Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Software Development
Cybersecurity
Transforming Digital Learning: Learning Design Meets Service Design
Matrix Algebra for Engineers
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore differential privacy through mutual information constraints, presented by Princeton researchers at ACM's Computer and Communications Security conference.
Explore secure computation with penalties, focusing on amortization techniques to enhance efficiency in cryptographic protocols for multi-party computations.
Explore advancements in secure computation techniques, focusing on enhanced privacy and efficiency in multi-party protocols presented at the ACM CCS 2016 conference.
Explore the potential of criminal smart contracts and their implications for cybersecurity in this thought-provoking presentation by leading researchers in the field.
Explore vulnerabilities in 64-bit platform migration, focusing on security implications and potential risks for software developers and system administrators.
Explore novel prefetch side-channel attacks that bypass SMAP and Kernel ASLR, presented by security researchers at CCS 2016. Gain insights into advanced cybersecurity vulnerabilities and mitigation strategies.
Explore techniques for breaking kernel address space layout randomization using Intel TSX, presented by researchers from Georgia Tech at a major computer security conference.
Explore a practical multi-level information-flow tracking system for Android RunTime, enhancing mobile security through advanced taint analysis techniques.
Explore user-driven access control for unmodified operating systems, enhancing security without system modifications. Learn about AUDACIOUS and its implementation for improved data protection.
Efficient cloud access revocation technique using Mix&Slice, balancing security and performance for data outsourcing. Presents novel approach to protect resources while minimizing computational overhead.
Explore Draco, a system for fine-grained access control of web code on Android, enhancing security and privacy for mobile applications and users.
Explore the impact of AI on neurotechnologies for human augmentation, including brain-computer interfaces, neurofeedback, and neuromodulation, and their potential to revolutionize human-computer interaction.
Real-time feedback system for novice mountain bikers to improve posture and balance awareness, enhancing performance and making the sport more accessible.
Innovative touch input technique for large displays, combining absolute and relative pointing for efficient target selection across distances, validated through experiments and a two-person game study.
Explores shape-changing interfaces in architectural elements, focusing on an interactive door panel that communicates social cues through dynamic affordances and affordance elimination.
Get personalized course recommendations, track subjects and courses with reminders, and more.