When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Several studies indicate that the level of predicate-argument structure is relevant for modeling prevalent phenomena in current textual entailment corpora. Although large resource...
Language-basedextensible systems, such as Java Virtual Machines and SPIN, use type safety to provide memory safety in a single address space. By using software to provide safety, ...
Godmar Back, Patrick Tullmann, Leigh Stoller, Wils...
The current trend in operating systems research is to allow applications to dynamically extend the kernel to improve application performance or extend functionality, but the most ...
The Tor network is one of the largest deployed anonymity networks, consisting of 1500+ volunteer-run relays and probably hundreds of thousands of clients connecting every day. Its ...
Karsten Loesing, Steven J. Murdoch, Roger Dingledi...