No. | Subject | Course | Topic | User Category | Telecast Date / Day | Telecast Time | Repeat Time |
---|---|---|---|---|---|---|---|
1 | Computer and Network Performance Analysis using Queuing System | Introducing Queuing Systems | 08:00:00 - 08:35:22 || 07:54:55 - 08:00:00 (2025-05-01) || | ||||
2 | Computer and Network Performance Analysis using Queuing System | Memoryless Distributions | 08:35:22 - 08:52:47 || | ||||
3 | Using Python | Google Work ? | 08:52:47 - 10:03:03 || | ||||
4 | 10:03:03 - 10:27:44 || | ||||||
5 | Machine I | 10:27:44 - 10:52:34 || | |||||
6 | Algorithms | Completeness of set cover, Weak and Strong NP - completeness | 10:52:34 - 11:29:05 || | ||||
7 | Algorithms | Reduction | 11:29:05 - 11:58:07 || | ||||
8 | Language Processing | 11:58:07 - 12:22:17 || | |||||
9 | Language Processing | for W,V and U | 12:22:17 - 12:34:07 || | ||||
10 | Language Processing | vanishing gradient | 12:34:07 - 12:49:39 || | ||||
11 | Distributed Systems | 12:49:39 - 13:50:33 || | |||||
12 | Part II | Perfectly-Secure Byzantine Agreement: Illustration | 13:50:33 - 14:25:50 || | ||||
13 | Part II | Perfectly-Secure Byzantine Agreement: Analysis Part I | 14:25:50 - 15:00:29 || | ||||
14 | Architecture Storage & Interconnects | in Network On Chip | 15:00:29 - 16:00:18 || | ||||
15 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 16:00:18 - 16:22:34 || | ||||
16 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 16:22:34 - 17:09:32 || | ||||
17 | Industry 4.0 and Industrial Internet of Things | Iot: Introduction | 17:09:32 - 17:53:16 || | ||||
18 | Networks | Computing - Part 1 | 17:53:16 - 18:30:50 || | ||||
19 | Networks | Lookup: Trie Based Data Structures - Part 2 | 18:30:50 - 18:55:47 || | ||||
20 | An Introduction | 18:55:47 - 19:50:57 || | |||||
21 | Systems | 19:50:57 - 21:05:29 || | |||||
22 | Security | Computer Security - Part 1 | 21:05:29 - 21:31:33 || | ||||
23 | Security | Computer Security - Part 2 | 21:31:33 - 22:02:44 || | ||||
24 | 22:02:44 - 22:56:28 || | ||||||
25 | Problem Formulation | 22:56:28 - 23:35:46 || | |||||
26 | Course Plan | 23:35:46 - 23:58:02 || | |||||
27 | Artificial Intelligence | Climbing Part-3 | 23:58:02 - 00:16:36 || | ||||
28 | Artificial Intelligence | Drawbacks of Hill Climbing Part-4 | 00:16:36 - 00:36:18 (2025-05-01) || | ||||
29 | Artificial Intelligence | Hill Climbing With random Walk & Random Restart Part-5 | 00:36:18 - 00:56:42 (2025-05-01) || | ||||
30 | Computing 2 | 00:56:42 - 02:00:30 (2025-05-01) || | |||||
31 | of Speech Processing | Estimation | 02:00:30 - 02:59:07 (2025-05-01) || | ||||
32 | Machine Learning (Tamil) | Orthogonal Projection | 02:59:07 - 03:40:42 (2025-05-01) || | ||||
33 | Machine Learning (Tamil) | Classification | 03:40:42 - 04:08:16 (2025-05-01) || | ||||
34 | Algorithms using Java | Data Structures | 04:08:16 - 04:55:52 (2025-05-01) || | ||||
35 | SystemsDesign Verification and Test | Systems | 04:55:52 - 05:56:56 (2025-05-01) || | ||||
36 | Competitive Programming | Programming with Frog 1_Part B | 05:56:56 - 06:17:06 (2025-05-01) || | ||||
37 | Competitive Programming | Programming with Dice Combinations | 06:17:06 - 06:57:42 (2025-05-01) || | ||||
38 | Image Processing and Computer Vision | Color Processing- I(Part-II) | 06:57:42 - 07:54:55 (2025-05-01) || | ||||
39 | Artificial Intelligence | Simulated Anealing Part-6 | 08:00:00 - 08:21:08 || 07:49:53 - 08:00:00 (2025-05-02) || | ||||
40 | Artificial Intelligence | Beam Search and Genetic Algorithms Part-7 | 08:21:08 - 08:54:07 || | ||||
41 | Theory | 08:54:07 - 09:20:31 || | |||||
42 | Theory | 09:20:31 - 10:00:55 || | |||||
43 | of Speech Processing | Hidden Markov Models | 10:00:55 - 11:00:32 || | ||||
44 | Machine Learning (Tamil) | Cross-Validation | 11:00:32 - 11:17:48 || | ||||
45 | Machine Learning (Tamil) | efficiency of KNN | 11:17:48 - 11:42:27 || | ||||
46 | Machine Learning (Tamil) | 11:42:27 - 11:56:27 || | |||||
47 | Algorithms using Java | Tree Data Structures | 11:56:27 - 12:30:32 || | ||||
48 | Algorithms using Java | 12:30:32 - 12:56:31 || | |||||
49 | SystemsDesign Verification and Test | for Fault tolerant Embedded Systems - 1 | 12:56:31 - 14:00:10 || | ||||
50 | Computing for HumanComputer Interaction | and history | 14:00:10 - 14:32:52 || | ||||
51 | Computing for HumanComputer Interaction | challenges | 14:32:52 - 14:54:14 || | ||||
52 | Image Processing and Computer Vision | (Part-I) | 14:54:14 - 15:51:51 || | ||||
53 | Computer and Network Performance Analysis using Queuing System | Introducing Queuing Systems | 15:51:51 - 16:27:13 || | ||||
54 | Computer and Network Performance Analysis using Queuing System | Memoryless Distributions | 16:27:13 - 16:44:38 || | ||||
55 | Using Python | Google Work ? | 16:44:38 - 17:54:54 || | ||||
56 | 17:54:54 - 18:19:35 || | ||||||
57 | Machine I | 18:19:35 - 18:44:25 || | |||||
58 | Algorithms | Completeness of set cover, Weak and Strong NP - completeness | 18:44:25 - 19:20:56 || | ||||
59 | Algorithms | Reduction | 19:20:56 - 19:49:58 || | ||||
60 | Language Processing | 19:49:58 - 20:14:08 || | |||||
61 | Language Processing | for W,V and U | 20:14:08 - 20:25:58 || | ||||
62 | Language Processing | vanishing gradient | 20:25:58 - 20:41:30 || | ||||
63 | Distributed Systems | 20:41:30 - 21:42:24 || | |||||
64 | Part II | Perfectly-Secure Byzantine Agreement: Illustration | 21:42:24 - 22:17:41 || | ||||
65 | Part II | Perfectly-Secure Byzantine Agreement: Analysis Part I | 22:17:41 - 22:52:20 || | ||||
66 | Architecture Storage & Interconnects | in Network On Chip | 22:52:20 - 23:52:09 || | ||||
67 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 23:52:09 - 00:14:25 || | ||||
68 | Physical Systems | Detection and Mitigation in CPS(Contd.) | 00:14:25 - 01:01:23 (2025-05-02) || | ||||
69 | Industry 4.0 and Industrial Internet of Things | Iot: Introduction | 01:01:23 - 01:45:07 (2025-05-02) || | ||||
70 | Networks | Computing - Part 1 | 01:45:07 - 02:22:41 (2025-05-02) || | ||||
71 | Networks | Lookup: Trie Based Data Structures - Part 2 | 02:22:41 - 02:47:38 (2025-05-02) || | ||||
72 | An Introduction | 02:47:38 - 03:42:48 (2025-05-02) || | |||||
73 | Systems | 03:42:48 - 04:57:20 (2025-05-02) || | |||||
74 | Security | Computer Security - Part 1 | 04:57:20 - 05:23:24 (2025-05-02) || | ||||
75 | Security | Computer Security - Part 2 | 05:23:24 - 05:54:35 (2025-05-02) || | ||||
76 | 05:54:35 - 06:48:19 (2025-05-02) || | ||||||
77 | Problem Formulation | 06:48:19 - 07:27:37 (2025-05-02) || | |||||
78 | Course Plan | 07:27:37 - 07:49:53 (2025-05-02) || | |||||
79 | Modern C++ | 08:00:00 - 08:31:56 || 07:51:13 - 08:00:00 (2025-05-03) || | |||||
80 | Modern C++ | Recap of C/1 | 08:31:56 - 08:59:59 || | ||||
81 | Industry 4.0 and Industrial Internet of Things | Iot: Industrial Internet Systems | 08:59:59 - 09:22:34 || | ||||
82 | Industry 4.0 and Industrial Internet of Things | Iot: Industrial Sensing & Actuation | 09:22:34 - 10:03:08 || | ||||
83 | Networks | Lookup: Optimized Trie Based Data Structures - Part 1 | 10:03:08 - 10:27:57 || | ||||
84 | Networks | Lookup: Optimized Trie Based Data Structures - Part 2 | 10:27:57 - 11:10:32 || | ||||
85 | An Introduction | 11:10:32 - 12:00:31 || | |||||
86 | Systems | 12:00:31 - 13:12:24 || | |||||
87 | Security | Part 1 | 13:12:24 - 13:58:48 || | ||||
88 | (OEMS) | 13:58:48 - 15:01:39 || | |||||
89 | Scheduling | 15:01:39 - 15:59:04 || | |||||
90 | Artificial Intelligence | Simulated Anealing Part-6 | 15:59:04 - 16:20:12 || | ||||
91 | Artificial Intelligence | Beam Search and Genetic Algorithms Part-7 | 16:20:12 - 16:53:11 || | ||||
92 | Theory | 16:53:11 - 17:19:35 || | |||||
93 | Theory | 17:19:35 - 17:59:59 || | |||||
94 | of Speech Processing | Hidden Markov Models | 17:59:59 - 18:59:36 || | ||||
95 | Machine Learning (Tamil) | Cross-Validation | 18:59:36 - 19:16:52 || | ||||
96 | Machine Learning (Tamil) | efficiency of KNN | 19:16:52 - 19:41:31 || | ||||
97 | Machine Learning (Tamil) | 19:41:31 - 19:55:31 || | |||||
98 | Algorithms using Java | Tree Data Structures | 19:55:31 - 20:29:36 || | ||||
99 | Algorithms using Java | 20:29:36 - 20:55:35 || | |||||
100 | SystemsDesign Verification and Test | for Fault tolerant Embedded Systems - 1 | 20:55:35 - 21:59:14 || | ||||
101 | Computing for HumanComputer Interaction | and history | 21:59:14 - 22:31:56 || | ||||
102 | Computing for HumanComputer Interaction | challenges | 22:31:56 - 22:53:18 || | ||||
103 | Image Processing and Computer Vision | (Part-I) | 22:53:18 - 23:50:55 || | ||||
104 | Computer and Network Performance Analysis using Queuing System | Introducing Queuing Systems | 23:50:55 - 00:26:17 || | ||||
105 | Computer and Network Performance Analysis using Queuing System | Memoryless Distributions | 00:26:17 - 00:43:42 (2025-05-03) || | ||||
106 | Using Python | Google Work ? | 00:43:42 - 01:53:58 (2025-05-03) || | ||||
107 | 01:53:58 - 02:18:39 (2025-05-03) || | ||||||
108 | Machine I | 02:18:39 - 02:43:29 (2025-05-03) || | |||||
109 | Algorithms | Completeness of set cover, Weak and Strong NP - completeness | 02:43:29 - 03:20:00 (2025-05-03) || | ||||
110 | Algorithms | Reduction | 03:20:00 - 03:49:02 (2025-05-03) || | ||||
111 | Language Processing | 03:49:02 - 04:13:12 (2025-05-03) || | |||||
112 | Language Processing | for W,V and U | 04:13:12 - 04:25:02 (2025-05-03) || | ||||
113 | Language Processing | vanishing gradient | 04:25:02 - 04:40:34 (2025-05-03) || | ||||
114 | Distributed Systems | 04:40:34 - 05:41:28 (2025-05-03) || | |||||
115 | Part II | Perfectly-Secure Byzantine Agreement: Illustration | 05:41:28 - 06:16:45 (2025-05-03) || | ||||
116 | Part II | Perfectly-Secure Byzantine Agreement: Analysis Part I | 06:16:45 - 06:51:24 (2025-05-03) || | ||||
117 | Architecture Storage & Interconnects | in Network On Chip | 06:51:24 - 07:51:13 (2025-05-03) || | ||||
118 | Computer and Network Performance Analysis using Queuing System | Operational Laws | 08:00:00 - 08:34:45 || 07:40:15 - 08:00:00 (2025-05-04) || | ||||
119 | Computer and Network Performance Analysis using Queuing System | Asymptotic Analysis of G/G/1, G/G/1/K queues | 08:34:45 - 09:03:12 || | ||||
120 | Using Python | Google Work ? | 09:03:12 - 09:56:44 || | ||||
121 | Machine II | 09:56:44 - 10:20:19 || | |||||
122 | Machine III | 10:20:19 - 11:01:34 || | |||||
123 | Algorithms | Randomized Approximation Algorithm | 11:01:34 - 12:00:22 || | ||||
124 | Language Processing | 12:00:22 - 12:19:15 || | |||||
125 | Language Processing | 12:19:15 - 12:41:30 || | |||||
126 | Language Processing | Historical Approaches to Machine Translation | 12:41:30 - 13:02:51 || | ||||
127 | Distributed Systems | for Virtual Machine Migration | 13:02:51 - 13:47:10 || | ||||
128 | Part II | Perfectly-Secure Byzantine Agreement: Analysis Part II | 13:47:10 - 14:18:54 || | ||||
129 | Part II | for Perfectly-Secure Byzantine Agreement: Part I | 14:18:54 - 14:54:29 || | ||||
130 | Architecture Storage & Interconnects | Router Micro-Architecture | 14:54:29 - 15:36:31 || | ||||
131 | Architecture Storage & Interconnects | Optimisation | 15:36:31 - 15:49:20 || | ||||
132 | Modern C++ | 15:49:20 - 16:21:16 || | |||||
133 | Modern C++ | Recap of C/1 | 16:21:16 - 16:49:19 || | ||||
134 | Industry 4.0 and Industrial Internet of Things | Iot: Industrial Internet Systems | 16:49:19 - 17:11:54 || | ||||
135 | Industry 4.0 and Industrial Internet of Things | Iot: Industrial Sensing & Actuation | 17:11:54 - 17:52:28 || | ||||
136 | Networks | Lookup: Optimized Trie Based Data Structures - Part 1 | 17:52:28 - 18:17:17 || | ||||
137 | Networks | Lookup: Optimized Trie Based Data Structures - Part 2 | 18:17:17 - 18:59:52 || | ||||
138 | An Introduction | 18:59:52 - 19:49:51 || | |||||
139 | Systems | 19:49:51 - 21:01:44 || | |||||
140 | Security | Part 1 | 21:01:44 - 21:48:08 || | ||||
141 | (OEMS) | 21:48:08 - 22:50:59 || | |||||
142 | Scheduling | 22:50:59 - 23:48:24 || | |||||
143 | Artificial Intelligence | Simulated Anealing Part-6 | 23:48:24 - 00:09:32 || | ||||
144 | Artificial Intelligence | Beam Search and Genetic Algorithms Part-7 | 00:09:32 - 00:42:31 (2025-05-04) || | ||||
145 | Theory | 00:42:31 - 01:08:55 (2025-05-04) || | |||||
146 | Theory | 01:08:55 - 01:49:19 (2025-05-04) || | |||||
147 | of Speech Processing | Hidden Markov Models | 01:49:19 - 02:48:56 (2025-05-04) || | ||||
148 | Machine Learning (Tamil) | Cross-Validation | 02:48:56 - 03:06:12 (2025-05-04) || | ||||
149 | Machine Learning (Tamil) | efficiency of KNN | 03:06:12 - 03:30:51 (2025-05-04) || | ||||
150 | Machine Learning (Tamil) | 03:30:51 - 03:44:51 (2025-05-04) || | |||||
151 | Algorithms using Java | Tree Data Structures | 03:44:51 - 04:18:56 (2025-05-04) || | ||||
152 | Algorithms using Java | 04:18:56 - 04:44:55 (2025-05-04) || | |||||
153 | SystemsDesign Verification and Test | for Fault tolerant Embedded Systems - 1 | 04:44:55 - 05:48:34 (2025-05-04) || | ||||
154 | Computing for HumanComputer Interaction | and history | 05:48:34 - 06:21:16 (2025-05-04) || | ||||
155 | Computing for HumanComputer Interaction | challenges | 06:21:16 - 06:42:38 (2025-05-04) || | ||||
156 | Image Processing and Computer Vision | (Part-I) | 06:42:38 - 07:40:15 (2025-05-04) || | ||||
157 | Artificial Intelligence | Minimax Algorithm for two player games | 08:00:00 - 08:20:08 || 07:42:49 - 08:00:00 (2025-05-06) || | ||||
158 | Artificial Intelligence | An Example of Minimax Search | 08:20:08 - 08:37:39 || | ||||
159 | Artificial Intelligence | Alpha Beta Pruning | 08:37:39 - 08:54:44 || | ||||
160 | Theory | 08:54:44 - 09:21:10 || | |||||
161 | Theory | 09:21:10 - 09:49:18 || | |||||
162 | of Speech Processing | 09:49:18 - 10:50:17 || | |||||
163 | Machine Learning (Tamil) | Information Gain | 10:50:17 - 11:29:30 || | ||||
164 | Machine Learning (Tamil) | Discriminative models | 11:29:30 - 11:49:06 || | ||||
165 | Algorithms using Java | Binary Search Tree | 11:49:06 - 12:10:49 || | ||||
166 | Algorithms using Java | Binary Search Tree | 12:10:49 - 12:47:32 || | ||||
167 | SystemsDesign Verification and Test | for Fault tolerant Embedded Systems - 2 | 12:47:32 - 14:04:04 || | ||||
168 | Computing for HumanComputer Interaction | trends | 14:04:04 - 14:56:39 || | ||||
169 | Image Processing and Computer Vision | (Part-II) | 14:56:39 - 15:54:25 || | ||||
170 | Computer and Network Performance Analysis using Queuing System | Operational Laws | 15:54:25 - 16:29:10 || | ||||
171 | Computer and Network Performance Analysis using Queuing System | Asymptotic Analysis of G/G/1, G/G/1/K queues | 16:29:10 - 16:57:37 || | ||||
172 | Using Python | Google Work ? | 16:57:37 - 17:51:09 || | ||||
173 | Machine II | 17:51:09 - 18:14:44 || | |||||
174 | Machine III | 18:14:44 - 18:55:59 || | |||||
175 | Algorithms | Randomized Approximation Algorithm | 18:55:59 - 19:54:47 || | ||||
176 | Language Processing | 19:54:47 - 20:13:40 || | |||||
177 | Language Processing | 20:13:40 - 20:35:55 || | |||||
178 | Language Processing | Historical Approaches to Machine Translation | 20:35:55 - 20:57:16 || | ||||
179 | Distributed Systems | for Virtual Machine Migration | 20:57:16 - 21:41:35 || | ||||
180 | Part II | Perfectly-Secure Byzantine Agreement: Analysis Part II | 21:41:35 - 22:13:19 || | ||||
181 | Part II | for Perfectly-Secure Byzantine Agreement: Part I | 22:13:19 - 22:48:54 || | ||||
182 | Architecture Storage & Interconnects | Router Micro-Architecture | 22:48:54 - 23:30:56 || | ||||
183 | Architecture Storage & Interconnects | Optimisation | 23:30:56 - 23:43:45 || | ||||
184 | Modern C++ | 23:43:45 - 00:15:41 || | |||||
185 | Modern C++ | Recap of C/1 | 00:15:41 - 00:43:44 (2025-05-06) || | ||||
186 | Industry 4.0 and Industrial Internet of Things | Iot: Industrial Internet Systems | 00:43:44 - 01:06:19 (2025-05-06) || | ||||
187 | Industry 4.0 and Industrial Internet of Things | Iot: Industrial Sensing & Actuation | 01:06:19 - 01:46:53 (2025-05-06) || | ||||
188 | Networks | Lookup: Optimized Trie Based Data Structures - Part 1 | 01:46:53 - 02:11:42 (2025-05-06) || | ||||
189 | Networks | Lookup: Optimized Trie Based Data Structures - Part 2 | 02:11:42 - 02:54:17 (2025-05-06) || | ||||
190 | An Introduction | 02:54:17 - 03:44:16 (2025-05-06) || | |||||
191 | Systems | 03:44:16 - 04:56:09 (2025-05-06) || | |||||
192 | Security | Part 1 | 04:56:09 - 05:42:33 (2025-05-06) || | ||||
193 | (OEMS) | 05:42:33 - 06:45:24 (2025-05-06) || | |||||
194 | Scheduling | 06:45:24 - 07:42:49 (2025-05-06) || | |||||
195 | Modern C++ | Recap of C/2 | 08:00:00 - 08:35:51 || 07:41:57 - 08:00:00 (2025-05-07) || | ||||
196 | Modern C++ | 08:35:51 - 09:09:14 || | |||||
197 | Industry 4.0 and Industrial Internet of Things | Iot: Industrial Processes - Part 1 | 09:09:14 - 10:05:39 || | ||||
198 | Networks | Classification - Part 1 | 10:05:39 - 10:35:22 || | ||||
199 | Networks | Classification - Part 2 | 10:35:22 - 11:00:58 || | ||||
200 | An Introduction | 11:00:58 - 11:49:42 || | |||||
201 | Systems | 11:49:42 - 12:56:53 || | |||||
202 | Security | Part 2 | 12:56:53 - 13:28:41 || | ||||
203 | Security | and Phishing Attacks - Part 1 | 13:28:41 - 14:02:57 || | ||||
204 | Bitonic-Sort-Merge Sort (BSMS) | 14:02:57 - 15:00:18 || | |||||
205 | Scheduling | 15:00:18 - 15:58:12 || | |||||
206 | Artificial Intelligence | Minimax Algorithm for two player games | 15:58:12 - 16:18:20 || | ||||
207 | Artificial Intelligence | An Example of Minimax Search | 16:18:20 - 16:35:51 || | ||||
208 | Artificial Intelligence | Alpha Beta Pruning | 16:35:51 - 16:52:56 || | ||||
209 | Theory | 16:52:56 - 17:19:22 || | |||||
210 | Theory | 17:19:22 - 17:47:30 || | |||||
211 | of Speech Processing | 17:47:30 - 18:48:29 || | |||||
212 | Machine Learning (Tamil) | Information Gain | 18:48:29 - 19:27:42 || | ||||
213 | Machine Learning (Tamil) | Discriminative models | 19:27:42 - 19:47:18 || | ||||
214 | Algorithms using Java | Binary Search Tree | 19:47:18 - 20:09:01 || | ||||
215 | Algorithms using Java | Binary Search Tree | 20:09:01 - 20:45:44 || | ||||
216 | SystemsDesign Verification and Test | for Fault tolerant Embedded Systems - 2 | 20:45:44 - 22:02:16 || | ||||
217 | Computing for HumanComputer Interaction | trends | 22:02:16 - 22:54:51 || | ||||
218 | Image Processing and Computer Vision | (Part-II) | 22:54:51 - 23:52:37 || | ||||
219 | Computer and Network Performance Analysis using Queuing System | Operational Laws | 23:52:37 - 00:27:22 || | ||||
220 | Computer and Network Performance Analysis using Queuing System | Asymptotic Analysis of G/G/1, G/G/1/K queues | 00:27:22 - 00:55:49 (2025-05-07) || | ||||
221 | Using Python | Google Work ? | 00:55:49 - 01:49:21 (2025-05-07) || | ||||
222 | Machine II | 01:49:21 - 02:12:56 (2025-05-07) || | |||||
223 | Machine III | 02:12:56 - 02:54:11 (2025-05-07) || | |||||
224 | Algorithms | Randomized Approximation Algorithm | 02:54:11 - 03:52:59 (2025-05-07) || | ||||
225 | Language Processing | 03:52:59 - 04:11:52 (2025-05-07) || | |||||
226 | Language Processing | 04:11:52 - 04:34:07 (2025-05-07) || | |||||
227 | Language Processing | Historical Approaches to Machine Translation | 04:34:07 - 04:55:28 (2025-05-07) || | ||||
228 | Distributed Systems | for Virtual Machine Migration | 04:55:28 - 05:39:47 (2025-05-07) || | ||||
229 | Part II | Perfectly-Secure Byzantine Agreement: Analysis Part II | 05:39:47 - 06:11:31 (2025-05-07) || | ||||
230 | Part II | for Perfectly-Secure Byzantine Agreement: Part I | 06:11:31 - 06:47:06 (2025-05-07) || | ||||
231 | Architecture Storage & Interconnects | Router Micro-Architecture | 06:47:06 - 07:29:08 (2025-05-07) || | ||||
232 | Architecture Storage & Interconnects | Optimisation | 07:29:08 - 07:41:57 (2025-05-07) || |
Swayam Prabha copyright © 2024 INFLIBNET Centre. All rights reserved.