Courses from 1000+ universities
A year ago, 2U had already laid off staff as it recentered its strategy around edX, which it acquired for $800M.
700+ Free Google Certifications
Digital Skills
Computer Science
Communication Skills
Maintaining a Mindful Life
Food as Medicine
Six Sigma: Define and Measure
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Syllabus: Introduction Online Anonymous Markets Poor Security Practices Method Vendor Types Security Practices Password Strength PGP Keys Conclusion
Syllabus: Intro Existing tools for diagnosing desktop apps Desktop app diagnosis is under-investigated An example of existing causal tracing Existing causal tracing fails to diagnose desktop apps * It is hard to identify accurate execution segment bounda…
Syllabus: Intro Rise of On-device Learning Common Compression Methods The Workflow of DNN Training Bridge the Gap: Data Quantization Why We Need Quantization? Potential Gains Co-design of Network and Training Engine Our System: Octo Loss-aware Compensati…
Syllabus: Intro Blockchains: Decentralized Databases Public Blockchains: Proof-of-work consensus Public Blockchains - Low throughput Prior work: Modify Pow or New Consensus Can we Increase the Throughput of Public Blockchains Without Modifying Pow? Impac…
Syllabus: Intro Coverage is important for Guided Fuzzing Coverage Pipeline in Fuzzers Example: Coverage Collection in AFL Example: Coverage Analysis in AFL Overhead in Coverage Collection Overhead in Coverage Analysis RIFF: Overview and Insights Single-I…
Syllabus: Intro Outsourcing Storage Encrypted Deduplication MLE-based Implementation Contributions SGX Basics Design Goals SGXDedup Questions Enclave Management Renewable Blinded Key Management SGX-based Speculative Encryption Experimental Setup Overall…
Syllabus: Intro SpaceX Starlink Shell 1 The ICARUS attack Starting point: the Coremelt DDoS attack Space-based low-latency network - Predictability Global access - DDoS attack stealthiness Low-latency/higher cost - Tight operation margins ICARUS Attack m…
Syllabus: Intro Graph Analytics Streaming Graph Processing Stateful Iterative Processing Model Streaming Graph Systems: GraphBolt & DZIG Memory-Efficient Stateful Iterative Models Selective Stateful Iterative Model: Challenges Selectively Tracking Interm…
Syllabus: Intro Distributed in-memory KVS Trust in cloud storage Problem statement Basic design Trusted computing Design challenges Networking Trusted network stack Fault tolerance Trusted replication protocol Hardware limitations In-memory KV store Over…
Syllabus: Intro Model Registration Diverse application requirements Today's Inference serving Goals & Requirements INFaaS overview The model-less abstraction Existing systems Autoscaling Model-Autoscaler at each worker Evaluation How well does INFaaS sca…
Syllabus: Intro What is Edge Stream Processing? Why Edge Stream Processing? Outline Our Goal and Challenges Challenge #1: How to scale to #applications? Challenge #2: How to adapt to edge dynamics? DART Design and implementation Dynamic Dataflow Abstract…
Syllabus: Introduction Metadata Challenges Private Information Retrieval Architecture Advantages Scaling Performance comparison Summary
Syllabus: Intro normally reducing malloc cycles is good business logic changes, infrastructure does not malloc cycles do not matter. $$$ spent on hardware matter. most cpu cycles do nothing hugepages cheapen the page table walk hugepages make the TLB big…
Syllabus: Intro Emerging Trend of Machine Learning Emerging Federated Learning on the Edge Execution of Federated Learning (FL) Challenges in Federated Learning Existing Client Selection: Suboptimal Efficiency Existing Client Selection: Unable for Select…
Syllabus: Intro Tensor Program Transformations Current Systems Consider only Fully Equivalent Transformations Motivating Example PET Overview Key Challenges Mutant Generator Challenges: Examine Transformations A Strawman Approach Multi-Linear Tensor Prog…
Get personalized course recommendations, track subjects and courses with reminders, and more.