ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

19 results

Matthew Weathers
The unsolved math problem which could be worth a billion dollars.

No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.

5:59
The unsolved math problem which could be worth a billion dollars.

2,510,129 views

6 years ago

Mark Newman
Calculating Twiddle Factors in the FFT

Twiddle Factors play a crucial role in the Fast Fourier Transform (FFT) algorithm by helping to combine and manipulate the ...

0:55
Calculating Twiddle Factors in the FFT

10,827 views

2 years ago

iter
How HOTP and TOTP work

TOTP and HOTP are algorithms for generating 2-factor authentication codes. Let's take a look at how these work, starting with the ...

4:20
How HOTP and TOTP work

29,699 views

5 years ago

Adam Gaweda, Dr. Sensei
AVL Trees - Trinode Restructuring

And then finally, as rules of removal kind of come into play, then I get to access myself since Y is the only available node left, ...

7:27
AVL Trees - Trinode Restructuring

10,251 views

8 years ago

Mark Newman
What is Convolution

Convolution plays a pivotal role in signal processing, allowing us to extract valuable information and uncover hidden patterns in ...

0:55
What is Convolution

62,750 views

2 years ago

Missing Semester
Lecture 7: Debugging and Profiling (2020)

You can find the lecture notes and exercises for this lecture at https://missing.csail.mit.edu/2020/debugging-profiling/ Help us ...

54:14
Lecture 7: Debugging and Profiling (2020)

100,881 views

5 years ago

Missing Semester
Lecture 2: Shell Tools and Scripting (2020)

You can find the lecture notes and exercises for this lecture at https://missing.csail.mit.edu/2020/shell-tools/ Help us caption ...

48:56
Lecture 2: Shell Tools and Scripting (2020)

340,841 views

5 years ago

Dr. Pavel Vlašánek
I Speedran Computer Science: Hacking, Math & The Matrix

We built the Matrix in a console, cracked 90s game security, and rendered 3D worlds. This isn't just a 2025 recap; it's a speedrun ...

22:26
I Speedran Computer Science: Hacking, Math & The Matrix

2,704 views

7 days ago

Jeremy Howard
Lesson 19: Deep Learning Foundations to Stable Diffusion

All lesson resources are available at http://course.fast.ai.) In this lesson, Jeremy introduces Dropout, a technique for improving ...

1:30:03
Lesson 19: Deep Learning Foundations to Stable Diffusion

11,569 views

2 years ago

YAWL User Group
Cancel Tasks in YAWL Workflows

How can YAWL cancel tasks dynamically during a workflow? This video explains how to use cancellation regions in YAWL to ...

7:25
Cancel Tasks in YAWL Workflows

480 views

2 years ago

Neo4j
12 Tips & Tricks on How To Use the Arrows Tool

Due to popular demand, I'm showing some tips and tricks on how to use the Arrows modeling tool to create graphs for Neo4j.

7:26
12 Tips & Tricks on How To Use the Arrows Tool

6,392 views

6 years ago

weecology
SQL Databases For dplyr Users: Selecting Columns Using SELECT
4:31
SQL Databases For dplyr Users: Selecting Columns Using SELECT

1,503 views

5 years ago

FastNotFamous
How To Work Out Where To Brake, Go-Karting | Super Skill Saturday

Grab my Go-Karting Fundamentals Checklist completely FREE: (Link in Bio) ✓ - Come hang out and talk about all things ...

0:34
How To Work Out Where To Brake, Go-Karting | Super Skill Saturday

8,009 views

1 year ago

Spoken-Tutorial IIT Bombay
Getting started with lists - Tamil

Getting started with lists empty filled lists heterogenity accessing len append elements del (+ remove)

11:18
Getting started with lists - Tamil

38 views

11 years ago

MechanicaLEi
What is an Entity-relationship model? Entities | Relationships | Generalization | Specialization

Welcome back MechanicaLEi, did you know that an ER or Entity-Relationship model defines a data or information structure which ...

2:25
What is an Entity-relationship model? Entities | Relationships | Generalization | Specialization

1,456 views

6 years ago

nptelhrd
Mod-01 Lec-35 Execution trace, another example (unary to binary conversion).

Theory of Computation by Prof. Somenath Biswas,Computer Science and Engineering, IIT Kanpur.For more details on NPTEL visit ...

43:19
Mod-01 Lec-35 Execution trace, another example (unary to binary conversion).

14,763 views

11 years ago

COMPUTER & EXCEL SOLUTION
Printing Address of Array in C Language@COMPUTEREXCELSOLUTION

Join this channel to get access to perks: https://www.youtube.com/channel/UC4C_tfy6WLDxzVVO3y6YinA/join This is my ...

2:33
Printing Address of Array in C Language@COMPUTEREXCELSOLUTION

469 views

3 years ago

COMPUTER & EXCEL SOLUTION
How to use flatten Formula in Google sheet@COMPUTEREXCELSOLUTION

This is my Technology Related information.Like "O" Level,"CCC", "Webdesign", "C" language, "C++" "Php","Java","Java Script", ...

1:34
How to use flatten Formula in Google sheet@COMPUTEREXCELSOLUTION

533 views

4 years ago

Sloti
Quelle est la Pire Entreprise du Monde ?

viens insta c'est cool : https://www.instagram.com/sl0ti/ pour toutes demandes commerciales : slotitv@gmail.com.

13:44
Quelle est la Pire Entreprise du Monde ?

9,359 views

1 year ago