Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explores Tor's congestion issues, proposing KIST algorithm to improve network performance by optimizing socket management using real-time kernel information, reducing latency and increasing throughput.
Explore GraphX, a graph processing framework built on Apache Spark, offering performance comparable to specialized systems while enabling broader computational capabilities and fault tolerance.
Explore eclipse attacks on Bitcoin's P2P network, their impact on mining and consensus, and proposed countermeasures to enhance network security while maintaining decentralization.
Explores Control-Flow Bending attacks on Control-Flow Integrity defenses, revealing vulnerabilities in fine-grained CFI implementations and demonstrating the necessity of shadow stacks for enhanced security against memory corruption.
Explore Named Data Networking's potential to replace TCP, its architectural advantages, and data-centric security approach in this insightful presentation by networking experts.
Explore Google's release engineering practices, including bazel usage, branching strategies, and automated systems. Learn about disciplines, philosophies, and techniques for improving release processes.
Explore efficient PostgreSQL backup solutions with PgBackRest, featuring checksums, compression, parallel transfer, and more. Learn about its design, features, and practical applications for large-scale databases.
RF-based indoor localization system that tracks multiple users' positions and gestures through walls, using wireless signal reflections off bodies. Can even locate static users by detecting breathing movements.
Explores BLE device privacy vulnerabilities and introduces BLE-Guardian, a system protecting user privacy by controlling device discovery and access without modifying existing devices or protocols.
Explores k-fingerprinting, a robust website fingerprinting technique using random decision forests, demonstrating high accuracy in identifying visited web pages through encrypted connections.
Automated approach to detect ransomware through dynamic analysis, focusing on file tampering and desktop changes. Improves detection of evasive ransomware unnoticed by traditional antimalware solutions.
Explores model extraction attacks on machine learning systems, demonstrating vulnerabilities in publicly accessible ML interfaces and proposing potential countermeasures to protect confidential models.
Innovative approach to bypass face authentication using 3D models created from social media photos, exploiting virtual reality to simulate liveness and fool security systems.
Discover Facebook's innovative load balancing techniques for handling billions of users, improving performance, managing capacity, and enhancing reliability at a global scale.
Explore Facebook's MySQL automation systems for managing thousands of servers across data centers, including design, architecture, and real-world challenges faced at massive scale.
Get personalized course recommendations, track subjects and courses with reminders, and more.