Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,022 results
Scenario: In the first activity, we assume that there are two cars that simultaneously search for parking space. The cars can move ...
27,089 views
8 years ago
Error Detection; Parity Check. Lecture 16 of ITS323 Introduction to Data Communications. Course material via: ...
1,938 views
11 years ago
In this episode of Crust of Rust, we go over subtyping and variance — a niche part of Rust that most people don't have to think ...
72,473 views
4 years ago
General approaches for dealing with errors in communications, e.g. error detection, ARQ, FEC. Detailed examples of error ...
2,723 views
10 years ago
In this Crust of Rust episode, we implement some common sorting algorithms in Rust. This episode doesn't aim to explain any ...
67,226 views
5 years ago
Most of the time, fixing a vulnerablility from a live patch is straight forward and local in nature: adding an additional bounds check, ...
259 views
7 years ago
A recording of Silvia Butti's talk at the CSP seminar online on Wed 28 Oct 2020. See https://csp-seminar.org/talks/silvia-butti/ for ...
368 views
Recommendation Engines using Machine Learning, and JRuby by: Matt Kirk Ever wonder how netflix can predict what rating you ...
89 views
Ronald Garcia, Alison M. Clark, Éric Tanter.
928 views
9 years ago
Slides PDF: http://15445.courses.cs.cmu.edu/fall2017/slides/19-timestampordering.pdf Notes PDF: ...
2,836 views
VTU e-Shikshana Programme.
401 views
LICENSE === This video is licensed under CC BY. This license enables reusers to distribute, remix, adapt, and build upon the ...
370 views
4 weeks ago
Subscribe here: http://bit.ly/2rCsYZD Check out upcoming events: http://prdct.school/LI_events Read speaker's bio: ...
663 views
3 years ago
The Ego is a device that serves to maintain a false self as a result of trauma (rejection of authentic self). Here, we talk about how ...
8,070 views
Sections: 0:00 Introduction 0:58 Import the data set (The Child Aggression Study) and create a data frame 1:24 How to write ...
256 views
C++ Template Metaprogramming is a well known technique in which clever definitions of templates can force the C++ compiler to ...
7,971 views
12 years ago
Carina C. Zona https://2017.northbaypython.org 2FA Mind 2-Factor Authentication (2FA) empowers people to better protect their ...
434 views
Reading: There is no officially-assigned reading, but you should read racket's match documentation, it will save you a lot of time ...
2,459 views
Let's write out back propagation by hand with the math in all its brilliance. ABOUT ME ⭕ Subscribe: ...
2,164 views
7 months ago
Check out the app I use to create these videos, developed by our very own community: https://github.com/Gaming32/ArrayV Are ...
272,126 views
1 year ago