Sciweavers

18 search results - page 2 / 4
» cardis 2008
Sort
View
COLING
2002
13 years 4 months ago
Identifying Anaphoric and Non-Anaphoric Noun Phrases to Improve Coreference Resolution
We present a supervised learning approach to identification of anaphoric and non-anaphoric noun phrases and show how such information can be incorporated into a coreference resolu...
Vincent Ng, Claire Cardie
CARDIS
2008
Springer
165views Hardware» more  CARDIS 2008»
13 years 6 months ago
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Wojciech Mostowski, Erik Poll
CARDIS
2008
Springer
105views Hardware» more  CARDIS 2008»
13 years 6 months ago
Fast Hash-Based Signatures on Constrained Devices
Digital signatures are one of the most important applications of microprocessor smart cards. The most widely used algorithms for digital signatures, RSA and ECDSA, depend on finite...
Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, J...
CARDIS
2008
Springer
119views Hardware» more  CARDIS 2008»
13 years 6 months ago
Static Program Analysis for Java Card Applets
The Java Card API provides a framework of classes and interfaces that hides the details of the underlying smart card interface, thus relieving developers from going through the swa...
Vasilios Almaliotis, Alexandros Loizidis, Panagiot...
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
13 years 6 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...