CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY - CLASSICAL CRYPTOGRAPHY
CRYPTOGRAPHY AND NETWORK SECURITY - SUBSTITUTION CIPHER AND CRYPTANALYSIS
CRYPTOGRAPHY AND NETWORK SECURITY - TRANSPOSITION CIPHER AND CRYPTANALYSIS
CRYPTOGRAPHY AND NETWORK SECURITY - NUMBER THEORY
CRYPTOGRAPHY AND NETWORK SECURITY - MODULAR ARITHMETIC
CRYPTOGRAPHY AND NETWORK SECURITY - MODULAR EXPONENTIATION
CRYPTOGRAPHY AND NETWORK SECURITY - ALGEBRAIC STRUCTURES-1
CRYPTOGRAPHY AND NETWORK SECURITY - ALGEBRAIC STRUCTURES-2
CRYPTOGRAPHY AND NETWORK SECURITY - PRIME EULER FERMAT THEOREM
CRYPTOGRAPHY AND NETWORK SECURITY – CHINESE REMINDER THEOREM (CRT)
CRYPTOGRAPHY AND NETWORK SECURITY - EXPONENTIATION AND LOGARITHM
CRYPTOGRAPHY AND NETWORK SECURITY - MODERN CRYPTOGRAPHY
CRYPTOGRAPHY AND NETWORK SECURITY - STREAM AND BLOCK CIPHER
CRYPTOGRAPHY AND NETWORK SECURITY - RC4
CRYPTOGRAPHY AND NETWORK SECURITY - SIMPLIFIED DES
CRYPTOGRAPHY AND NETWORK SECURITY - DATA ENCRYPTION STANDARD
CRYPTOGRAPHY AND NETWORK SECURITY - MODES OF OPERATIONS
CRYPTOGRAPHY AND NETWORK SECURITY - ADVANCED ENCRYPTION STANDARD-1
CRYPTOGRAPHY AND NETWORK SECURITY - ADVANCED ENCRYPTION STANDARD-II
CRYPTOGRAPHY AND NETWORK SECURITY - PUBLIC KEY CRYPTOGRAPHY
CRYPTOGRAPHY AND NETWORK SECURITY – RSA CRYPTO SYSTEM
CRYPTOGRAPHY AND NETWORK SECURITY – ELGAMAL CRYPTO SYSTEM
CRYPTOGRAPHY AND NETWORK SECURITY – ELLIPTIC CURVE CRYPTO SYSTEM
CRYPTOGRAPHY AND NETWORK SECURITY - KEY MANAGEMENT
CRYPTOGRAPHY AND NETWORK SECURITY - DEFFIE HELLMAN KEY EXCHANGE
CRYPTOGRAPHY AND NETWORK SECURITY - SECURITY MODELS
CRYPTOGRAPHY AND NETWORK SECURITY – HASHING TECHNIQUES
CRYPTOGRAPHY AND NETWORK SECURITY – HASH AND MAC ALGORITHMS (MAC)
CRYPTOGRAPHY AND NETWORK SECURITY - DIGITAL SIGNATURE
CRYPTOGRAPHY AND NETWORK SECURITY – KERBEROS
CRYPTOGRAPHY AND NETWORK SECURITY – PUBLIC KEY INFRASTRUCTURE (PKI)
CRYPTOGRAPHY AND NETWORK SECURITY – ELECTRONIC EMAIL SECURITY PGP
CRYPTOGRAPHY AND NETWORK SECURITY - SECURITY ATTACKS
CRYPTOGRAPHY AND NETWORK SECURITY - IP SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY - WEB SECURITY SSL AND TLS
CRYPTOGRAPHY AND NETWORK SECURITY – FIREWALLS
CRYPTOGRAPHY AND NETWORK SECURITY - NEED FOR SECURITY IN NETWORKS
CRYPTOGRAPHY AND NETWORK SECURITY – WIRELESS LAN STANDARDS
CRYPTOGRAPHY AND NETWORK SECURITY - WIRELESS LAN SECURITY
OPERATING SYSTEM
OPERATING SYSTEM: INTRODUCTIONOPERATING SYSTEM: COMPONENTS OF OS
OPERATING SYSTEM: SYSTEM CALLS AND OS STRUCTURES
OPERATING SYSTEM: PROCESS CONCEPTS
OPERATING SYSTEM: INTER PROCESS COMMUNICATION
OPERATING SYSTEM: COMMUNICATION IN CLIENT-SERVER SYSTEMS, THREADS
OPERATING SYSTEM: CPU SCHEDULING-I
OPERATING SYSTEM: CPU SCHEDULING-II
OPERATING SYSTEM: CPU SCHEDULING-III
OPERATING SYSTEM: PROCESS SYNCHRONIZATION
OPERATING SYSTEM: PROCESS SYNCHRONIZATION – SOLUTIONS-I
OPERATING SYSTEM: PROCESS SYNCHRONIZATION – SOLUTIONS-II
OPERATING SYSTEM: PROCESS SYNCHRONIZATION – SOLUTIONS-III
OPERATING SYSTEM: PROCESS SYNCHRONIZATION – SEMAPHORES
OPERATING SYSTEM: PROCESS SYNCHRONIZATION – CLASSIC PROBLEMS
OPERATING SYSTEM: DEADLOCKS – INTRODUCTION
OPERATING SYSTEM: DEADLOCKS – PREVENTION, AVOIDANCE
OPERATING SYSTEM: DEADLOCKS – DEADLOCKS – AVOIDANCE
OPERATING SYSTEM: DEADLOCKS – DETECTION AND RECOVERY
OPERATING SYSTEM: MEMORY MANAGEMENT
OPERATING SYSTEM: MEMORY MANAGEMENT – PAGING I
OPERATING SYSTEM: MEMORY MANAGEMENT – PAGING II
OPERATING SYSTEM: MEMORY MANAGEMENT – PAGING III
OPERATING SYSTEM: MEMORY MANAGEMENT – SEGMENTATION
OPERATING SYSTEM: VIRTUAL MEMORY
OPERATING SYSTEM: PAGE REPLACEMENT ALGORITHMS-I
OPERATING SYSTEM: PAGE REPLACEMENT ALGORITHMS-II
OPERATING SYSTEM: PAGE REPLACEMENT ALGORITHMS-III
OPERATING SYSTEM: ALLOCATION OF FRAMES, THRASHING
OPERATING SYSTEM: VIRTUAL MEMORY – WINDOWS NT, SOLARIS 2
OPERATING SYSTEM: VIRTUAL MEMORY – FILE-SYSTEM INTERFACE – I
OPERATING SYSTEM: VIRTUAL MEMORY – FILE-SYSTEM INTERFACE – II
OPERATING SYSTEM: VIRTUAL MEMORY – FILE-SYSTEM INTERFACE – III
OPERATING SYSTEM: VIRTUAL MEMORY – IMPLEMENTATION OF FILE SYSTEMS
OPERATING SYSTEM: VIRTUAL MEMORY – FILE ALLOCATION AND FREE SPACE MANAGEMENT
OPERATING SYSTEM: VIRTUAL MEMORY – DISK SCHEDULING ALGORITHMS
OPERATING SYSTEM: VIRTUAL MEMORY – MASS STORAGE MANAGEMENT
OPERATING SYSTEM: VIRTUAL MEMORY – PROCESS MANAGEMENT IN LINUX
OPERATING SYSTEM: VIRTUAL MEMORY – SCHEDULING IN LINUX
OPERATING SYSTEM: VIRTUAL MEMORY – MEMORY MANAGEMENT IN LINUX
********
DATA STRUCTURES
DATABASE MANAGEMENT SYSTEM
DATABASE MANAGEMENT SYSTEM : INTRODUCTION
DATABASE MANAGEMENT SYSTEM : INTRODUCTION-II
DATABASE MANAGEMENT SYSTEM – DATABASE SYSTEM ARCHITECTURE
DATABASE MANAGEMENT SYSTEMS – RELATIONAL MODEL
DATABASE MANAGEMENT SYSTEMS – RELATIONAL ALGEBRA
DATABASE MANAGEMENT SYSTEMS – DATA MANIPULATION TRANSPARENCIES
DATABASE MANAGEMENT SYSTEMS – DATA MANIPULATION TRANSPARENCIES-II
DATABASE MANAGEMENT SYSTEMS – DATA MANIPULATION TRANSPARENCIES-III
DATABASE MANAGEMENT SYSTEMS – NORMALISATION
DATABASE MANAGEMENT SYSTEMS – QUERY OPTIMIZATION
DATABASE MANAGEMENT SYSTEMS - DATA WAREHOUSE
DATABASE MANAGEMENT SYSTEMS - CLIENT SERVER ARCHITECTURE
DATABASE MANAGEMENT SYSTEMS - CLIENT SERVER DATABASE - THREE-TIER ARCHITECTURE
DATABASE MANAGEMENT SYSTEMS - DISTRIBUTED DATABASE SYSTEMS
DATABASE MANAGEMENT SYSTEMS - DISTRIBUTED DATABASE ARCHITECTURE
DESIGN AND ANALYSIS OF ALGORITHMS
DESIGN AND ANALYSIS OF ALGORITHMS : INTRODUCTION
DESIGN AND ANALYSIS OF ALGORITHMS - FUNDAMENTAL STAGES OF PROBLEM SOLVING
DESIGN AND ANALYSIS OF ALGORITHMS-BASICS OF ALGORITHM WRITING
DESIGN AND ANALYSIS OF ALGORITHMS - ANALYSIS OF ITERATIVE ALGORITHMS
DESIGN AND ANALYSIS OF ALGORITHMS - ANALYSIS OF RECURSIVE ALGORITHMS
DESIGN AND ANALYSIS OF ALGORITHMS - BRUTE FORCE TECHNIQUES
DESIGN AND ANALYSIS OF ALGORITHMS - CLOSET PAIR AND CONVEX HULL PROBLEMS
DESIGN AND ANALYSIS OF ALGORITHMS - EXHAUSTIVE SEARCHING AND OPTIMIZATION PROBLEMS
DESIGN AND ANALYSIS OF ALGORITHMS - DIVIDE AND CONQUER TECHNIQUE
DESIGN AND ANALYSIS OF ALGORITHMS - DECREASE BY CONSTANT FACTOR ALGORITHMS
DESIGN AND ANALYSIS OF ALGORITHMS - DECREASE AND CONQUER DESIGN PARADIGM
DESIGN AND ANALYSIS OF ALGORITHMS - TRANSFORM AND CONQUER DESIGN PARADIGM
DESIGN AND ANALYSIS OF ALGORITHMS - MORE TRANSFORM AND CONQUER PROBLEMS
DESIGN AND ANALYSIS OF ALGORITHMS - MORE TRANSFORM AND CONQUER PROBLEMS – 2
COMPUTER GRAPHICS AND VISUALIZATION
COMPUTER GRAPHICS AND VISUALIZATION : INTRODUCTION
COMPUTER GRAPHICS AND VISUALIZATION: DDA LINE DRAWING PROCEDURE
COMPUTER GRAPHICS AND VISUALIZATION: BRESENHAM’S LINE DRAWING PROCEDURE
COMPUTER GRAPHICS AND VISUALIZATION: MIDPOINT CIRCLE DRAWING PROCEDURE
COMPUTER GRAPHICS AND VISUALIZATION: BASIC 2D TRANSFORMATIONS
COMPUTER GRAPHICS AND VISUALIZATION: COMPOSITE 2D TRANSFORMATIONS
COMPUTER GRAPHICS AND VISUALIZATION: OTHER 2D TRANSFORMATIONS
COMPUTER GRAPHICS AND VISUALIZATION: 2D VIEWING
COMPUTER GRAPHICS AND VISUALIZATION: 3D OBJECT REPRESENTATIONS (B-SPLINES, SWEEP, CSG, FRACTALS)
COMPUTER GRAPHICS AND VISUALIZATION: 3D TRANSFORMATIONS
COMPUTER GRAPHICS AND VISUALIZATION: VISIBLE SURFACE DETECTION
COMPUTER GRAPHICS AND VISUALIZATION: RENDERING
COMPUTER NETWORKS
COMPUTER NETWORKS: AN OVERVIEW
COMPUTER NETWORKS: APPLICATION NEED AND NETWORK PERFORMANCE
COMPUTER NETWORKS: APPLICATION LAYER PROTOCOLS –HTTP
COMPUTER NETWORKS: APPLICATION – HTTP +EMAIL - 2
COMPUTER NETWORKS: APPLICATION – ACCESSING EMAIL
COMPUTER NETWORKS: APPLICATION – DNS
COMPUTER NETWORKS: ROUTER IMPLEMENTATION
COMPUTER NETWORKS: ROUTER IMPLEMENTATION
COMPUTER NETWORKS: MULTICASTING – DVMRP
COMPUTER NETWORKS: MULTICASTING – PIM(23)
COMPUTER NETWORKS: MPLS
COMPUTER NETWORKS: QOS – TECHNIQUES
COMPUTER NETWORKS: QOS – QUEUING DISCIPLINES
COMPUTER NETWORKS: DIFFSER(28)
COMPUTER NETWORKS: IPv6 – OVERVIEW
COMPUTER NETWORKS: MOBILE IP
COMPUTER NETWORKS: MULTIMEDIA APPLICATIONS
COMPUTER NETWORKS: REAL-TIME TRANSPORT PROTOCOL (RTP)
COMPUTER NETWORKS: REAL-TIME CONTROL PROTOCOL (RTCP)
COMPUTER NETWORKS: SDP AND SIP
COMPUTER NETWORKS: RTSP AND H.323
COMPUTER NETWORKS: WIRELESS NETWORKS – WiFi
COMPUTER NETWORKS: BLUETOOTH
COMPUTER NETWORKS: CELLULAR NETWORKS – 2G
COMPUTER NETWORKS: CELLULAR NETWORKS AND ZIGBEE
COMPUTER NETWORKS: IOT, SDN AND WRAPUP
SOFTWARE ENGINEERING
SOFTWARE ENGINEERING – INTRODUCTION
SOFTWARE ENGINEERING – DEFINITIONS AND NOTATIONS
SOFTWARE ENGINEERING – SOFTWARE DEVELOPMENT LIFE CYCLE-P4
SOFTWARE ENGINEERING – SOFTWARE DEVELOPMENT LIFE CYCLE-P5
SOFTWARE ENGINEERING – REQUIREMENTS ENGINEERING (Part-9)
SOFTWARE ENGINEERING – REQUIREMENTS ENGINEERING (Part-10)
SOFTWARE QUALITY MANAGEMENT
SOFTWARE QUALITY MANAGEMENT - INTRODUCTION TO SOFTWARE QUALITY ASSURANCE
SOFTWARE QUALITY MANAGEMENT - INTRODUCTION TO SOFTWARE QUALITY METRICS
SOFTWARE QUALITY MANAGEMENT - RISK MANAGEMENT
SOFTWARE QUALITY MANAGEMENT - SOFTWARE CONFIGURATION MANAGEMENT
COMPILERS DESIGN
COMPILER DESIGN – COMPILERS INTRODUCTION
COMPILER DESIGN – COMPILERS – PHASES
COMPILER DESIGN – LEXICAL PHASES
COMPILER DESIGN – LEXICAL PHASES – AUTOMATA
COMPILER DESIGN – LEXICAL PHASES - NFA TO DFA
COMPILER DESIGN – OPERATOR PRECEDENCE PARSER
COMPILER DESIGN – OPERATOR PRECEDENCE PARSING ALGORITHM
COMPILER DESIGN – SLR(1) PARSERS, LR (0) ITEMS
COMPILER DESIGN – SLR PARSER - SLR PARSING TABLE
COMPILER DESIGN - SLR PARSING
COMPILER DESIGN - CALR PARSING
COMPILER DESIGN - LALR PARSING
COMPILER DESIGN - PARSING GENERATOR, SEMANTIC PHASE INTRODUCTION
WEB TECHNOLOGY
WEB TECHNOLOGY : INTRODUCTION
WEB TECHNOLOGY : WWW (World Wide Web)
WEB TECHNOLOGY : SERVICES ON INTERNET
WEB TECHNOLOGY : MARKUP LANGUAGES
WEB TECHNOLOGY : HTML
WEB TECHNOLOGY : JAVASCRIPT OBJECTS
WEB TECHNOLOGY : JAVASCRIPT AND HTML DOM
WEB TECHNOLOGY : JAVASCRIPT AND EVENT HANDLING
WEB TECHNOLOGY : JAVA NETWORKING – INTRODUCTION
WEB TECHNOLOGY : JAVA NETWORKING
WEB TECHNOLOGY : JAVA SOCKET PROGRAMMING
WEB TECHNOLOGY : JAVA UDP SOCKET PROGRAMMING
WEB TECHNOLOGY : RMI
WEB TECHNOLOGY : XML RPC
WEB TECHNOLOGY : JDBC- INTRODUCTION
WEB TECHNOLOGY : WORKING WITH JDBC- PART-II
EMBEDDED SYSTEM
EMBEDDED SYSTEM - INTRODUCTION TO COMPUTING
EMBEDDED SYSTEM - MICROCONTROLLERS AND EMBEDDED PROCESSORS
EMBEDDED SYSTEM - CHALLENGES IN EMBEDDED SYSTEM
EMBEDDED SYSTEM - OVERVIEW OF 8051-MICROCONTROLLER
EMBEDDED SYSTEM – (8051)ARCHITECTURE
EMBEDDED SYSTEM – INSTRUCTION SET
EMBEDDED SYSTEM – PROGRAMMING PARALLEL PORTS
EMBEDDED SYSTEM - PROGRAMMING TIMERS
EMBEDDED SYSTEM - INTERRUPT HANDLING
EMBEDDED SYSTEM - INTERRUPT HANDLING AND ASSEMBLY PROGRAMMING
EMBEDDED SYSTEM - SERIAL PORT PROGRAMMING IN EMBEDDED C
EMBEDDED SYSTEM - INTERFACING EXTERNAL DEVICES USING EMBEDDED C
EMBEDDED SYSTEM - RTOS: MULTIPLE TASKS AND PROCESSES
EMBEDDED SYSTEM - RTOS – BASIC CONCEPT
EMBEDDED SYSTEM - RTOS: SCHEDULING POLICIES - 1
EMBEDDED SYSTEM - RTOS: SCHEDULING POLICIES – 2
EMBEDDED SYSTEM - ARM PROCESSOR FUNDAMENTALS
EMBEDDED SYSTEM – ARM INSTRUCTION SET
EMBEDDED SYSTEM – ARM IN STRUCTION AND EMBEDDED C
EMBEDDED SYSTEM – ATOM PROCESSOR FUNDAMENTALS
EMBEDDED SYSTEM – ATOM PROCESSOR ISA
EMBEDDED SYSTEM – DESIGN METHODOLOGIES
EMBEDDED SYSTEM – EMBEDDED SOFTWARE DEVELOPMENT TOOLS
EMBEDDED SYSTEM – EMULATORS AND DEBUGGERS
EMBEDDED SYSTEM – COMPLETE DESIGN OF EMBEDDED SYSTEM
EMBEDDED SYSTEM – EMBEDDED SYSTEM DESIGN – CASE STUDY - PART I
EMBEDDED SYSTEM – EMBEDDED SYSTEM DESIGN – CASE STUDY - PART-II
CLOUD COMPUTING
CLOUD COMPUTING – INTRODUCTION
CLOUD COMPUTING – UTILITY COMPUTING
CLOUD COMPUTING – CLOUD CHARACTERISTICS
CLOUD COMPUTING – DEPLOYMENT MODELS
CLOUD COMPUTING – COMMUNICATION IN DISTRIBUTED COMPUTING I
CLOUD COMPUTING – COMMUNICATION IN DISTRIBUTED COMPUTING II
CLOUD COMPUTING – COMMUNICATION IN DISTRIBUTED COMPUTING III
CLOUD COMPUTING – TIME ORDERING-I
CLOUD COMPUTING – TIME ORDERING-II
CLOUD COMPUTING – ELECTION IN CLOUD-I
CLOUD COMPUTING – ELECTION IN CLOUD-II
CLOUD COMPUTING – ELECTION IN CLOUD-III
CLOUD COMPUTING – MUTUAL EXCLUSION
CLOUD COMPUTING – SNAPSHOT- I
CLOUD COMPUTING – SNAPSHOT- II
CLOUD COMPUTING – REPLICATION
CLOUD COMPUTING – CONSENSUS AND PAXOS
CLOUD COMPUTING – VIRTUALIZATION-I
CLOUD COMPUTING – VIRTUALIZATION-II
CLOUD COMPUTING – VIRTUALIZATION-III
CLOUD COMPUTING – VIRTUALIZATION-IV
CLOUD COMPUTING – WEB SERVICES
CLOUD COMPUTING – RESTFUL WEB SERVICES
CLOUD COMPUTING – PEER - TO - PEER NETWORKING
CLOUD COMPUTING – PEER - TO - PEER NETWORKING-II
CLOUD COMPUTING – CLOUD ARCHITECTURE
CLOUD COMPUTING – NOSQL DATA STORES
CLOUD COMPUTING – NOSQL DATA STORES
CLOUD COMPUTING – CONCLUSION AND ADVANCED FEATURES
MACHINE LEARNING
MACHINE LEARNING - INTRODUCTION
MACHINE LEARNING - INTERNALS OF MACHINE LEARNING
MACHINE LEARNING - DESIGN OF LEARNING SYSTEM
MACHINE LEARNING - TYPE OF LEARNING-I
MACHINE LEARNING - TYPE OF LEARNING-II
MACHINE LEARNING - PROBABILITY
MACHINE LEARNING - PROBABILITY DISTRIBUTIONS
MACHINE LEARNING - LINEAR ALGEBRA
MACHINE LEARNING - INFORMATION THEORY
MACHINE LEARNING - DECISION THEORY AND BAYESIAN DECISION THEORY
MACHINE LEARNING - CLASSIFICATION,NEAREST NEIGHBOURS EVALUATION
MACHINE LEARNING – KNN ALGORITHM
MACHINE LEARNING – DECISION TREES
MACHINE LEARNING – DECISION TREES ALGORITHM ID3
MACHINE LEARNING – CLASSIFICATION AND REGRESSION TREES – 1
MACHINE LEARNING – SUPPORT VECTOR MACHINES-II
MACHINE LEARNING –NEURAL NETWORKS – I
MACHINE LEARNING –NEURAL NETWORKS – II
MACHINE LEARNING – GENETIC ALGORITHMS – I
MACHINE LEARNING – GENETIC ALGORITHMS – II
DATA ANALYTICS
DATA ANALYTICS - INTRODUCTION TO ANALYTICS AND BIG DATA
DATA ANALYTICS - BIG DATA APPROACH TO ANALYTICS AND WEB-THE ACTUAL BIG DATA
DATA ANALYTICS - EVOLUTION OF ANALYTICAL SCALABILITY
DATA ANALYTICS - EVOLUTION OF ANALYTICAL PROCESSES
DATA ANALYTICS - ANALYTICS – HOW IT MUST BE?
DATA ANALYTICS - FOUNDATIONS – UNIVARIATE ANALYSIS
DATA ANALYTICS - FOUNDATIONS BIVARIATE AND MULTIVARIATE ANALYSIS
DATA ANALYTICS – FOUNDATIONS REGRESSION ANALYSIS
DATA ANALYTICS FOUNDATIONS – PROBABILISTIC AND BAYESIAN APPROACHES
DATA ANALYTICS – ASSOCIATION RULE ANALYSIS - I
DATA ANALYTICS – ASSOCIATION RULE ANALYSIS - II
DATA ANALYTICS – ASSOCIATION RULE ANALYSIS – III
DATA ANALYTICS – CLUSTERING - I
DATA ANALYTICS – CLUSTERING – II
DATA ANALYTICS – CLUSTERING - III
DATA ANALYTICS – DIMENSIONALITY REDUCTION – NEED FOR DM AND SVD
DATA ANALYTICS – DIMENSIONALITY REDUCTION – SVD CASE STUDY AND CUR
DATA ANALYTICS – No SQL
DATA ANALYTICS - MONGODB-I
DATA ANALYTICS - MONGODB-II
DATA ANALYTICS - MONGODB-III
DATA ANALYTICS - INTRODUCTION TO DATA VISUALIZATION
DATA ANALYTICS - DATA VISUALIZATION TECHNIQUES - I
DATA ANALYTICS - DATA VISUALIZATION TECHNIQUES – II
DATA ANALYTICS - VISUALIZATION OF SOCIAL NETWORKS
DATA ANALYTICS - GRAPHICS AND DATA VISUALIZATION IN R
DATA ANALYTICS – OPEN SOURCE TOOLS FOR ANALYTICS
VISUALIZATION TECHNIQUES
VISUALIZATION TECHNIQUES - TASK AND INTERACTION
VISUALIZATION TECHNIQUES - ANIMATED VISUALIZATION
VISUALIZATION TECHNIQUES - SINGLE VIEWS AND MULTIPLE VIEWS
VISUALIZATION TECHNIQUES - INFORMATION FILTERING AND AGGREGATION
VISUALIZATION TECHNIQUES - DIMENSIONALITY REDUCTION IN VISUALIZATION
VISUALIZATION TECHNIQUES - EMBEDDING INFORMATION-FOCUS+CONTEXT
VISUALIZATION TECHNIQUES – VISUALIZATION OF TABULAR DATA
VISUALIZATION TECHNIQUES – TEMPORAL VISUALIZATIONS
VISUALIZATION TECHNIQUES - VISUALIZATION OF SPATIAL DATA
VISUALIZATION TECHNIQUES - TREE AND GRAPH VISUALIZATION
VISUALIZATION TECHNIQUES - DOCUMENT VISUALIZATION
VISUALIZATION TECHNIQUES - BIG DATA VISUALIZATION
VISUALIZATION TECHNIQUES - VISUALIZATION TOOLKITS
VISUALIZATION TECHNIQUES - CASE STUDIES IN VISUALIZATIONS