Search

Search Funnelback University

Search powered by Funnelback
1 - 50 of 110 search results for postgraduate entry requirements where 2 match all words and 108 match some words.
  1. Fully-matching results

  2. 16 May 2005: PhD applications for October entry must be received by the end of the preceding March. ... Those interested in this course should read the CSTIT Entry Requirements and Admission Procedure page.
  3. HCI-notes-7-1

    https://www.cl.cam.ac.uk/teaching/2005/HCI/HCI2005.pdf
    20 Oct 2005: The implication of the GOMS method was that the requirements of the user can be predicted exactly from the nature of the software application. ... Incremental prototyping requires that the rapid prototyping tool also meets the engineering requirements of
  4. Results that match 2 of 3 words

  5. Budding writers get brainy | University of Cambridge

    https://www.cam.ac.uk/news/budding-writers-get-brainy
    2 Dec 2005: Dr William Davies, a postdoctoral researcher from the Babraham Institute produced a winning entry for his article ‘Battle for the Brain’. ... Created to celebrate the amazing field of brain science, this national writing competition received a huge
  6. Collapsed LAN

    https://www.cl.cam.ac.uk/research/dtg/attarchive/clan/
    30 Aug 2005: maximum transfer rate of 880Mb/s at 32KB transfers, but half our maximum rate is achieved at 128 Byte transfers and our buffer space requirement is only 10KB per endpoint. ... The file descriptor corresponding to a Tripwire event queue is a member of a
  7. https://people.ast.cam.ac.uk/~wfcam/docs/minutes/minutes_050107.txt

    https://people.ast.cam.ac.uk/~wfcam/docs/minutes/minutes_050107.txt
    12 Jan 2005: JMS suggested that any extra documentation for the additional UK VDFS requirements should be at the functional specification level, ie. ... Many of the problems with the design of the ETC are related to the overlap of the ETC requirements with the design
  8. https://people.ast.cam.ac.uk/~wfcam/docs/minutes/minutes_050418.txt

    https://people.ast.cam.ac.uk/~wfcam/docs/minutes/minutes_050418.txt
    20 Apr 2005: An interesting misunderstanding has arisen about ESO's requirements on the deliverable science products for the processed public survey VST data. ... The software packages tomcat (Solaris 10) and mavan? were mentioned as installation requirements.
  9. Operating Systems II— Additional Information — Steven HandLent Term…

    https://www.cl.cam.ac.uk/teaching/2005/OpSysII/osII-additional.pdf
    6 Oct 2005: An IPT is a fixed size hash table containing one entry for each physical frame ofmemory. ... Each hand points to an entry in the core map, a fixeddistance apart.
  10. UNIX AND X by Frank H. King An Introduction ...

    https://www.cl.cam.ac.uk/teaching/2005/FoundsProg/ses1.pdf
    28 Sep 2005: This brings up a Menu which contains various entries including New Terminal whichmay be the fourth entry down. • ... Click this icon. • This brings up the Main Menu whose entries include Unix Shell and (as the last entry)Log Out. •
  11. Introduction to Security Markus Kuhn Computer Laboratory…

    https://www.cl.cam.ac.uk/teaching/2004/IntroSecurity/slides.pdf
    27 Jan 2005: Covers not only operating systems but a broad spectrum ofsecurity products and associated security requirements. ... Separates functional and security requirements from the inten-sity of required testing (evaluation assurance level, EAL).
  12. Report Template

    https://www.hep.phy.cam.ac.uk/~lester/dtm662/RCD.doc
    26 Aug 2005: As a consequence, it has to satisfy a set of requirements coming from a large set of use cases. ... The requirements file of the RCDExampleConfiguration package can be taken as an example.
  13. Quality of Service Routing for Supporting Multimedia Applications…

    https://www.cl.cam.ac.uk/~jac22/otalks/wang96quality.pdf
    18 Apr 2005: The information they contain should. make it possible to support basic QoS requirements. ... Some requirements. such as reliability obviously can not be supported by such metrics.
  14. UNIX AND X by Frank H. King An Introduction ...

    https://www.cl.cam.ac.uk/teaching/2004/FoundsProg/ses1.pdf
    17 Aug 2005: This brings up a Menu which contains various entries including New Terminal whichmay be the fourth entry down. • ... Click this icon. • This brings up the Main Menu whose entries include Unix Shell and (as the last entry)Log Out. •
  15. Business Studies for Computer Scientists, or "How to Start and…

    https://www.cl.cam.ac.uk/teaching/2004/Business/Bl1.ppt
    3 May 2005: Why me? Barriers to market entry. What have you got to make it through? ... High. Consultancy. Cost of entry. Game. Battleship. FMCG. Movie. Car. How?
  16. 01Eichler(Hedge)

    https://www2.mrc-lmb.cam.ac.uk/groups/hegde/download/33_Hegde_RS_Chapter_2005.pdf
    31 Oct 2005: By contrast, translocation into the ER (open arrow) is often regarded as a constitutive process wherethe presence of a signal sequence in a protein predetermines its entry into the ER. ... Thus, the entry of proteins into the ER is not necessarilya
  17. Introduction to Security Markus Kuhn Computer Laboratory…

    https://www.cl.cam.ac.uk/teaching/2004/IntroSecurity/slides-2up.pdf
    27 Jan 2005: Covers not only operating systems but a broad spectrum ofsecurity products and associated security requirements. ... Separates functional and security requirements from the inten-sity of required testing (evaluation assurance level, EAL).
  18. https://people.ast.cam.ac.uk/~wfcam/docs/minutes/minutes_050309.txt

    https://people.ast.cam.ac.uk/~wfcam/docs/minutes/minutes_050309.txt
    10 Mar 2005: DWE said that he would have a look into this. He also said that he would get a proper CASU entry point set up. ... The UK User Requirements document will be frozen on 15 April (some comments are still being assessed).
  19. Network Access Technologies:

    https://www.cl.cam.ac.uk/research/srg/netos/papers/2005-xen-may.ppt
    11 Jun 2005: At least double the number of faults. Memory requirements. Hiding which machine pages are in use: may interfere with page colouring, large TLB entries etc. ... Some VMs have soft real-time requirements. E.g. web servers, databases, game servers.
  20. Chapter 27 p. 751 27 Windows 2000 27.1 Introduction ...

    https://www.cl.cam.ac.uk/teaching/2005/OSFounds/OSch27-WinNT2000XP.DOC
    2 Sep 2005: A default access control list (ACL) is shown as a number of chained access control entries (ACE). ... This continues to be used in Windows 2000. 27.7.1 NTFS requirements.
  21. thesis.dvi

    https://www.cl.cam.ac.uk/research/dtg/attarchive/location/sdc.pdf
    28 Jun 2005: the conguration burden to the devices themselves, maximising their utility. whilst minimising their requirements of users. ... such as e-mail and diary entries to users [Finney96]. Active Badge location.
  22. Concurrent Systemsand Applications CST Part 1B, Michaelmas 2004 John…

    https://www.cl.cam.ac.uk/teaching/2004/ConcSys/cs+a.pdf
    4 Jan 2005: Concurrent Systemsand Applications. CST Part 1B, Michaelmas 2004. John K Fawcett. john.fawcett@cl.cam.ac.uk. Lecture 1: Introduction. Concurrent Systems and Applications is closely based on last. year’s course of the same name by Tim Harris, and
  23. mva2005final.dvi

    https://www.cl.cam.ac.uk/~cpt23/papers/TownMVA2006.pdf
    27 Dec 2005: bright red”, “dark green”, “vivid colours”. – sizedescriptor: Desired size of regions matching theother criteria in a requirement, e.g. ... Querysentences consist of requirements which yield matchingprobabilities that are further modified and
  24. Parallel iterative solution method for large sparse linear equation…

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-650.pdf
    1 Nov 2005: The original diagonal entries can be storedon disk for computing π from y. ... Hence, the diagonal entries of the matrixin Figure 1(a) are all zero.
  25. UNIVERSITY OFCAMBRIDGEComputer Laboratory Computer Science Tripos…

    https://www.cl.cam.ac.uk/teaching/2004/OptComp/notes04.pdf
    11 Jan 2005: ENTRY f : no predecessors;. • EXIT: no successors;. • ALU a, b, c: one successor;. • ... This leads to an algorithm (assumingflowgraph node 1 is the only entry node):.
  26. Operating Systems I Steven Hand Michaelmas / Lent Term ...

    https://www.cl.cam.ac.uk/teaching/2005/OpSysI/handout1-1up.pdf
    18 Nov 2005: Memory requirement = xy depth, e.g.1280x1024 @ 16bpp needs 2560KB.
  27. Concurrent Systemsand Applications CST Part 1B, Michaelmas 2005 Dr ...

    https://www.cl.cam.ac.uk/teaching/2005/ConcSys/cs_a-2005.pdf
    19 Dec 2005: Concurrent Systemsand Applications. CST Part 1B, Michaelmas 2005. Dr John K Fawcett. john.fawcett@cl.cam.ac.uk. Lecture 1: Introduction. Concurrent Systems and Applications is closely based on last. year’s course of the same name, and is a
  28. Routing for Integrated Services New routing requirements Multiparty…

    https://www.cl.cam.ac.uk/teaching/2005/DigiCommII/route-int-serve.ppt
    2 Oct 2005: Routing for Integrated Services. New routing requirements. Multiparty communication:. conferencing (audio, video, whiteboard). ... Such application including multimedia conferencing, remote teaching and multi-user games. These may demanding have QoS
  29. AdvancedSystemsTopics CST Part 2, Lent 2005 Lectures 7–10 Scalable ...

    https://www.cl.cam.ac.uk/teaching/2004/AdvSysTop/scalesync-slides.pdf
    12 Feb 2005: Non-blocking data structures Correctness requirements Current research. Scalable synchronization Slide 7-2. ... ä Loops storing an entry in it (1 time in 1000) or reading.
  30. LOI-LHCB.DVI

    https://www.hep.phy.cam.ac.uk/lhcb/docs/LHCb_letter_of_intent.pdf
    19 Oct 2005: Alternative technologies. Calorimetry. Performance requirements. Electromagnetic calorimeter. Outer EM calorimeter. Inner EM calorimeter. ... ecient highpt muon trigger CathodeStrip Chambers are described as an example of a system that could satisfy the
  31. Technical ReportNumber 653 Computer Laboratory UCAM-CL-TR-653ISSN…

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-653.pdf
    6 Dec 2005: their requirements are sufficiently different from those of ISPs as to cause substantial. ... the creation of DNS entries) then one can determine the hostname for my laptop,.
  32. Operating Systems I Steven Hand Michaelmas / Lent Term ...

    https://www.cl.cam.ac.uk/teaching/2006/OpSystems/handout1-1up.pdf
    18 Nov 2005: Memory requirement = xy depth, e.g.1280x1024 @ 16bpp needs 2560KB.
  33. OpenMP C and C++Application ProgramInterface Version 2.0 March 2002…

    https://www.cl.cam.ac.uk/teaching/2004/AdvSysTop/cspec20.pdf
    12 Feb 2005: There is noimplied barrier either on entry to or exit from the master construct. ... barrier. At entry to and exit from critical. At entry to and exit from ordered.
  34. End-user programming in multiple languages

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-651.pdf
    4 Nov 2005: 574.2 Requirements of Mappings. 574.3 Execution as Mapping. 584.4 Secondary Notation in Multiple Languages. ... The intention is that UPnP is embedded in every device. This is perhapsoptimistic, as the standard’s minimum requirements include an IP stack
  35. Miscellania Some topics that don’t quite fit… Lecture objectives ...

    https://www.cl.cam.ac.uk/teaching/2005/DigiCommII/misc.ppt
    2 Oct 2005: 3. based on the destination address, the router selects candidate routing table entries, and for each candidate entry, saves the next hop address, the address mask for the address and the ... 4. after all the candidate entries have been found an entry
  36. Using trust and risk for access control in Global Computing

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-643.pdf
    8 Aug 2005: This work serves as a more detailed analysisof the security requirements of one of the possible application scenarios outlinedabove.
  37. PIC12C67X, 8-Pin, 8-Bit CMOS Microcontroller with A/D Converter and…

    https://www.cl.cam.ac.uk/research/srg/han/Lambda/webdocs/pic12c67x.pdf
    25 Dec 2005: The serial num-bers may be random, pseudo-random, or sequential. Serial programming allows each device to have aunique number which can serve as an entry-code,password, or ID number.
  38. Bacterial chromosome segregation: structure andDNA binding of the Soj …

    https://www2.mrc-lmb.cam.ac.uk/groups/JYL/PDF/soj_embo2005.pdf
    30 Jan 2005: confirming that ATP-dependent dimerisation is the critical. requirement for assembly of the protein onto DNA (Figure. ... domains dimerise, a requirement for HTH-mediated DNA. binding (Leonard et al, 2004).
  39. Moment-free numerical integration of highly oscillatory functions…

    www.damtp.cam.ac.uk/user/na/NA_papers/NA2005_04.pdf
    14 Sep 2005: , f =. . f(x0). f(m01)(x0) f(xν). f(mν1)(xν). . For notational brevity we regard matrices as row vectors whose entries are column
  40. Middleware support for context-awareness in distributed sensor-driven …

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-620.pdf
    5 Mar 2005: 96. 5 A Conceptual Framework 995.1 Requirements of Context-Awareness in Sentient Computing. ... This section elaborates on the requirements of Section 1.1 and focuses on theirsatisfiability in the context of Sentient Computing.
  41. thesis.dvi

    https://www.cl.cam.ac.uk/~cpt23/papers/TownPhD.pdf
    22 Mar 2005: represent abstract and arbitrarily complex retrieval requirements at different levels. of conceptual granularity. ... take place in order to better infer and anticipate user intentions and requirements.
  42. Cryptographic processors - a survey

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-641.pdf
    8 Aug 2005: The authorization codes in par-ticular have some interesting and complex requirements,described in [3]. ... Many engineersare familiar with these cheap, standard components. Thecheapest microcontrollers cannot perform public-key cryp-tography in a
  43. TCP, UDP, and Sockets: rigorous and experimentally-validated…

    https://www.cl.cam.ac.uk/~pes20/Netsem/alldoc.pdf
    18 Mar 2005: 60– ifd. 60– routing table entry. 60– type abbrev routing table.
  44. Foundations of Computer Science Computer Science Tripos Part IA ...

    https://www.cl.cam.ac.uk/teaching/2005/FoundsCS/slides.pdf
    31 Aug 2005: Programmers need a variety of skills:. • to communicate requirements, so they solve the right problem. • ... Indexed by sayeight bits taken from a, the table would have only 256 entries.
  45. Location privacy in ubiquitous computing

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-612.pdf
    4 Jan 2005: Other important factors include size, weight, installation requirements,robustness to environment (including visual occlusion, heat, sound, magnetic and radio waves),freedom of movement (e.g. ... ensure adjacent cells do not use the same transmission
  46. On the quadrature of multivariate highly oscillatory integrals over…

    www.damtp.cam.ac.uk/user/na/NA_papers/NA2005_07.pdf
    3 Oct 2005: Feiωg. ]= feiωg then computing Ig[f, (a,b)] is trivial. We can rewrite this requirement. ... Though it is often more accuratethan a Levin-type method, the requirement of knowing moments makes it much less practical formultivariate integrals.
  47. Virtual Private Machines: De-stressing systems

    https://www.cl.cam.ac.uk/teaching/2005/DigiCommII/msr-guest.ppt
    27 Oct 2005: My view: basic “need-to-know” requirements are. What should be happening? [ c ]. What is happening? [ f, p, a ]. What shouldn’t be happening? [ ... each entry annotated with current route from src to dst. N.B.
  48. 30 Years brochure.indd

    https://www.spri.cam.ac.uk/research/projects/ccsi/canadianstudies30uk.pdf
    25 Nov 2005: a student’s preparation for entry into the global. workplace. Through the “University of Canada” in Britain,. ... world, including postgraduates, with high-level plenary. speakers from Canada. It publishes a respected refereed.
  49. Operating system support for simultaneous multithreaded processors

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-619.pdf
    26 Feb 2005: The fetched uops arefed into a queue partitioned to give each thread half of the entries. ... The data TLB is dynamically shared and each entry is tagged bylogical processor.
  50. 9 Aug 2005: Both their large size (and consequent memory requirements),and the training set sparseness associated with large numbers of parameters, limits n to 2, 3 or perhaps4. ... from the symmetry requirement, we may write:. Probability in of any event occurring
  51. Abstracting application-level security policy for ubiquitous computing

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-613.pdf
    7 Jan 2005: Mobile Agents are attractive for many reasons [107] including overcoming effects of la-tency, lowering bandwidth requirements, increasing fault-tolerance and maximising use of dis-tributed resources.
  52. Simple polymorphic usage analysis

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-623.pdf
    17 Mar 2005: The necessary modifications are. 4The amusing origin of the term is given in the eponymous entry of [Ray91]. ... We sometimesrefer to thunks that are not updated as single-entry thunks.

Refine your results

Format

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.