Search

Search Funnelback University

Search powered by Funnelback
41 - 90 of 110 search results for postgraduate entry requirements where 2 match all words and 108 match some words.
  1. Results that match 2 of 3 words

  2. TCP, UDP, and Sockets: rigorous and experimentally-validated…

    https://www.cl.cam.ac.uk/~pes20/Netsem/alldoc.pdf
    18 Mar 2005: 60– ifd. 60– routing table entry. 60– type abbrev routing table.
  3. Foundations of Computer Science Computer Science Tripos Part IA ...

    https://www.cl.cam.ac.uk/teaching/2005/FoundsCS/slides.pdf
    31 Aug 2005: Programmers need a variety of skills:. • to communicate requirements, so they solve the right problem. • ... Indexed by sayeight bits taken from a, the table would have only 256 entries.
  4. Location privacy in ubiquitous computing

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-612.pdf
    4 Jan 2005: Other important factors include size, weight, installation requirements,robustness to environment (including visual occlusion, heat, sound, magnetic and radio waves),freedom of movement (e.g. ... ensure adjacent cells do not use the same transmission
  5. On the quadrature of multivariate highly oscillatory integrals over…

    www.damtp.cam.ac.uk/user/na/NA_papers/NA2005_07.pdf
    3 Oct 2005: Feiωg. ]= feiωg then computing Ig[f, (a,b)] is trivial. We can rewrite this requirement. ... Though it is often more accuratethan a Levin-type method, the requirement of knowing moments makes it much less practical formultivariate integrals.
  6. Virtual Private Machines: De-stressing systems

    https://www.cl.cam.ac.uk/teaching/2005/DigiCommII/msr-guest.ppt
    27 Oct 2005: My view: basic “need-to-know” requirements are. What should be happening? [ c ]. What is happening? [ f, p, a ]. What shouldn’t be happening? [ ... each entry annotated with current route from src to dst. N.B.
  7. 30 Years brochure.indd

    https://www.spri.cam.ac.uk/research/projects/ccsi/canadianstudies30uk.pdf
    25 Nov 2005: a student’s preparation for entry into the global. workplace. Through the “University of Canada” in Britain,. ... world, including postgraduates, with high-level plenary. speakers from Canada. It publishes a respected refereed.
  8. Operating system support for simultaneous multithreaded processors

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-619.pdf
    26 Feb 2005: The fetched uops arefed into a queue partitioned to give each thread half of the entries. ... The data TLB is dynamically shared and each entry is tagged bylogical processor.
  9. 9 Aug 2005: Both their large size (and consequent memory requirements),and the training set sparseness associated with large numbers of parameters, limits n to 2, 3 or perhaps4. ... from the symmetry requirement, we may write:. Probability in of any event occurring
  10. Abstracting application-level security policy for ubiquitous computing

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-613.pdf
    7 Jan 2005: Mobile Agents are attractive for many reasons [107] including overcoming effects of la-tency, lowering bandwidth requirements, increasing fault-tolerance and maximising use of dis-tributed resources.
  11. Simple polymorphic usage analysis

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-623.pdf
    17 Mar 2005: The necessary modifications are. 4The amusing origin of the term is given in the eponymous entry of [Ray91]. ... We sometimesrefer to thunks that are not updated as single-entry thunks.
  12. an2000.dvi

    www.damtp.cam.ac.uk/user/na/NA_papers/NA2000_03.pdf
    26 Sep 2005: Acta Numerica (2005), pp. 1–148 c Cambridge University Press, 1999. Lie-group methods. Arieh Iserles. Department of Applied Mathematics and Theoretical Physics,. University of Cambridge, England. Email: a.iserles@damtp.cam.ac.uk. Hans Z.
  13. Detection of Human Faces under Scale, Orientation and Viewpoint ...

    mi.eng.cam.ac.uk/reports/svr-ftp/auto-pdf/yow_fg96_2.pdf
    9 Aug 2005: The entries in the CPT can be estimated directly by usingthe statistics of the set of examples (Russell et.al. ... fil-ters to give a 1% error approximation for a 3:1 filter (Perona[11]) - a huge saving in computational requirements.
  14. Discriminative training methods and their applications to handwriting …

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-652.pdf
    23 Nov 2005: This can be applied to a wide range of applications such as automaticrecognition of the handwritten entry in the forms and recognising the handwriting inputsin the hand-held devices. ... In con-trast, discriminative training removes the requirement of
  15. TCP, UDP, and Sockets: rigorous and experimentally-validated…

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-625.pdf
    18 Mar 2005: 60– ifd. 60– routing table entry. 60– type abbrev routing table.
  16. JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 1, NO. 1, JANUARY ...

    https://www.cl.cam.ac.uk/research/srg/netos/papers/2005-moore2005optical.pdf
    11 Jul 2005: We then scale each histogram matrix so thatthe sum of all entries in each matrix is 1. ... In addition to opticalissues of data-pattern, the packaging requirements imposedin the electrical domain can exacerbate this effect.
  17. 9 Aug 2005: The size of the tentative-list is of prime practical importance during first-pass processing, since each entry requires significantlymore storage than in the fixed-list. ... $% &(' () %%-,. / 0 %h11of the model has low memory requirements, the technique
  18. Introduction to Security Markus Kuhn Computer Laboratory…

    https://www.cl.cam.ac.uk/teaching/2004/IntroSecurity/slides-4up.pdf
    27 Jan 2005: Covers not only operating systems but a broad spectrum ofsecurity products and associated security requirements. ... Separates functional and security requirements from the inten-sity of required testing (evaluation assurance level, EAL).
  19. Live Migration of Virtual Machines Christopher Clark, Keir Fraser, ...

    https://www.cl.cam.ac.uk/research/srg/netos/papers/2005-migration-nsdi-pre.pdf
    22 Mar 2005: To address these requirements we observed that in a clus-ter environment, the network interfaces of the source anddestination machines typically exist on a single switchedLAN. ... We solve this difficulty by logicallycheckpointing the OS on entry to a
  20. PERL(1) PerlProgrammers Reference Guide PERL(1) NAMEperl − Practical…

    https://www.cl.cam.ac.uk/teaching/2006/UnixTools/perl.pdf
    26 Aug 2005: Symbol table entries can be named with an initial ’’, butyou don’t really care about that yet (if ever :). Every variable type has its own namespace, as do several non-variable ... Context. The interpretation of operations and values in Perl
  21. PERL(1) PerlProgrammers Reference Guide PERL(1) NAMEperl − Practical…

    https://www.cl.cam.ac.uk/teaching/2005/UnixTools/perl.pdf
    26 Aug 2005: Symbol table entries can be named with an initial ’’, butyou don’t really care about that yet (if ever :). Every variable type has its own namespace, as do several non-variable ... Context. The interpretation of operations and values in Perl
  22. Cooperation and deviation in market-based resource allocation

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-622.pdf
    8 Mar 2005: Appendix A describes the discrete event simulator that we implement in Java to suitthe requirements of our simulation. ... Depending on both players’ choice each player receives his payoff, player A the firsttuple entry and player B, the second one.
  23. Natural Language Processing2005, 8 Lectures, Michaelams TermOctober…

    https://www.cl.cam.ac.uk/teaching/2005/NLP/lectures.pdf
    11 Oct 2005: Lecture 8 will discuss the architecture and requirements of afew applications in a bit more detail. ... For some applications, there is a requirement thatmorphological processing is bidirectional: that is, can be used for analysis and generation.
  24. AST: scalable synchronizationSupervisors’ guide 2004…

    https://www.cl.cam.ac.uk/teaching/2004/AdvSysTop/scalesync-guide.pdf
    12 Feb 2005: A cache blocks of, say,64 bytes would therefore hold 16 of the entries. ... Thearray should perhaps be spread out so that each entry lies on a separate cache block.
  25. WII report

    https://www.geog.cam.ac.uk/files/research/projects/harda/reports/B9-WIIReport.pdf
    4 May 2005: Perceptions of Sangathans and NGOs. Winrock International India/Cambridge Harda -Report 1. Incorporating Stakeholder Perceptions in Participatory Forest Management in India. PERCEPTIONS OF. SANGATHANS AND NGOs. Winrock International India New Delhi.
  26. 4 — MEANS AND VARIANCES The term expectation (or ...

    https://www.cl.cam.ac.uk/teaching/2004/Probability/prob04.pdf
    5 Jan 2005: The Geometric distribution satisfies the informal requirement of being an indexed set ofprobabilities whose sum is 1. ... In principle there will be 49 lines of entries inthe main table but it is not necessary to fill this in.
  27. B15 Policy summary

    https://www.geog.cam.ac.uk/files/research/projects/harda/reports/B15-PolicySummary.pdf
    4 May 2005: At the local level, the forest committees were now controlling everyday access to the forests, and this meant that villagers were facing fewer restrictions on access for meeting their nistar requirements. ... Although the mandate of the department was
  28. TCP, UDP, and Sockets: rigorous and experimentally-validated…

    https://www.cl.cam.ac.uk/~pes20/Netsem/tr.pdf
    18 Mar 2005: 2. been made. A small sample of later RFCs include:. Requirements for Internet Hosts — Communication Layers RFC 1122 1989TCP Extensions for High Performance RFC 1323 1992The NewReno Modification to TCP’s
  29. 2. Money and Tools for it's management

    https://www.cl.cam.ac.uk/teaching/2004/Business/Bl2.ppt
    3 May 2005: To control, you must first measure. Statutory duty. Legal requirements;. Keep proper books of account. ... Double entry. Materiality. Principles 3. Ethics. Prudence - if in doubt, understate profts, overstate losses.
  30. 32810 SPRI Annual Report v2

    https://www.spri.cam.ac.uk/about/sprireview/2004/review2004.pdf
    29 Jun 2005: This cements SPRI’s longstandingand close international ties with Canada. Funding from theFoundation for Canadian Studies and the Government ofCanada has enabled us to support postgraduate travellingscholarships and begin a new
  31. ComparativeArchitectures CST Part II, 16 lectures Lent Term 2005 ...

    https://www.cl.cam.ac.uk/teaching/0405/CompArch/mynotes.pdf
    20 Jan 2005: typically 32-128 entries. – sometimes an L2 Joint-TLB e.g. 512 entry. • ... Install TLB Entry instruction– specify tag and PTE. – replacement policy usually determined by h/w.
  32. Microsoft PowerPoint - SoftwareEngII-1-0

    https://www.cl.cam.ac.uk/teaching/2004/SWEng2/SoftwareEngII-2005.pdf
    8 Apr 2005: Define process as nested set of execution blocks, with fixed entry and exit points. ... To engineer is human” (Petroski)The requirements for design conflict and cannot be.
  33. monopole.dvi

    www.damtp.cam.ac.uk/user/tong/tasi/monopole.pdf
    30 Sep 2005: in singular gauge. The final requirement is that our gauge transformation is single. ... a monopole to infinity [50] except for the requirement that Ji is irreducible.
  34. Basic Economics

    https://www.cl.cam.ac.uk/teaching/2004/Ecommerce/Ecommerce3.ppt
    3 May 2005: Executive Summary and funding requirement. 1. Concept. 2. The Market. 3.1  Global market size and need. ... Double entry book-keeping. Stock and accounting control. Take up staff references.
  35. Non-blocking hashtables with open addressing

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-639.pdf
    4 Oct 2005: include resizing the table and replacing, rather than erasing, entries. The result is a. ... Assist completion of earlier entry. 0 2 0 0 1 0 0 0.
  36. ISSUE 25

    https://www.quaternary.group.cam.ac.uk/camqua/31.pdf
    6 May 2005: be made, followed by discussion. Detailed programme:Detailed programme:Detailed programme:Detailed programme:Detailed programme: http://www.geog.qmul.ac.uk/postgraduate/workshop/. ... an opportunity for all postgraduates, both masters and PhD students,to
  37. Microsoft PowerPoint - SoftwareEngDesign-3-1

    https://www.cl.cam.ac.uk/teaching/2005/SWEngDes/SWEngDes2005.pdf
    13 Oct 2005: London Ambulance Service. 9. Special emphases of this courseRequirements:. User centred interaction design, not older requirements capture methods (Pressman describes both). ... To the “bold” entry in the font dialog:distance 268 pixels, width 16
  38. Operating Systems I Steven Hand Easter Term 2005 12 ...

    https://www.cl.cam.ac.uk/teaching/2004/OpSys1/handout-1up.pdf
    3 May 2005: Memory requirement = xy depth, e.g.1024x768 @ 16bpp needs 1536KB.
  39. Natural Language Processing2005, 8 Lectures (Fixed version, March 3…

    https://www.cl.cam.ac.uk/teaching/2004/NatLangProc/lectures-fixed.pdf
    4 Mar 2005: Lecture 8 will discuss the architecture and requirements of afew applications in a bit more detail. ... For some applications, there is a requirement thatmorphological processing is bidirectional: that is, can be used for analysis and generation.
  40. 10 — BIVARIATE DISTRIBUTIONS After some discussion of the ...

    https://www.cl.cam.ac.uk/teaching/2004/Probability/prob10.pdf
    5 Jan 2005: Different lengths of peg correspond to different probabilities. Axiom II requires the sum of all the entries in the table (which is the total length of thepegs) to be 1. ... It is easy to verify that this requirement is satisfied in the present case:.
  41. https://people.ast.cam.ac.uk/~wfcam/docs/minutes/minutes_050217.txt

    https://people.ast.cam.ac.uk/~wfcam/docs/minutes/minutes_050217.txt
    25 Feb 2005: made no further progress on updating the CASU group web pages entry point - ongoing EGS has made progress on the calibration of large WFS surveys. ... The main requirements for desktops would be for RWA, MR and EGS, since they currently have old systems.
  42. Peer-to-Peer Systems and the GridJon Crowcroft, Tim Moreton, Ian ...

    https://www.cl.cam.ac.uk/teaching/2004/AdvSysTop/grid-p2p-paper.pdf
    23 Jan 2005: Entries for evicteddocuments are maintained, but without the attached data. On receiving a request for a keywhere no cache entry exists, a node finds the entry for the document with key ... Finally, we considerstorage requirements in Grid computing
  43. GNU Make GNU MakeA Program for Directing Recompilation GNU ...

    https://www.cl.cam.ac.uk/teaching/2005/UnixTools/make.pdf
    26 Aug 2005: In this style of makefile, you group entries by their prerequisites instead of by theirtargets.
  44. Semantics of Programming LanguagesComputer Science Tripos, Part 1B…

    https://www.cl.cam.ac.uk/teaching/2004/Semantics/notes.pdf
    8 Jan 2005: while(iter.hasNext()) {. java.util.Map.Entry e = (java.util.Map.Entry)iter.next();. ret = "(" e.getKey() " |-> " e.getValue() ")";. if(iter.hasNext()) ret =", ";. }. return ret "]";. }. }. class Environment {. java.util.HashSet env =
  45. Semantics of Programming LanguagesComputer Science Tripos, Part 1B…

    https://www.cl.cam.ac.uk/teaching/2003/Semantics/notes.pdf
    8 Jan 2005: while(iter.hasNext()) {. java.util.Map.Entry e = (java.util.Map.Entry)iter.next();. ret = "(" e.getKey() " |-> " e.getValue() ")";. if(iter.hasNext()) ret =", ";. }. return ret "]";. }. }. class Environment {. java.util.HashSet env =
  46. Workshop reports

    https://www.geog.cam.ac.uk/files/research/projects/harda/reports/B16-WorkshopReports.pdf
    4 May 2005: The. Department could undertake large scale entry point activities only because of the funding. ... perceives that the infrastructure development that took place as a part of the entry point.
  47. Global public computing

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-615.pdf
    31 Jan 2005: deployment at a low cost of entry, new services and business opportunities will. ... An. infrastructure to provide service deployment at a low cost of entry, in terms of.
  48. TCP, UDP, and Sockets: rigorous and experimentally-validated…

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-624.pdf
    18 Mar 2005: 2. been made. A small sample of later RFCs include:. Requirements for Internet Hosts — Communication Layers RFC 1122 1989TCP Extensions for High Performance RFC 1323 1992The NewReno Modification to TCP’s
  49. Efficient computer interfaces using continuous gestures, language…

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-627.pdf
    24 Mar 2005: Graceful fallback to normal Dasher text entry in the face of recognition errors. • ... Figure 19: Partial paths in lattice-based model after entry of “the_cat”.
  50. General

    https://www.cl.cam.ac.uk/teaching/2005/DigiCommII/switching_97.ppt
    2 Oct 2005: entries: (128.32., 3), (128.32.1., 4), (128.32.1.20, 2). A standard solution: trie. ... But we could fragment at entry and reassemble at exit. Or build an asynchronous fabric.
  51. Network Access Technologies:

    https://www.cl.cam.ac.uk/research/srg/netos/papers/2005-xen-ols.ppt
    24 Jul 2005: Memory requirements. Hiding which machine pages are in use: may interfere with page colouring, large TLB entries etc. ... VMs have lots of state in memory. Some VMs have soft real-time requirements.

Refine your results

Format

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.