Search

Search Funnelback University

Search powered by Funnelback
101 - 150 of 232 search results for postgraduate entry requirements where 9 match all words and 223 match some words.
  1. Results that match 2 of 3 words

  2. csaa.dvi

    https://www.cl.cam.ac.uk/teaching/0809/ConcSys/csaa-concurrency.pdf
    18 Nov 2008: 3. Requirements for deadlock. If all of the following conditions are true then deadlock exists:. ... empty. If the queue is non-empty the thread selects an entry and.
  3. Energy-Efficient Sentient Computing

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-722.pdf
    9 Jul 2008: requirements remain small. As we shall see later on, the requirement that the energy consumption of these “supern-. ... DAPH, we begin by considering the options for reducing the overall energy requirement.
  4. A capability-based access control architecture for multi-domain…

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-720.pdf
    28 Jun 2008: firm. The two layer access control approach accommodates this dichotomy of requirements.
  5. OpenMP C and C++Application ProgramInterface Version 2.0 March 2002…

    https://www.cl.cam.ac.uk/teaching/0708/AdvSysTop/cspec20.pdf
    10 Jan 2008: There is noimplied barrier either on entry to or exit from the master construct. ... barrier. At entry to and exit from critical. At entry to and exit from ordered.
  6. Technical ReportNumber 709 Computer Laboratory UCAM-CL-TR-709ISSN…

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-709.pdf
    5 Feb 2008: 42. 3.3 Security Requirements. 43. 3.4 Identity-Based Cryptography. 44. 3.4.1 Pairings. ... 5.1 Outline. 87. 5.2 Related Work. 88. 5.3 Security Requirements. 88.
  7. AdvancedSystemsTopics CST Part II, Lent 2008 4 lectures of ...

    https://www.cl.cam.ac.uk/teaching/0708/AdvSysTop/ast-kaf.pdf
    10 Jan 2008: ä Loops storing an entry in it (1 time in 1000) or reading. ... workload. memory-access costs. scalability requirements. Before investigating lock designs and their tradeoffs, we must.
  8. TSE-0221-0805-1 1..17

    https://www.cl.cam.ac.uk/~cm542/papers/tse-satin.pdf
    29 Feb 2008: smaller, and more capable. We argue that mobile systems should be able to adapt to changing requirements and execution. ... The reader may consider the requirement for adaptationcontradictory to the current success of nonadaptive mobilesystems.
  9. Modular fine-grained concurrency verification

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-726.pdf
    15 Jul 2008: to be checked, and presents some extensions for further modularity. • Chapter 5 discusses linearisability, the standard correctness requirement for fine-. ... atomicity requirements they have. Variables First, we must distinguish between logical
  10. Topics in Analysis: Example Sheet 1 Lent 2007-08 N. ...

    www.dpmms.cam.ac.uk/study/II/TopicsinAnalysis/2007-2008/sheet1.pdf
    4 Feb 2008: By considering a suitable map from thetriangle T = {x R3 : x1, x2, x3 0, x1 x2 x3 = 1} into itself, prove that A has an eigenvectorwith positive entries. ... someτ 0, and for each x D, the requirement that this point belongs to D determines uniquely anon
  11. Cooperative attack and defense in distributed networks

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-718.pdf
    20 Jun 2008: 42. 3.3 Discussion. 43. 3.3.1 Storage requirements. 43. 3.3.2 The cost of pre-distributing secrets.
  12. On using fuzzy data in security mechanisms

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-715.pdf
    21 Apr 2008: 6.1 Summary. 616.2 Future work. 62. 7. Chapter 1. Introduction. This dissertation studies how to use fuzzy data – obtained from physical measurements – tofulfil security requirements.
  13. TH EJ OU RN AL OF CE LL BIO ...

    https://www2.mrc-lmb.cam.ac.uk/groups/hegde/download/53_Hegde_RS_JCB_2008.pdf
    22 Jul 2008: When posi-tioned in the looped orientation, elongation of the nascent chain results in its entry into the ER lumen. ... The only requirement would be a capacity to interact, at least weakly, with specifi c regions of a nascent chain to bias its
  14. Particle Flow Calorimetry and ILC Detector Design

    https://www.hep.phy.cam.ac.uk/~thomson/talks/BonnFinal.pdf
    31 Jan 2008: Some preliminary. Physics performance depends critically on the detectorperformance (not true at LEP)Places stringent requirements on the ILC detector. ... 6 entries/event. 1 entry/event. HERE: PandoraPFA PerfectPFA. “Physics Ready PFA”. Bonn,
  15. Thesis Chapter 0

    https://www2.mrc-lmb.cam.ac.uk/groups/wschafer/Hardaker.pdf
    10 Jun 2008: elegans. A thesis submitted in partial satisfaction of the. requirements for the degree Master of Science.
  16. Concurrent Systemsand Applications CST Part 1B, Michaelmas 2007 Dr ...

    https://www.cl.cam.ac.uk/teaching/0708/ConcSys/cs+a-2007.pdf
    17 Jan 2008: Concurrent Systemsand Applications. CST Part 1B, Michaelmas 2007. Dr John K Fawcett. john.fawcett@cl.cam.ac.uk. Lecture 1: Introduction. Concurrent Systems and Applications is based on last year’s. course of the same name although several
  17. UNIVERSITYOF CAMBRIDGE Compiler Construction An 18-lecture course…

    https://www.cl.cam.ac.uk/teaching/0708/CompConstr/slides07.pdf
    27 Feb 2008: Compiler Construction 27 Lent Term 2007. UNIVERSITYOF. CAMBRIDGE. Typical code for procedure entry/return. ... r37:. At entry to callee:. foo: sw $ra,-4($sp) ; save $ra in new stack location.
  18. dc1.dvi

    https://www.cl.cam.ac.uk/teaching/0708/DigiCommI/dc1.pdf
    15 Jan 2008: Digital Communications I(Introduction to Digital Communications). Lent Term — 2008. Andrew W Mooreandrew.moore@cl.cam.ac.uk. Topic 1: Introduction. Course aims:. The aims of this course are to develop an understanding ofcommunications networks
  19. Sikhism faith guide

    https://www.equality.admin.cam.ac.uk/files/faith_guide_sikhism.pdf
    4 Mar 2008: Sikh students may have arrived from parts of the country where police and others are accustomed to Sikhs’ requirements. ... This is because there are strict requirements for attending to the scriptures appropriately.
  20. Simulation of Old and New PhysicsBryan Webber, University of ...

    https://www.hep.phy.cam.ac.uk/theory/webber/ParisNov06.pdf
    4 Dec 2008: The measurements and predictions wereperformed with a cone jet of radius 0.4 and with a requirement of 15 GeV or greater.The CKKW predictions are normalized to the first bin ... SUGRA point 5). Entries 100000. Mean 0.1266. RMS 0.5309. Q. -4 -2 0 2 40.
  21. Tangible user interfaces for peripheral interaction

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-733.pdf
    11 Dec 2008: 180. 7.8 Generality of Analysis: Relationship to Activity Theory. 183. 7.9 Generality of Analysis: Relationship to Entry Points. ... The configuration of physical and digital artefacts can also beseen as traces of previous external cognition (Preece et al
  22. Membrane fusion is the process whereby two separate lipid ...

    https://www2.mrc-lmb.cam.ac.uk/groups/hmm/publica/MartensMcMahon2008.pdf
    16 May 2008: Further-more, enveloped viruses gain entry into the cytosol by fusing their limiting membranes with host cell membranes (FIG. ... Analogous to the requirement of HOpS for efficient vacuole fusion. in yeast, the tethering factor and rab5 effector eeA1 is
  23. The Semantics of Power and ARM MultiprocessorMachine Code Jade ...

    https://www.cl.cam.ac.uk/~pes20/weakmemory/draft-ppc-arm.pdf
    14 Nov 2008: The Cookbook specification matchesthe Power semantics we describe above, except that thereis no requirement that p′ 6= p. ... It may be that this (ratherstrange) requirement is an error in the Power 2.05 specifica-tion — the text there speaks of
  24. 3 Oct 2008: The delta function is introduced to meet these requirements. 49. 3.1.2 Step function and delta function.
  25. PERL(1) PerlProgrammers Reference Guide PERL(1) NAMEperl − Practical…

    https://www.cl.cam.ac.uk/teaching/0809/UnixTools/perl.pdf
    25 Sep 2008: Symbol table entries can be named with an initial ’’, butyou don’t really care about that yet (if ever :). Every variable type has its own namespace, as do several non-variable ... Context. The interpretation of operations and values in Perl
  26. java.dvi

    https://www.cl.cam.ac.uk/teaching/0708/ProgJava/java.pdf
    4 Jan 2008: Programming in Java. A C Norman, Lent Term 2008. Part IA. 2. Contents. 1 Preface 71.1 What is programming about? 71.2 What aboutgoodprogramming? 81.3 Ways to save time and effort. 9. 1.3.1 Use existing resources. 91.3.2 Avoid dead-ends. 101.3.3
  27. sig-004.dvi

    mi.eng.cam.ac.uk/~mjfg/mjfg_NOW.pdf
    19 Mar 2008: Foundations and Trends R inSignal ProcessingVol. 1, No. 3 (2007) 195–304c 2008 M. Gales and S. YoungDOI: 10.1561/2000000004. The Application of Hidden Markov Modelsin Speech Recognition. Mark Gales1 and Steve Young2. 1 Cambridge University
  28. Complexity Theory Notes for a course of lectures for ...

    https://www.cl.cam.ac.uk/teaching/0708/Complexity/notes.pdf
    24 Apr 2008: In terms of space, the only requirements for work space are the two sets—S and the setof marked vertices. ... We mayneed some additional counters, each of log n bits, but the total work space requirement canbe bounded by O(n).
  29. Dissertation

    https://www2.mrc-lmb.cam.ac.uk/groups/wschafer/AndyHuang.pdf
    6 Mar 2008: A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy.
  30. slides.dvi

    https://www.cl.cam.ac.uk/teaching/0809/FoundsCS/fcs-notes.pdf
    1 Sep 2008: Programmers need a variety of skills:. • to communicate requirements, so they solve the right problem. • ... Indexed by sayeight bits taken from a, the table would have only 256 entries.
  31. 16 Jan 2008: independent given the previous state. Upon entry to a state θt =j, a single observation, ot,.
  32. 1 CAR: Context-aware Adaptive Routingfor Delay Tolerant Mobile…

    https://mobile-systems.cl.cam.ac.uk/papers/tmc08.pdf
    14 Jul 2008: Each entry of this table has the following structure:(targetHostId, nextHopId, dist, bestHopHostId, deliveryProb). ... As said before, the entry isremoved after a number of missing updates: this also avoids theproblem that entries with high probabilities
  33. Microsoft PowerPoint - Security Economics - Leuven 2008.ppt…

    https://www.cl.cam.ac.uk/~rnc1/talks/080908-securityeconomics.pdf
    22 Sep 2008: Different requirements for individuals, firms, security professionals (e.g. at ISPs and banks), academic researchers and policy-makers. • ... Policy options:• Policy options:Promote open standards to facilitate market entry.
  34. Algorithms I CST Part IA, Easter 2008 12 Lectures ...

    https://www.cl.cam.ac.uk/teaching/0708/AlgorithI/algorithms-2008.pdf
    29 Apr 2008: Algorithm analysis is all about expressing the resource requirements of analgorithm in terms of N , using the simplest possible expressions that areaccurate for large N. ... 2)/5. 10. Common growth rates. Most algorithms we will analyse have resource
  35. Microsoft PowerPoint - Security Economics - ENISA 2008.ppt…

    https://www.cl.cam.ac.uk/~rnc1/talks/080919-securityeconomics.pdf
    22 Sep 2008: Different requirements for individuals, firms, security professionals (e.g. at ISPs and banks), academic researchers and policy-makers. • ... Policy options:• Policy options:Promote open standards to facilitate market entry.
  36. ORIGINAL ARTICLE Mirco Musolesi Æ Cecilia Mascolo Æ Stephen ...

    https://mobile-systems.cl.cam.ac.uk/papers/pucj.pdf
    29 Feb 2008: Each entry is characterized by alease (a mechanism similar to that present in Jini [17]). ... its life is not extended), itcan expire and, consequently the entry is deleted fromthe registry.
  37. Bitext Alignment forStatistical Machine Translation Yonggang Deng A…

    mi.eng.cam.ac.uk/~wjb31/ppubs/YDengDissertationDec05.pdf
    16 Feb 2008: This example presents the target sentence as asequence of phrases, but there is no requirement that the target wordsgenerated by a source word should appear as neighbors in the targetsentence. ... The precisionof each of these is plotted versus its
  38. GNU Make GNU MakeA Program for Directing Recompilation GNU ...

    https://www.cl.cam.ac.uk/teaching/0809/UnixTools/make.pdf
    25 Sep 2008: In this style of makefile, you group entries by their prerequisites instead of by theirtargets.
  39. Performance Analysis and Prediction ofPhysically Mobile Systems…

    https://mobile-systems.cl.cam.ac.uk/papers/wosp07.pdf
    29 Feb 2008: Physical mobility is a requirement which developers havenot yet considered with the due care despite it having a hugeimpact on the performance of the system. ... LQN tasks, one for each component in the componentdiagram. The LQN tasks have as many
  40. A novel auto-calibration system for wireless sensor motes

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-727.pdf
    16 Sep 2008: This does not satisfy the requirements of our calibration program, and the Tx mote stops transmitting once the timer increases to a value beyond this limit.
  41. tech.dvi

    mi.eng.cam.ac.uk/reports/svr-ftp/hsu_tr584.pdf
    5 Sep 2008: The main disadvantage of this phantomis the requirement to align the phantom with the point fiducials, which can be very difficult.An advantage is that only one frame (N = 1 in ... Other research groups give the variation of thethree calibration
  42. People are the network: experimental design and evaluation of…

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-713.pdf
    18 Apr 2008: The constant C is mostly uninteresting; onceα. is fixed, it is determined by the requirement that the distribution p(x) sum to 1.) To reveal.
  43. Animation Manifolds for representing topological alteration

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-723.pdf
    10 Jul 2008: Technical ReportNumber 723. Computer Laboratory. UCAM-CL-TR-723ISSN 1476-2986. Animation manifolds forrepresenting topological alteration. Richard Southern. July 2008. 15 JJ Thomson Avenue. Cambridge CB3 0FD. United Kingdom. phone 44 1223 763500.
  44. Writing on the Clean Slate:Implementing a Socially-Aware Protocol in…

    https://mobile-systems.cl.cam.ac.uk/papers/aoc08.pdf
    17 Apr 2008: Each host maintains a routing table that is implementedas a HashMap containing entries that are instances ofthe class GentlyRoutingTableEntry. ... Automatic Selection of the Protocols Another interest-ing problem is the definition of the automatic
  45. Minimum Bayes-Risk Techniquesin Automatic Speech Recognition and…

    mi.eng.cam.ac.uk/~wjb31/ppubs/ShankarKumarDiss04.pdf
    16 Feb 2008: 82. 4.2 Distribution of the number of words in the target and the sourcephrases over the Phrase-Pair Inventory on the French-English Task.The entries are phrase-pair counts ... 83. 4.3 Distribution of the number of words in the target and the
  46. Computer Systems ModellingCase Studies Samuel KounevSystems Research…

    https://www.cl.cam.ac.uk/teaching/0708/CompSysMod/CSM-CaseStudies-LentTerm2008.pdf
    13 Feb 2008: CUSTOMER DOMAINOrder Entry Application. - Place Order- Change Order- Get Order Status- Get Customer Status. ... Number of order entry clients of each type –NewOrder, ChangeOrder, OrderStatus and CustStatus.
  47. 9 Jul 2008: varying signals [8], and has since formed the basis of many ASR systems.An HMM is a finite state machine, where the entry to each state has an associated outputdistribution,
  48. C:\2008\papers\latest\latestlat

    https://www.robinson.cam.ac.uk/iar1/teaching/p1paper3_2008.pdf
    18 Jun 2008: STATIONERY REQUIREMENTS SPECIAL REQUIREMENTS. 2 x 20 Page booklet List of statistical formulae. ... comment.(v) Determine the missing entries in the following table. Observation Predicted Dependent Variable Residual.
  49. paper.dvi

    https://www.cl.cam.ac.uk/research/srg/netos/projects/archive/coms/rc277/theo.pdf
    26 Sep 2008: cache entry to a long value (or possibly makeit permanent), requires fewer handoffs to maintain relativelycomplete RNV state. ... Nevertheless, despite the expiry ofRNV Cache entries, in-advance link state notifications do.
  50. Adapting Asynchronous Messaging Middlewareto Ad Hoc Networking Mirco…

    https://mobile-systems.cl.cam.ac.uk/papers/mwworkmirco04.pdf
    29 Feb 2008: The hosts that receive advertisement mes-sages add entries to their JNDI registry. ... Each entry is char-acterized by a lease (a mechanism similar to that presentin Jini [15]).
  51. 17 Sep 2008: Uncertainty Decoding forNoise Robust Speech Recognition. Hank Liao. Sidney Sussex CollegeUniversity of Cambridge. September 2007. This dissertation is submitted for the degree ofDoctor of Philosophy to the University of Cambridge. Declaration. This

Refine your results

Format

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.