Search

Search Funnelback University

Search powered by Funnelback
21 - 70 of 99 search results for postgraduate entry requirements where 1 match all words and 98 match some words.
  1. Results that match 2 of 3 words

  2. Reconstructing I/O

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-596.pdf
    3 Aug 2004: Xen tracks uses of grant references by associating a usagecount with each AGT entry. ... This is the only modification required to en-force safe DMA (Requirement 3 in Table 1).
  3. Cassandra: Distributed Access Control Policies with Tunable…

    https://www.cl.cam.ac.uk/~pes20/policy-policy04.pdf
    23 Mar 2004: If no relevant entry exists for the subgoal, anew table entry is created and populated. ... On exit, the table entry for the original query will bepopulated with all its answers.
  4. casn.dvi

    https://www.cl.cam.ac.uk/research/srg/netos/papers/2002-casn.pdf
    12 Jan 2004: retry entry: entry = cd>entry[i];val = RDCSS (new RDCSSDescriptor t (&(cd>status), UNDECIDED,. ... gg else if (val! = entry>old) status = FAILED;. g. CAS1 (&(cd>status), UNDECIDED, status); / C4/g.
  5. ho-all

    https://www.cl.cam.ac.uk/teaching/2004/PPEthics/ho-all.pdf
    30 Nov 2004: It will, therefore, be a matter of your exercising your personal judgement in meeting the Code’s requirements. ... understanding of relevant legislation, regulations and standards, and that you comply with such requirements. -
  6. UNIX AND X by Frank H. King An Introduction ...

    https://www.cl.cam.ac.uk/teaching/2003/LongVac/ses1.pdf
    11 Aug 2004: 2 –. • This brings up a Menu which contains various entries including New Terminal whichmay be the fourth entry down. • ... Click this icon. • This brings up the Main Menu whose entries include System and (as the last entry)Log Out. •
  7. Operating Systems II— Additional Information — Steven HandLent Term…

    https://www.cl.cam.ac.uk/teaching/2003/OpSys2/osII-additional.pdf
    30 Jan 2004: An IPT is a fixed size hash table containing one entry for each physical frame ofmemory. ... Each hand points to an entry in the core map, a fixeddistance apart.
  8. UNIX AND X by Frank H. King An Introduction ...

    https://www.cl.cam.ac.uk/teaching/2003/FoundsProg/ses1.pdf
    11 Aug 2004: 2 –. • This brings up a Menu which contains various entries including New Terminal whichmay be the fourth entry down. • ... Click this icon. • This brings up the Main Menu whose entries include System and (as the last entry)Log Out. •
  9. Computer security - a layperson's guide, from the bottom up

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-550.pdf
    27 Apr 2004: 14. Part 2 : Some technical amplification. It is evident that implementing computer security has many technical ramificationsas well as human management requirements. ... Protocol 2. In this case the user initially does no more than invoke logon (ring
  10. CUnibig.eps

    https://www.cl.cam.ac.uk/teaching/2003/IntroSecurity/slides.pdf
    26 Jan 2004: Covers not only operating systems but a broad spectrum ofsecurity products and associated security requirements. ... Separates functional and security requirements from the inten-sity of required testing (evaluation assurance level, EAL).
  11. Technical ReportNumber 588 Computer Laboratory UCAM-CL-TR-588ISSN…

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-588.pdf
    13 May 2004: This chap-ter critiques related work and determines the main requirements that the designand implementation of a processor architecture must satisfy. ... Chapter 4: Background to Embedded Design. This chapter addresses embedded environment constraints
  12. Trust for resource control: Self-enforcing automatic rational…

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-600.pdf
    24 Aug 2004: resource-constrained sandboxes, operating system multimedia support and au-. tomatic distribution of personal address book entries can all treat the user’s time. ... requirements, job schedulers are hard to test because of the difficulty of auto-.
  13. Operating Systems II Steven Hand Lent Term 2004 8 ...

    https://www.cl.cam.ac.uk/teaching/2003/OpSys2/osII-notes.pdf
    15 Jan 2004: Most parts also present in page table entries (PTEs). Operating Systems II — Virtual Addressing 30. ... Modified page replacement:– introduce callback for privileged processes. – prefer to retain pages with TLB entries. •
  14. guide.dvi

    https://www.cl.cam.ac.uk/teaching/2003/AdvSysTop/scalesync-guide.pdf
    1 Feb 2004: A cache blocks of, say,64 bytes would therefore hold 16 of the entries. ... Thearray should perhaps be spread out so that each entry lies on a separate cache block.
  15. CUnibig.eps

    https://www.cl.cam.ac.uk/teaching/2003/IntroSecurity/slides-2up.pdf
    26 Jan 2004: Covers not only operating systems but a broad spectrum ofsecurity products and associated security requirements. ... Separates functional and security requirements from the inten-sity of required testing (evaluation assurance level, EAL).
  16. Safe Hardware Access with the Xen Virtual Machine Monitor ...

    https://www.cl.cam.ac.uk/research/srg/netos/papers/2004-safehw-oasis.pdf
    16 Sep 2004: Table 1: Requirements for Safe Hardware. system. This increases reliability by restricting the possibleharm inflicted by device faults. ... When a foreign mapping is createdwith reference to an existing AGT entry, Xen increments itscount.
  17. Natural Language Processing2004, 8 LecturesAnn Copestake…

    https://www.cl.cam.ac.uk/teaching/2003/NatLangProc/final.pdf
    18 Apr 2004: Lecture 8 will discuss the architecture and requirements of afew applications in a bit more detail. ... For some applications, there is a requirement thatmorphological processing is bidirectional: that is, can be used for analysis and generation.
  18. Natural Language Processing2005, 8 Lectures (Final version, December…

    https://www.cl.cam.ac.uk/teaching/2004/NatLangProc/lectures.pdf
    6 Dec 2004: Lecture 8 will discuss the architecture and requirements of afew applications in a bit more detail. ... For some applications, there is a requirement thatmorphological processing is bidirectional: that is, can be used for analysis and generation.
  19. Trust management for widely distributed systems

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-608.pdf
    5 Dec 2004: Addressing this requirement, a trust negotiation framework built on top ofFidelis is developed. ... Significant attempts to model integrity requirements include Biba [23] and Clarkand Wilson [24].
  20. Operating Systems I Steven Hand Easter Term 2004 12 ...

    https://www.cl.cam.ac.uk/teaching/2003/OpSys1/handout-1up.pdf
    22 Apr 2004: Memory requirement = xy depth, e.g.1024x768 @ 16bpp needs 1536KB.
  21. database.dvi

    https://www.cl.cam.ac.uk/teaching/2005/HowToStudy/notes/database.pdf
    5 Dec 2004: In the Record Entry, there must be one entry for each RECORD TYPE. ... 1,. ,C′n) with domain D. ′. j underlying C′. j. A common requirement is.
  22. Code size optimization for embedded processors

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-607.pdf
    25 Nov 2004: So it becomes thecompiler’s task to transform the code into a form that meets the requirements. ... A CFG represents a single function with aunique entry node, and zero or more exit nodes.
  23. paper.dvi

    https://www.cl.cam.ac.uk/research/srg/netos/papers/2002-infospect.pdf
    12 Jan 2004: These new ormodified tools will be run in subsequent iterations. Entries in the knowledge base come in three flavors:. ... With. 5. our current suite of discovery tools, this results in a knowl-edge base of around 25,000 entries.
  24. prob10.dvi

    https://www.cl.cam.ac.uk/teaching/2003/Probability/prob10.pdf
    5 Feb 2004: Different lengths of peg correspond to different probabilities. Axiom II requires the sum of all the entries in the table (which is the total length of thepegs) to be 1. ... It is easy to verify that this requirement is satisfied in the present case:.
  25. LectList2004 - 75962

    https://www.reporter.admin.cam.ac.uk/reporter/2004-05/special/01/pdfs/soc_anth_mphil.pdf
    22 Sep 2004: General Sessions please see the Joint Schools Social Science Research. Methods Course entry (p. ... M. 3.30–5. please see the Joint Schools Social ScienceResearch Methods Course entry (p.
  26. mmi_4133.fm

    https://www2.mrc-lmb.cam.ac.uk/groups/JYL/PDF/Spo0J%202004.pdf
    30 Jun 2004: maintained (for example, the RAP1 protein fam-ily, PDB entry 1IGN; Konig et al., 1996). ... 2. The secondary structure of KorB–C (PDB entry 1IGQ) is shown below the alignment.
  27. mmi_3991.fm

    https://www2.mrc-lmb.cam.ac.uk/groups/JYL/PDF/ftsn2004.pdf
    15 Apr 2004: The requirement of FtsN for cell division in. E. coli. became obvious with a conditional null allele of the. ... Residues A127-L132apparently contribute a fourth helix, the Table entries forwhich are italicized here because they involve non-nativeresidues
  28. ComparativeArchitectures CST Part II, 16 lectures Lent Term 2004 ...

    https://www.cl.cam.ac.uk/teaching/2003/CompArch/mynotes.pdf
    26 Feb 2004: ComparativeArchitectures. CST Part II, 16 lectures. Lent Term 2004. Ian Pratt. Ian.Pratt@cl.cam.ac.uk. OHP slides with extra notes for supervisors. Course Outline. 1. Comparing Implementations. • Developments fabrication technology• Cost, power,
  29. Champagne Prototyping: A Research Technique for Early Evaluation of…

    https://www.cl.cam.ac.uk/~afb21/publications/VLHCC04.pdf
    21 Jun 2004: How can researchers and designers deal with this kind of deep question at requirements specification time? ... ventional double-entry accounting, and used only very simple formulae to add and subtract columns.
  30. UNIVERSITY OFCAMBRIDGEComputer Laboratory Computer Science Tripos…

    https://www.cl.cam.ac.uk/teaching/2003/OptComp/notes03.pdf
    12 Jan 2004: ENTRY f : no predecessors;. • EXIT: no successors;. • ALU a, b, c: one successor;. • ... This leads to an algorithm (assumingflowgraph node 1 is the only entry node):.
  31. Dynamic binary analysis and instrumentation

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-606.pdf
    12 Nov 2004: Thetranslation table is large (300,000 entries) so it rarely gets full.
  32. Microsoft PowerPoint - SoftwareEngDesign-3-0

    https://www.cl.cam.ac.uk/teaching/2004/SWEngDes/SoftwareEngDesign-3-0.pdf
    12 Oct 2004: London Ambulance Service. 9. Special emphases of this courseRequirements:. User centred interaction design, not older requirements capture methods (Pressman describes both). ... To the “bold” entry in the font dialog:distance 268 pixels, width 16
  33. Inter-Client Communication Conventions Manual Version 2.1 X…

    https://www.cl.cam.ac.uk/~mgk25/ucs/icccm.pdf
    23 Mar 2004: 4 This requirement is new in version 2.0, and, in general, existing clients do not conform to thisrequirement. ... Convention. The entries in a MULTIPLE property must be processed in the order they appearin the property.
  34. Routing for Integrated Services Delineation of routes, etc. Also, ...

    https://www.cl.cam.ac.uk/teaching/2004/DigiComm2/route-int-serve.ppt
    12 Nov 2004: Such application including multimedia conferencing, remote teaching and multi-user games. These may demanding have QoS requirements as well as the requirement for many-to-many communication. ... Other multi-party communication applications distributed
  35. Abstract Interpretation of Proofs: ClassicalPropositional Calculus…

    https://www.dpmms.cam.ac.uk/~jmeh1/Research/Publications/2004/aap04.pdf
    6 Jul 2004: The several requirements added are natural simplifying assumptions.They do not really have much proof theoretic justification as things stand. ... For the moment it is best to regard these requirements as being justified by themodels which we are able to
  36. Virtual Private Machines: De-stressing systems

    https://www.cl.cam.ac.uk/teaching/2004/DigiComm2/mort.ppt
    28 Nov 2004: My view: basic “need-to-know” requirements are. What should be happening? [ c ]. What is happening? [ f, p, a ]. What shouldn’t be happening? [ ... each entry annotated with current route from src to dst. N.B.
  37. pml.py

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-591.pdf
    17 Jun 2004: have conflicting requirements and a “lowest-common denominator” interface would be limited indeed:. ... 21. 2 Special-case transformation systems. Figure 2.2: Shodouka entry form in a Web browser.
  38. OpenMP C and C++Application ProgramInterface Version 2.0 March 2002…

    https://www.cl.cam.ac.uk/teaching/2003/AdvSysTop/cspec20.pdf
    1 Feb 2004: There is noimplied barrier either on entry to or exit from the master construct. ... barrier. At entry to and exit from critical. At entry to and exit from ordered.
  39. ast.dvi

    https://www.cl.cam.ac.uk/teaching/2003/AdvSysTop/scalesync-slides.pdf
    1 Feb 2004: Programming without locks (Wed 25 Feb) Non-blocking data structures Correctness requirements Current research. ... Loops storing an entry in it (1 time in 1000) or readingentries from it (999 times in 1000).
  40. Lecture Notes for Systems Design 120 Lectures to Part ...

    https://www.cl.cam.ac.uk/teaching/2003/StHWDes/teaching/sd.pdf
    29 Apr 2004: A write-throughcache updates the main store when data is written, giving no performance gain for writing,but a copy-back cache keeps track of which entries are ‘dirty’ meaning that ... Only the small number of entries in the set need to be checked to
  41. Design and implementation of a simple typed language based on the…

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-75.pdf
    3 Sep 2004: creases the simplicity of the language by removing the requirement that operations must. ... The possibility that a list may have no entries in it must alwaysbe taken into consideration.
  42. Designing and attacking anonymous communication systems

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-594.pdf
    8 Jul 2004: 54. 4.3 Other systems. 564.4 Summary. 57. 5 Mixminion 595.1 Models and requirements. ... 59. 5.1.1 The system view. 605.1.2 Requirements. 615.1.3 Orthogonal issues. 63.
  43. Practical lock-freedom

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-579.pdf
    13 Feb 2004: Based on the requirements of the data structure, a programmer canchoose between multi-word compare-&-swap (MCAS) and software transac-tional memory (STM) to enforce serialisation of complex shared-memory ... A header array contains a word-size entry for
  44. introalg.dvi

    https://www.cl.cam.ac.uk/teaching/2005/HowToStudy/notes/introalg.pdf
    5 Dec 2004: involved. Then the transitiveclosure of this relation will indicate whether there is any way of travelling by railbetween two places, ignoring the original requirements that the journey be directand non-stop. ... can be seen as ann by n matrix
  45. ml89.dvi

    https://www.cl.cam.ac.uk/teaching/2005/HowToStudy/notes/ml89.pdf
    5 Dec 2004: 18. range before combining these to produce a final value. Characterise the space andtime requirements of this function.
  46. caslists-disc.dvi

    https://www.cl.cam.ac.uk/research/srg/netos/papers/2001-caslists.pdf
    12 Jan 2004: Our basic correctness requirement is linearizabil-ity which requires that (a) the responses received in every concurrent historyare equivalent to those of some legal sequential history of the same requestsand (b) ... Firstly, a CAS operation is neededto
  47. INSTITUTE OF PHYSICS PUBLISHING JOURNAL OF PHYSICS A: MATHEMATICAL ...

    www.damtp.cam.ac.uk/user/ngb23/publications/motionIX.pdf
    8 Oct 2004: The increase in the percentage of line lost with h seen in the first two entries of table 1may be explained by the following heuristic argument. ... This requirement,which implies that. ln(δ/δ̄) = 12 (38)is relevant even for the hollow core vortex,
  48. Acute High-level programming language designfor distributed…

    https://www.cl.cam.ac.uk/~pes20/acute/acute2-long.pdf
    12 Oct 2004: Acute. High-level programming language designfor distributed computation. Design rationale and language definition12th October 2004. Peter Sewell James J. Leifer† Keith Wansbrough Mair Allen-Williams. Francesco Zappa Nardelli† Pierre Habouzit†
  49. Acute: High-level programming language design for distributed…

    https://www.cl.cam.ac.uk/~pes20/acute/UCAM-CL-TR-605.pdf
    12 Oct 2004: Technical ReportNumber 605. Computer Laboratory. UCAM-CL-TR-605ISSN 1476-2986. Acute:High-level programming languagedesign for distributed computation. Design rationale andlanguage definition. Peter Sewell, James J. Leifer,Keith Wansbrough, Mair
  50. Acute: High-level programming language design for distributed…

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-605.pdf
    12 Oct 2004: Technical ReportNumber 605. Computer Laboratory. UCAM-CL-TR-605ISSN 1476-2986. Acute:High-level programming languagedesign for distributed computation. Design rationale andlanguage definition. Peter Sewell, James J. Leifer,Keith Wansbrough, Mair
  51. Foundations of Computer Science Computer Science Tripos Part IA ...

    https://www.cl.cam.ac.uk/teaching/2004/FoundsCS/slides.pdf
    13 Sep 2004: Programmers need a variety of skills:. • to communicate requirements, so they solve the right problem. • ... Indexed by sayeight bits taken from a, the table would have only 256 entries.

Refine your results

Format

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Your search history is empty.