ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

56 results

Loke Gustafsson
Oatlog e-graph engine thesis presentation

Sorry about the quality. This is courtesy of a friend's impromptu Zoom screen recording that I was not even aware of at the time of ...

52:41
Oatlog e-graph engine thesis presentation

46 views

6 months ago

NPTEL IIT Bombay
Week 1: Lecture 1: Introduction to optimization

Introduction to optimization.

31:14
Week 1: Lecture 1: Introduction to optimization

4,109 views

1 year ago

NPTEL IIT Bombay
Lecture 11C: Examples of Linear Programming

Week 6: Lecture 11C: Examples of Linear Programming.

26:37
Lecture 11C: Examples of Linear Programming

791 views

4 years ago

New Mexico EPSCoR
Exploiting Symmetry in Large-scale Optimization and Control

Date: Wednesday, March 24, 2021 Time: 12:00 - 1:00PM MDT Presenter: Dr. Claus Danielson, Assistant Professor, UNM ...

1:00:15
Exploiting Symmetry in Large-scale Optimization and Control

222 views

4 years ago

BIOE103
04042014 a fullVideo

I don't start talking about linear algebra right now. But, but, all you need to know is OD45 is not where it came. You can switch to ...

45:59
04042014 a fullVideo

71 views

11 years ago

MIT Center for Transportation & Logistics
SC0x Live Problems from Practice

Join Alex Rothkopf and SC0x problems from practice.

59:45
SC0x Live Problems from Practice

1,420 views

Streamed 7 years ago

wikipedia tts
Global optimization | Wikipedia audio article

This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Global_optimization 00:02:52 1 General theory ...

22:50
Global optimization | Wikipedia audio article

8 views

6 years ago

wikipedia tts
Global optimisation | Wikipedia audio article

This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Global_optimization 00:02:44 1 General theory ...

21:43
Global optimisation | Wikipedia audio article

5 views

6 years ago

Remy Sharp
7. Making things with Maths

Steven Wittens' talk for Full Frontal 2012 For years the web has been happy playing in the sandbox that was the browser, locked ...

40:33
7. Making things with Maths

37,300 views

13 years ago

OpenSecurityTraining2
Vulns1001 06 IntegerOverflow 🥷CVE-2020-0796👻🪱 03 Exploit

View the full free MOOC at https://ost2.fyi/Vulns1001. This class is for C/C++ developers learning secure development, and ...

39:50
Vulns1001 06 IntegerOverflow 🥷CVE-2020-0796👻🪱 03 Exploit

837 views

2 years ago

Martin Laskowski
Unbox the Data! .. Build a LEGO® Opt App: PART 03

We walk through our LEGO data from Rebrickable.com and - using GraphXR for exploratory data analysis (EDA) - we translate its ...

43:03
Unbox the Data! .. Build a LEGO® Opt App: PART 03

402 views

1 year ago

OpenSecurityTraining2
Vulns1001 03 Heap Buffer Overflow 🥷CVE-2020-0917🦾 03 Exploit

View the full free MOOC at https://ost2.fyi/Vulns1001. This class is for C/C++ developers learning secure development, and ...

25:12
Vulns1001 03 Heap Buffer Overflow 🥷CVE-2020-0917🦾 03 Exploit

1,352 views

2 years ago

R Consortium
Session 5B - Mathematical Models

Fogliato, Riccardo; Shrotriya, Shamindra; Kuchibhotla, Arun Kumar maars: Tidy Inference under misspecified statistical models in ...

1:04:59
Session 5B - Mathematical Models

428 views

4 years ago

kleines Filmröllchen
But how can it fit so much music? (The FLAC Codec #2 – Lossless Audio Compression)

UPDATE: Martijn van Beurden, one of the two authors of the IETF FLAC spec, has left a comment with some corrections and ...

28:43
But how can it fit so much music? (The FLAC Codec #2 – Lossless Audio Compression)

9,162 views

3 years ago

NPTEL IIT Bombay
Week 6 : Lecture 29 : Tutorial Session - 5: Implementation of Bisection Method

Lecture 29 : Tutorial Session - 5: Implementation of Bisection Method.

36:27
Week 6 : Lecture 29 : Tutorial Session - 5: Implementation of Bisection Method

2,409 views

2 years ago

DEFCONConference
Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 Conference

Shor's Algorithm for factoring integer numbers is the big threat to cryptography (RSA/ECC) as it reduces the complexity from ...

48:42
Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 Conference

14,401 views

6 years ago

Dave Ackley
NMCS4ALL: Random number generators

Twenty minute introduction to randomness and pseudorandom number generators, with demos. The New Mexico CS for All ...

20:10
NMCS4ALL: Random number generators

75,795 views

12 years ago

Nils Berglund
Tutorial: A bit of number theory - Continued fractions and the Farey tree

This talk discusses some aspects of number theory that play a role in dynamical systems (among other things). We will see the ...

1:00:05
Tutorial: A bit of number theory - Continued fractions and the Farey tree

1,122 views

2 years ago

OpenSecurityTraining2
Vulns1001 03 Heap Buffer Overflow CVE-2021-42739🎆 02 ACID Flow

View the full free MOOC at https://ost2.fyi/Vulns1001. This class is for C/C++ developers learning secure development, and ...

26:35
Vulns1001 03 Heap Buffer Overflow CVE-2021-42739🎆 02 ACID Flow

894 views

2 years ago

Jeremy Howard
Intro to Machine Learning: Lesson 4

Today we do a deep dive in to feature importance, including ways to make your importance plots more informative, how to use ...

1:40:05
Intro to Machine Learning: Lesson 4

48,024 views

7 years ago