Verilog: Part - VI
Synthesis: Part - I
Synthesis: Part - II
Synthesis: Part - III
Synthesis: Part - IV
Synthesis: Part - V
Synthesis: Part - VI
Synthesis: Part - VII
Backend Design: Part - I
Backend Design: Part - II
Backend Design: Part - III
Backend Design: Part - IV
Backend Design Part - V
Backend Design Part - VI
Backend Design Part - VII
Backend Design Part - VIII
Backend Design Part - IX
Backend Design Part - X
Backend Design Part - XI
Backend Design Part - XII
Backend Design Part - XIII
Backend Design Part - XIV
Backend Design Part - XV
Testing Part - I
Testing Part - II
Testing Part - III
Testing Part - IV
Testing Part - V
Testing Part - VI
106105084
Computer Science and Engineering
Internet Technology
Prof. Indranil Sengupta
Video
IIT Kharagpur
Select
Introduction To Internet
Review Of Network Technologies
TCP/IP - Part-1
TCP/IP-Part-II
TCP/IP-Part-III
IP Subnetting and Addressing
Internet Routing Protocol Part -I
Internet Routing Protocol- Part-II
Client Server Concepts DNS,Telnet,Ftp
Electronic Mail
World Wide Web Part-I
World Wide Web - Part-II
HTML-Part-I
HTML-Part-II
HTML-Part-III
Extensible Markup Language (XML)
Html Forms
Image Maps
CGI Scripts
Other Technologies
PERL Part-I
PERL - Part II
PERL-Part III
PERL-Part IV
Javascript -Part :I
Javascript Examples (Continued)
Using Cookies
Java Applets -Part:I
Java Applets - Part:2
Client-Server Programming In Java
Intranet, Extranet,Firewall
Basic Cryptographic Concepts Part - I
Basic Cryptographic Concepts Part - II
Basic Cryptographic Concepts Part - III
Electronic Commerce
Streaming Multimedia Applications
Internet Telephony
Search Engine And Web Crawler - Part-I
Search Engine And Web Crawlers: Part-II
Course Summary And Conclusion
106105085
Computer Science and Engineering
Programming and Data Structure
Dr. P.P.Chakraborty
Video
IIT Kharagpur
Select
Introduction
C Programming - I
C Programming - II
C Programming - III
Data Structuring: Case Study - I
Data Structuring: Case Study - II
Data Structuring: Case Study - III
Problem Decomposition By Recursion - I
Problem Decomposition By Recursion - II
Problem Decomposition By Recursion - III
Merge sort And Quick sort
Characters And Strings
Arrays: Addresses And Contents
Structures - I
Structures - II
Dynamic Allocation Part - I
Linked Lists - I
Complexity (Efficiency) of Algorithms
Asymptotic Growth Functions
Asymptotic Analysis of Algorithms
Data Structuring
Search Trees
Search Trees - II
Search Trees - III
2-3 Trees
Algorithm Design - I
Algorithm Design - II
Algorithm Design - III
Graphs - I
Graphs - II
Graphs - III
Conclusions
106106048
Computer Science and Engineering
Performance Evaluation of Computer Systems
Prof. Krishna Moorthy Sivalingam
Video
IIT Madras
Select
Introduction to performance evaluation of computer systems
How to avoid common mistakes
Selection of techniques and metrics
Case study: Selection of techniques and metrics
Random Variables and probability distributions
Probability distributions-I
Probability distributions-II
Probability distributions-III
Stochastic process
Markov Chain
Slotted Aloha protocol model and discrete-time birth death process
Continuous time Markov chain and queuing theory-I
Queuing theory � I (Continued)
Queuing theory-II
Queuing theory-III
Queuing theory-IV
Queuing theory-V
Queuing theory-VI
Queuing networks-I
Queuing networks-II
Slotted Aloha Markov model
Simulations-I
Simulations-II
Simulations-III
Operational laws-I
Operational laws-II
Open and closed queuing networks
Approximate MVA
Convolution algorithm-I
Convolution algorithm-II
Load-dependent service centers
Hierarchical decomposition
Balanced Job Bounds
Confidence interval for propotions and introduction to experimental design
2k factorial design
2k r factorial design and 2k-p fractional factorial design
Programming aspects of discrete-event simulations-I
Programming aspects of discrete-event simulations-II
Discrete-event simulations-III
PetriNets-I
PetriNets-II
PetriNets-III
106106049
Computer Science and Engineering
Theory of Automata, Formal Languages and Computation
Prof. Kamala Krithivasan
Video
IIT Madras
Select
GRAMMARS AND NATURAL LANGUAGE PROCESSING
GRAMMARS AND LANGUAGES GENERATED
GRAMMARS AND LANGUAGES GENERATED (Contd)
AMBIGUITY IN CFG
SIMPLICATION OF CFG
REMOVAL OF UNIT PRODUCTIONS , CHOMSKY NORMAL FORM FOR CFG
GREIBACH NORMAL FORM FOR CFG
FINAL STATE AUTOMATA
NON DETERMINISTIC FSA
NON DETERMINISTIC FSA (Contd)
NON DETERMINISTIC FSA WITH E(Epsilon)- MOVES
EQUIVALENCE BETWEEN FSA AND TYPE 3 GRAMMARS
REGULAR EXPRESSIONS , REGULAR EXPRESSIONS TO NFSA
DFSA TO REGULAR EXPRESSIONS
PROBLEMS AND SOLUTIONS-I
PUMPING LEMMAS FOR REGULAR SETS AND CFL
MYHILL - NERODE THEOREM
MINIMIZATION OF DFSA
FSA WITH OUTPUT MOORE AND MEALY MACHINES
PUSHDOWN AUTOMATA
PUSHDOWN AUTOMATA , EQUIVALENCE BETWEEN ACCEPTANCE BY EMPTY STORE AND ACCEPTANCE BY FINAL STATE
PUSHDOWN AUTOMATA CFG TO PDA
PUSHDOWN AUTOMATA PDA TO CFG
PROBLEMS AND SOLUTIONS-II
PROBLEMS AND SOLUTIONS - III
TURING MACHINES
TURING MACHINES (Contd)
TURING MACHINE AS ACCEPTOR , TECHNIQUES FOR TM CONSTRUCTION
GENERALIZED VERSIONS OF TURING MACHINES
TURING MACHINE AS A GENERATING DEVICE
RECURSIVE SETS , RECURSIVELY INNUMERABLE SETS , ENCODING OF TM , HALTING PROBLEM
PROBLEMS AND INSTANCES , UNIVERSAL TM , DECIDABILITY
RICE'S THEOREM , LINEAR BOUNDED AUTOMATA , PROPERTIES OF TM
POST'S CORRESPONDENCE PROBLEMS
POST'S CORRESPONDENCE PROBLEMS (Contd), TIME AND TAPE COMPLEXITY OT TM
NP - COMPLETE PROBLEMS , COOK'S THEOREM
NP - COMPLETE PROBLEMS (Contd)
REGULATED REWRITING
L - SYSTEMS
GRAMMAR SYSTEMS
DNA COMPUTING
MEMBRANE COMPUTING
106106088
Computer Science and Engineering
CAD for VLSI Design I
Prof. Shankar Balachandran,Prof. V. Kamakoti
Web
IIT Madras
Select
contents
106106089
Computer Science and Engineering
CAD for VLSI Design II
Prof. Shankar Balachandran,Prof. V. Kamakoti
Web
IIT Madras
Select
contents
106106090
Computer Science and Engineering
Computer Graphics
Prof. Sukhendu Das
Video
IIT Madras
Select
Introduction
CRT Display Devices
CRT Display Devices (Contd)
CRT Display Devices (Contd)
CRT Display Devices (Contd)
Transformations in 2D
Transformations in 2D (Contd)
Three Dimensional Graphics
Three Dimensional Graphics (Contd)
Three Dimensional Graphics (Contd)
Projection Transformations And Viewing Pipeline
3D Viewing - Projection Transformations And Viewing Pipeline
Scan Converting Lines, Circles And Ellipses
Scan Converting Lines, Circles And Ellipses (Contd)
Scan Converting Lines, Circles And Ellipses (Contd)
Scan Converting Lines, Circles And Ellipses (Contd)
Scan Converting Lines, Circles And Ellipses (Contd)
Polyfill- Scan Conversion Of A Polygon
Scan Conversion Of A Polygon (Contd)
Clipping - Lines And Polygons
Clipping Lines And Polygons
Clipping Lines
Solid Modelling
Solid Modelling
Solid Modelling- (Contd)
Visible Surface Detection
Visible Surface Detection- (Contd)
Visible Surface Detection- (Contd)
Visible Surface Detection- (Contd)
Visible Surface Detection- (Contd)
Visible Surface Detection (Contd)
Visible Surface Detection (Contd)
Illumination And Shading
Illumination And Shading (Contd)
Illumination And Shading (Contd)
Curve Representation
Curve Representation (Contd)
Curves And Surface Representation
Graphics Programming Using Open GL
Graphics Programming Using Open GL (Contd)
Advanced Topics: Anti Aliasing,Color,Soft Objects,Animation,Visual Effects,System Architectures
Digital Image Processing Image Compression-Jpeg-Enhancements
Digital Image Processing (Contd)
106106091
Computer Science and Engineering
Computer Networks
Prof. Hema A Murthy
Web
IIT Madras
Select
contents
106106092
Computer Science and Engineering
Computer Organization
Prof. S. Raman
Video
IIT Madras
Select
Introduction To Computing
Introduction To System : Software
Introduction To System : Hardware
Processor Activities
Processor As a State Machine
Data Path Architecture
Data Path Controller : Micro Programmed
State Machine Design
Controller Design: Microprogrammed and Hardwired
Controller Design (Contd)
Typical Micro Instructions
Addressing Modes
Problem Exercise
Problem Exercise
Introduction to memory system
CPU - Memory Interaction
Cache Organization
Cache Organization
Virtual Memory
Virtual Memory
Performance Calculation
Segmentation
Address Translation and Protection
Programmed I/O
Interrupt Driven I/O
DMA : Direct Memory Access
Device Service Routines
Evolution Of I/O
I/O Devices
I/O Devices - Contd
Buses
Buses Contd
Conclusion
106106093
Computer Science and Engineering
Database Design
Prof. D. Janaki Ram,Dr. S. Srinath
Video
IIT Madras
Select
Introduction to Database Management System
Conceptual Designs
Conceptual Designs
Relational Model
Relational Model
Structured Query Language
Structured Query Language II
ER Model to Relational Mapping
Functional Dependencies and Normal Form
ER Model to Relational Model Mapping
Storage Structures
Indexing Techniques Single Level
Indexing Techniques Multi-Level
Constraints and Triggers
Query Processing and Optimization
Query Processing and Optimization II
Query Processing and Optimization - III
Transaction Processing Concepts
Transaction Processing and Database Manager
Foundation for Concurrency Control
Concurrency Control Part - I
Concurrency Control Part - 2
Concurrency Control Part - 3
Concurrency Control Part - 4
Distributed Transaction Models
Basic 2-Phase and 3-phase commit protocol
Concurrency Control for Distributed Transaction
Introduction to Transaction Recovery
Recovery Mechanisms II
Recovery Mechanisms III
Introduction to Data Warehousing and OLAP
Introduction to Data Warehousing and OLAP
Case Study : MYSQL
Case Study ORACLE and Microsoft Access
Data Mining and Knowledge Discovery
Data Mining and Knowledge Discovery Part II
Object Oriented Databases
Object Oriented Databases II
XML - Introductory Concepts
XML Advanced Concepts
XML Databases
Case Study - Part One Database Design
Case Study - Part 2 Database Design
106106094
Computer Science and Engineering
Discrete Mathematical Structures
Prof. Kamala Krithivasan
Video
IIT Madras
Select
Propositional Logic
Propositional Logic (Contd.)
Predicates & Quantifiers
Predicates & Quantifiers (Contd.)
Logical Inference
Resolution Principles & Application to PROLOG
Methods of Proof
Normal Forms
Proving programs correct (Contd.)
Sets
Induction
Set Operations On Strings
Relations
Graphs
Graphs (Continued)
Trees
Trees And Graphs
Special Properties Of Relations
Closure Of Relations
Closure Properties Of Relations
Order Relations
Order Relations And Equivalence Relations
Equivalence Relations And Partitions
Functions
Functions (Continued)
Functions (Continued)
Pigeonhole Principle
Permutations And Combinations
Permutations And Combinations (Continued)
Generating Functions
Generating Functions (Continued)
Recurrence Relations
Recurrence Relations (Continued)
Recurrence Relations (Continued)
Algebras
Algebras (Continued)
Algebras (Continued)
Finite State Automaton
Finite State Automaton (Continued)
Lattices
106106095
Computer Science and Engineering
Introduction to Database Systems and Design
Prof. P.Sreenivasa Kumar
Web
IIT Madras
Select
contents
106106097
Computer Science and Engineering
Principles of Communication
Prof. Hema A Murthy
Web
IIT Madras
Select
contents
106108051
Computer Science and Engineering
Combinatorics
Dr. L. Sunil Chandran
Video
IISc Bangalore
Select
Pigeon hole principle - (Part 1)
Pigeon hole principle - (Part 2)
Pigeon hole principle - (Part 3)
Pigeon hole principle - (Part 4)
Elementary concepts and basic counting principles
Elementary concepts; Binomial theorem; Bijective proofs - Part (1)
Bijective proofs � Part (2)
Bijective proofs - Part (3); Properties of binomial coefficients; Combinatorial identities - Part (1)
Combinatorial identities - Part (2); Permutations of multisets � Part (1)
Permutations of multisets � Part (2)
Multinomial Theorem, Combinations of Multisets � Part (1)
Combinations of Multisets - Part (2)
Combinations of Multisets � Part (3), Bounds for binomial coefficients
Sterling�s Formula, Generalization of Binomial coefficients - Part (1)
Generalization of Binomial coefficients - Part (2)
Generalization of Binomial coefficients - Part (3); Double counting - Part (1)
Double counting - Part (2)
Hall�s Theorem for regular bipartite graphs; Inclusion exclusion principle - Part (1)
Inclusion exclusion principle - Part (2)
Inclusion exclusion principle - Part (3)
Inclusion exclusion principle - Part (4)
Inclusion exclusion principle - Part (5)
Recurrence Relations - Part (1)
Recurrence Relations - Part (2)
Recurrence Relations - Part (3)
Recurrence Relations - Part (4)
Recurrence Relations - Part (5)
Generating functions - Part (1)
Generating functions - Part (2)
Solving recurrence relations using generating functions - Part (1)
Solving recurrence relations using generating functions - Part (2)
Exponential generating functions - Part (1)
Exponential generating functions - Part (2), Partition Number - Part (1)
Partition Number - Part (2)
Partition Number - Part (3)
Partition Number - Part (4); Catalan Numbers - Part (1)
Catalans Numbers - Part (2)
Catalan Numbers - Part (3), Sterling numbers of the 2nd kind
Difference Sequences
Sterling Numbers
Summary
106108052
Computer Science and Engineering
Compiler Design
Prof. Y.N. Srikanth
Video
IISc Bangalore
Select
An Overview of a Compiler - Part 1
An Overview of a Compiler - Part 2 and Run-Time Environments - Part 1
An Overview of a Compiler Part 2 and Run-Time Environments - Part 1
Run-Time Environments - Part 2
Run-Time Environments - Part 3 and Local Optimizations - Part 1
Run-Time Environments Part 3 and Local Optimizations - Part 1
Local Optimizations - Part 2 and Code Generation Part 1
Local Optimizations - Part 2 and Code Generation - Part 1
Code Generation - Part 1
Code Generation - Part 2
Code Generation - Part 3 and Global Register Allocation - Part 1
Code Generation - Part 3 and Global Register Allocation Part 1
Global Register Allocation - Part 2
Global Register Allocation - Part 3 and Implementing Object-Oriented Languages - Part 1
Global Register Allocation - Part 3 and Implementing Object-Oriented Languages Part 1
Implementing Object-Oriented Languages - Part 2 and Introduction to Machine-Independent Optimizations - Part 1
Implementing Object-Oriented Languages - Part 2 and Introduction to Machine-Independent Optimizations Part 1
Introduction to Machine-Independent Optimizations - Part 2 and Data-Flow Analysis - Part 1
Introduction to Machine-Independent Optimizations - Part 2 and Data-Flow Analysis Part 1
Data-Flow Analysis - Part 2
Data-Flow Analysis - Part 3 and Control-Flow Analysis - Part 1
Data-Flow Analysis - Part 3 and Control-Flow Analysis Part 1
Control-Flow Analysis - Part 2
Machine-Independent Optimizations - Part 1
Machine-Independent Optimizations - Part 2
Machine-Independent Optimizations - Part 3 and Data-Flow Analysis: Theoretical Foundation - Part 1
Machine-Independent Optimizations - Part 3 and Data-Flow Analysis: Theoretical Foundation Part 1
Data-Flow Analysis: Theoretical Foundation - Part 2 and Partial Redundancy Elimination - Part 1
Data-Flow Analysis: Theoretical Foundation - Part 2 and Partial Redundancy Elimination Part 1
Partial Redundancy Elimination - Part 2
The Static Single Assignment Form: Construction and Application to Program Optimizations - Part 1
The Static Single Assignment Form: Construction and Application to Program Optimizations - Part 2
The Static Single Assignment Form: Construction and Application to Program Optimizations - Part 3
Automatic Parallelization - Part 1
Automatic Parallelization - Part 2
Automatic Parallelization - Part 3
Automatic Parallelization - Part 4
Instruction Scheduling - Part 1
Instruction Scheduling - Part 2
Instruction Scheduling - Part 3
Software Pipelining
Energy-Aware Software Systems - Part 1
Energy-Aware Software Systems - Part 2
Energy-Aware Software Systems - Part 3
Energy-Aware Software Systems - Part 4
Just-In-Time Compilation and Optimizations for .NET CLR
Garbage Collection
Interprocedural Data-Flow Analysis
Worst Case Execution Time - Part 1
Worst Case Execution Time - Part 2
106108054
Computer Science and Engineering
Graph Theory
Dr. L. Sunil Chandran
Video
IISc Bangalore
Select
Introduction: Vertex cover and independent set
Matchings: Konig�s theorem and Hall�s theorem
More on Hall�s theorem and some applications
Tutte�s theorem on existence of a perfect matching
More on Tutte�s theorem
More on Matchings
Dominating set, path cover
Gallai � Millgram theorem, Dilworth�s theorem
Connectivity: 2-connected and 3- connected graphs
Menger�s theorem
More on connectivity: k- linkedness
Minors, topological minors and more on k- linkedness
Vertex coloring: Brooks theorem
More on vertex coloring
Edge coloring: Vizing�s theorem
Proof of Vizing�s theorem, Introduction to planarity
5- coloring planar graphs, Kuratowsky�s theorem
Proof of Kuratowsky�s theorem, List coloring
List chromatic index
Adjacency polynomial of a graph and combinatorial Nullstellensatz
Chromatic polynomial, k - critical graphs
Gallai-Roy theorem, Acyclic coloring, Hadwiger�s conjecture
Perfect graphs: Examples
Interval graphs, chordal graphs
Proof of weak perfect graph theorem (WPGT)
Second proof of WPGT, Some non-perfect graph classes
More special classes of graphs
Boxicity,Sphericity, Hamiltonian circuits
More on Hamiltonicity: Chvatal�s theorem
Chvatal�s theorem, toughness, Hamiltonicity and 4-color conjecture
Network flows: Max flow mincut theorem
More on network flows: Circulations
Circulations and tensions
More on circulations and tensions, flow number and Tutte�s flow conjectures
Random graphs and probabilistic method: Preliminaries
Probabilistic method: Markov�s inequality, Ramsey number
Probabilistic method: Graphs of high girth and high chromatic number
Probabilistic method: Second moment method, Lovasz local lemma
Graph minors and Hadwiger�s conjecture
More on graph minors, tree decompositions
106108055
Computer Science and Engineering
High Performance Computing
Prof. Mathew Jacob
Video
IISc Bangalore
Select
Programs and Data
Data Representation
Registers and Memory
Instructions, Addressing Modes
A RISC Instruction Set
A RISC Instruction Set (contd)
Function Call and Return
Function Call and Return (contd)
Instruction Execution
Instruction Execution (contd)
Software organization
System Calls
Virtual memory
Virtual memory (contd)
Virtual Memory (cont)
Process
Process scheduling
Process lifetime
Interprocess communication
Concurrent programming
Pipelining
Pipeline hazards
Pipeline hazards (contd)
Pipeline hazards (contd.)
Cache memory
Memory hierarchy
Cache operation
Cache operation (contd)
Cache aware programming
Cache aware programming (contd)
More on cache
Measuring time
Program Profiling
Secondary storage
Files and disks
Directories
Protection and Performance
Parallel architecture
Cache coherence
MPI programming
MPI programming (contd)
106108056
Computer Science and Engineering
Numerical Optimization
Dr. Shirish K. Shevade
Video
IISc Bangalore
Select
Introduction
Mathematical Background
Mathematical Background (contd)
One Dimensional Optimization - Optimality Conditions
One Dimensional Optimization (contd)
Convex Sets
Convex Sets (contd)
Convex Functions
Convex Functions (contd)
Multi Dimensional Optimization - Optimality Conditions, Conceptual Algorithm
Line Search Techniques
Global Convergence Theorem
Steepest Descent Method
Classical Newton Method
Trust Region and Quasi-Newton Methods
Quasi-Newton Methods - Rank One Correction, DFP Method
i) Quasi-Newton Methods - Broyden Family ii) Coordinate Descent Method
Conjugate Directions
Conjugate Gradient Method
Constrained Optimization - Local and Global Solutions, Conceptual Algorithm
Feasible and Descent Directions
First Order KKT Conditions
Constraint Qualifications
Convex Programming Problem
Second Order KKT Conditions
Second Order KKT Conditions (contd)
Weak and Strong Duality
Geometric Interpretation
Lagrangian Saddle Point and Wolfe Dual
Linear Programming Problem
Geometric Solution
Basic Feasible Solution
Optimality Conditions and Simplex Tableau
Simplex Algorithm and Two-Phase Method
Duality in Linear Programming
Interior Point Methods - Affine Scaling Method
Karmarkar\'s Method
Lagrange Methods, Active Set Method
Active Set Method (contd)
Barrier and Penalty Methods, Augmented Lagrangian Method and Cutting Plane Method
Summary
106108057
Computer Science and Engineering
Pattern Recognition
Prof. M. Narasimha Murty,Prof. V. Susheela Devi
Web
IISc Bangalore
Select
Background
Introduction
Statistical Pattern Recognition
Different Representation Schemes
Tree-Based Representations
Dissimilarity Measures
Distance Between Pattern Collections
Fisher’s Discriminant
Principal Components as Features
Branch and Bound Schemes
Sequential Feature Selection
Nearest Neighbour Classifier
Soft Nearest Neighbour Classifiers
Efficient Nearest Neighbour Classifier
Ordered Partitions
Minimal Distance Classifier
Condensed Nearest Neighbour Classifier
Modified Condensed Nearest Neighbour Classifier
Bayes Classifier
Naive Bayes Classifier
Bayesian Belief Networks
Introduction to Decision Trees
Construction of Decision Trees
Axis-Parallel and Oblique Decision Trees
Learning Decision Trees
Introduction to Discriminant Functions
Characterization of the Decision Boundary
Learning the Discriminant Function
Introduction to Support Vector Machines
Training Support Vector Machines
What is Clustering?
Representation of Patterns and Clusters
Clustering Process
Clustering Algorithms
Incremental Clustering
Divide-and-Conquer Clustering
Introduction to Combining Classifiers
AdaBoost for Classification
Schemes for Combining Classifiers
Combination of Homogeneous Classifiers
Document Processing
Document Classification and Retrieval
106108102
Computer Science and Engineering
System Analysis and Design
Prof. V. Rajaraman
Video
IISc Bangalore
Select
Lecture 1
Lecture 2
Lecture 3
Lecture 4
Lecture 5
Lecture 6
Lecture 7
Lecture 8
Lecture 9
Lecture 10
Lecture 11
Lecture 12
Lecture 13
Lecture 14
Lecture 15
Lecture 16
Lecture 17
Lecture 18
Lecture 19
Lecture 20
Lecture 21
Lecture 22
Lecture 23
Lecture 24
Lecture 25
Lecture 26
Lecture 27
Lecture 28
Lecture 29
Lecture 30
Lecture 31
Lecture 32
Lecture 33
Lecture 34
Lecture 35
Lecture 36
Lecture 37
Lecture 38
Lecture 39
Lecture 40