Search

Search Funnelback University

Search powered by Funnelback
51 - 100 of 232 search results for postgraduate entry requirements where 9 match all words and 223 match some words.
  1. Results that match 2 of 3 words

  2. Major rise in caesarean sections linked to impaired womb function…

    https://www.cam.ac.uk/news/major-rise-in-caesarean-sections-linked-to-impaired-womb-function-with-age
    1 Jul 2008: The team examined more than 500,000 entries collected by the Scottish Morbidity Record between 1980 and 2005 to determine the association between maternal age and the outcome of labour.
  3. Processing Requirements for Video Compression

    https://www.cl.cam.ac.uk/~jac22/books/mm/book/node147.html
    2 Jan 2008: only have a table lookup of 2562 entries for the transform itself). ... To reduce further, we should consider pre-calculating some subset of the DCT Cos products, but need to then check that we do not have too high a memory requirement.
  4. Release of Darwin’s papers includes first draft of Theory of…

    https://www.cam.ac.uk/research/news/release-of-darwins-papers-includes-first-draft-of-theory-of-evolution
    Thumbnail for Release of Darwin’s papers includes first draft of Theory of Evolution | University of Cambridge 17 Apr 2008: A searchable electronic catalogue has entries for all of the papers and browseable whole volumes of the papers are available on a separate page.
  5. Education Faculty helps D&T teachers and policy-makers understand …

    https://www.cam.ac.uk/news/education-faculty-helps-dt-teachers-and-policy-makers-understand-creativity
    29 Apr 2008: requirements of the National Curriculum.
  6. Exceptional gift funds international plant science research centre in …

    https://www.cam.ac.uk/news/exceptional-gift-funds-international-plant-science-research-centre-in-cambridge
    19 Nov 2008: Experienced as a series of landscaped spaces – entry court, central courtyard and formal lawn – every aspect of the building will take into account the fact that the surrounding Botanic Garden provides
  7. £500 and the chance of a trip to the USA on offer to student book…

    https://www.cam.ac.uk/news/ps500-and-the-chance-of-a-trip-to-the-usa-on-offer-to-student-book-collectors
    22 Dec 2008: The value of the collections will not be a factor in determining the winning entry – a coherent collection of paperbacks is a perfectly valid entry. ... Previous shortlisted entries include ‘Collecting the Gothic’, ‘Missionary travels in the
  8. HARVEY T McMAHON CV

    https://www2.mrc-lmb.cam.ac.uk/groups/hmm/people/CV2008c.htm
    28 Jul 2008: I participate in lectures to postgraduate students both within our own institute and in other MRC institutes. ... 2+. entry. Neuron 6, 517-524 (1991). 11. McMahon, H.T. and Nicholls, D.G.
  9. 17 Jul 2008: a node unlessthat node already has all the earlier entries for that node pair(or if all earlier entries are also included in the same packetas this entry). ... for theevaluations in this paper, entries are selected sequentially).A node must not send any
  10. University of Cambridge Research Horizons Issue 5

    https://www.cam.ac.uk/system/files/issue_5_research_horizons.pdf
    1 Feb 2008: One year on from its launch, the RisingStars public communication course isreadying itself for training a newgroup of inspiring undergraduates,postgraduates, post-docs and earlycareer academics for the benefit of thewider
  11. Thinking inside the box: system-level failures of tamper proofing

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-711.pdf
    26 Feb 2008: 3Conveniently for the attacker, CVM entries are normally qualified with 0x03, indicatingthat this applies to all types of transactions, but by flipping a single bit so it becomes 0x01,this entry ... The design and verification requirements forindividual
  12. full.dvi

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-399.pdf
    10 Nov 2008: time of a certicate. If such an entry condition becomes false, the certi-. ... the functional requirements of the dierent services, it is believed that a general.
  13. 9 Nov 2008: 753371 ARP - User Interfa e - hange ARP entry ags: linux/net/ipv4/arp. ... 754372 ARP - User Interfa e - Get an ARP entry: linux/net/ipv4/arp.
  14. 8 Jan 2008: Transmitting unique URLs trips up spam filters looking for repeated links,and also fools collators like PhishTank into recording duplicate entries. ... The next obvious countermeasure is to impose voting requirements. For ex-ample, a user must have
  15. A wide-area file system for migrating virtual machines

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-714.pdf
    21 Apr 2008: storage requirements of its services. It then discusses related work in two areas. ... After exploring this. algorithm’s requirements and implementation in detail, the chapter concludes by describing.
  16. 1 CAR: Context-aware Adaptive Routingfor Delay Tolerant Mobile…

    https://www.cl.cam.ac.uk/~cm542/papers/tmc08.pdf
    14 Jul 2008: Each entry of this table has the following structure:(targetHostId, nextHopId, dist, bestHopHostId, deliveryProb). ... As said before, the entry isremoved after a number of missing updates: this also avoids theproblem that entries with high probabilities
  17. Kilim: Isolation-Typed Actors for Java (A Million Actors, Safe ...

    https://www.cl.cam.ac.uk/~am21/papers/ecoop08.pdf
    2 May 2008: The process is easily reversed:each method consults the fiber upon entry, jumps directly to the resumptionpoint and restores its state where necessary. ... old. new. rewinding. pausing. normal entry. normal exit. Fig. 10. CFG before and after transform.
  18. ORIGINAL ARTICLE Mirco Musolesi Æ Cecilia Mascolo Æ Stephen ...

    https://www.cl.cam.ac.uk/~cm542/papers/pucj.pdf
    29 Feb 2008: Each entry is characterized by alease (a mechanism similar to that present in Jini [17]). ... its life is not extended), itcan expire and, consequently the entry is deleted fromthe registry.
  19. Performance Analysis and Prediction ofPhysically Mobile Systems…

    https://www.cl.cam.ac.uk/~cm542/papers/wosp07.pdf
    29 Feb 2008: Physical mobility is a requirement which developers havenot yet considered with the due care despite it having a hugeimpact on the performance of the system. ... LQN tasks, one for each component in the componentdiagram. The LQN tasks have as many
  20. A new approach to Internet banking

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-731.pdf
    10 Dec 2008: Shoulder Surfing not only applies to PIN entry, but also to credentials ononline banking. ... V.DNS DNS poisoning. DNS poisoning is a technique by which an attacker inserts bogus entries into thecache of a recursing name server.
  21. Writing on the Clean Slate:Implementing a Socially-Aware Protocol in…

    https://www.cl.cam.ac.uk/~cm542/papers/aoc08.pdf
    17 Apr 2008: Each host maintains a routing table that is implementedas a HashMap containing entries that are instances ofthe class GentlyRoutingTableEntry. ... Automatic Selection of the Protocols Another interest-ing problem is the definition of the automatic
  22. UNIX AND X by Frank H. King An Introduction ...

    https://www.cl.cam.ac.uk/teaching/0809/LongVac/ses1.pdf
    9 Sep 2008: This brings up a menu which contains various entries including Open Terminal (whichmay be the fourth entry). • ... With the exception of C-g,the commands listed in the summary can be found as entries in the Files menu.Against each entry, the associated
  23. Introduction to Security Markus Kuhn Computer Laboratory…

    https://www.cl.cam.ac.uk/teaching/0708/IntroSec/slides.pdf
    3 Jun 2008: 53. PasswordsRandomly picked single words have low entropy, dictionaries have lessthan 218 entries. ... Eavesdropping – one-time passwords, authentication protocols. Inconvenience of multiple password entries – single sign-on.
  24. Adapting Asynchronous Messaging Middlewareto Ad Hoc Networking Mirco…

    https://www.cl.cam.ac.uk/~cm542/papers/mwworkmirco04.pdf
    29 Feb 2008: The hosts that receive advertisement mes-sages add entries to their JNDI registry. ... Each entry is char-acterized by a lease (a mechanism similar to that presentin Jini [15]).
  25. Operating Systems II Steven Hand Michaelmas Term 2005 8 ...

    https://www.cl.cam.ac.uk/teaching/0809/OpSysI/osII-notes.pdf
    5 Nov 2008: requirement Ui to prevent pathological cases. • Overall: lots of confusing parameters to set. ... pld r3 <- [r3, r2] // phys load LPT PTE. mov Tlb <- r3 // install TLB entry.
  26. Adaptive Resource Discovery for Ubiquitous Computing ∗ Rae…

    https://www.cl.cam.ac.uk/~cm542/papers/mpacrae.pdf
    29 Feb 2008: Followingthis discussion, section 3 contains a description of RUBI, ourresource discovery protocol, which has been designed to ad-dress the requirements identified above. ... received. Entries are associated with an expiry timeand will be removed from
  27. Operating Systems II Steven Hand Michaelmas Term 2005 8 ...

    https://www.cl.cam.ac.uk/teaching/0708/OpSystems/osII-notes.pdf
    15 Jan 2008: requirement Ui to prevent pathological cases. • Overall: lots of confusing parameters to set. ... pld r3 <- [r3, r2] // phys load LPT PTE. mov Tlb <- r3 // install TLB entry.
  28. 4 — MEANS AND VARIANCES The term expectation (or ...

    https://www.cl.cam.ac.uk/teaching/0708/Probabilty/prob04.pdf
    23 Jan 2008: 9. 24. 6 52. 25. 4. 1. 6. 25. 24. The sum of the entries in the rightmost column is 7024. ... The Geometric distribution satisfies the informal requirement of being an indexed set ofprobabilities whose sum is 1.
  29. Digicom II 2008-2009

    https://www.cl.cam.ac.uk/teaching/0809/DigiCommII/dcii.pdf
    24 Sep 2008: bandwidth requirementsbandwidth requirements. ## burstiness burstiness in traffic (TSI can in traffic (TSI can!t skip input)t skip input). ## ... Market requirementsMarket requirements. "" products may need to be backwards compatibleproducts may need to
  30. 29 Feb 2008: linkbase”). We use XLink technology to define thelinks between devices and remote tree entry points. ... B. Saikoski, and W. Yu. Next Generation Mid-dleware: Requirements, Architecture and Prototypes.
  31. Operating Systems II— Additional Information — Steven HandLent Term…

    https://www.cl.cam.ac.uk/teaching/0809/OpSysI/osII-additional.pdf
    5 Nov 2008: An IPT is a fixed size hash table containing one entry for each physical frame ofmemory. ... Each hand points to an entry in the core map, a fixeddistance apart.
  32. Lecture 01 of IB Databases Course

    https://www.cl.cam.ac.uk/teaching/0708/Databases/lec01.ppt
    25 Apr 2008: www.cl.cam.ac.uk/Teaching/current/Databases/. Database Prehistory. Data entry. Storage and retrieval. Query processing. Sorting. ... Database design process. Requirements analysis. User needs; what must database do?
  33. Introduction to Security Markus Kuhn Computer Laboratory…

    https://www.cl.cam.ac.uk/teaching/0708/IntroSec/slides-2up.pdf
    3 Jun 2008: 53. PasswordsRandomly picked single words have low entropy, dictionaries have lessthan 218 entries. ... Eavesdropping – one-time passwords, authentication protocols. Inconvenience of multiple password entries – single sign-on.
  34. 978-1-4244-2575-4/08/$20.00 c©2008 IEEE Seal-2-Seal: A Delay-Tolerant …

    https://mobile-systems.cl.cam.ac.uk/papers/mass08.pdf
    17 Jul 2008: a node unlessthat node already has all the earlier entries for that node pair(or if all earlier entries are also included in the same packetas this entry). ... for theevaluations in this paper, entries are selected sequentially).A node must not send any
  35. UNIVERSITYOFCAMBRIDGEComputerLaboratory Computer Science Tripos Part…

    https://www.cl.cam.ac.uk/teaching/0708/OptComp/notes07.pdf
    9 Jan 2008: ENTRY f : no predecessors;. • EXIT: no successors;. • ALU a, b, c: one successor (ADD, MUL,. );. • ... This leads to an algorithm (assumingflowgraph node 1 is the only entry node):.
  36. Operating Systems II— Additional Information — Steven HandLent Term…

    https://www.cl.cam.ac.uk/teaching/0708/OpSystems/osII-additional.pdf
    15 Jan 2008: An IPT is a fixed size hash table containing one entry for each physical frame ofmemory. ... Each hand points to an entry in the core map, a fixeddistance apart.
  37. mobihoc_camera.dvi

    https://www.cl.cam.ac.uk/~ey204/pubs/2008_MOBIHOC.pdf
    13 Mar 2008: In real human societies, one person may belongto multiple communities and hence it is important to uncover thisfeature when we study human networks.K-CLIQUE method cansatisfy this requirement, but was ... monitor each node entry in the tableand age them
  38. Learning compound noun semantics

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-735.pdf
    18 Dec 2008: 7.3.4.1 Method. 118. 7.3.4.2 Comparison of time requirements. 120. 7.3.4.3 Results. ... In these approaches, thelexical entry for a noun is enriched with qualia structures, which represent particularlysalient aspects of its meaning.
  39. Basic Economics

    https://www.cl.cam.ac.uk/teaching/0708/ECommerce/Ecommerce6.ppt
    20 May 2008: Executive Summary and funding requirement. 1. Concept. 2. The Market. 3.1  Global market size and need. ... Double entry book-keeping. Stock and accounting control. Take up staff references.
  40. Microsoft PowerPoint - SoftwareDesign-3-0

    https://www.cl.cam.ac.uk/teaching/0708/SWDesign/SoftwareDesign2008.pdf
    5 Feb 2008: 13. Analysing requirementsAnalysis usually involves (re)negotiation of requirements between client and designer. ... Define process as nested set of execution blocks, with fixed entry and exit points.
  41. AST: scalable synchronizationSupervisors’ guide 2008…

    https://www.cl.cam.ac.uk/teaching/0708/AdvSysTop/ast-kaf-g.pdf
    10 Jan 2008: A cache blocks of, say,64 bytes would therefore hold 16 of the entries. ... Thearray should perhaps be spread out so that each entry lies on a separate cache block.
  42. 10 — BIVARIATE DISTRIBUTIONS After some discussion of the ...

    https://www.cl.cam.ac.uk/teaching/0708/Probabilty/prob10.pdf
    23 Jan 2008: Different lengths of peg correspond to different probabilities. Axiom II requires the sum of all the entries in the table (which is the total length of thepegs) to be 1. ... It is easy to verify that this requirement is satisfied in the present case:.
  43. dotnetcd.dvi

    https://www.cl.cam.ac.uk/~djg11/pubs/dotnetcd.pdf
    13 Aug 2008: chines. The basic techniques require that the code sequencebehind the main entry point consists of a linear or unwind-able, non-blocking, start-up path that forks all other threads,performs ... The embedded code in our examples was. NET/-Mono CIL code
  44. Bi-directional Quality of Service for an IP tunnel

    https://www.cl.cam.ac.uk/~mas90/publications/dissertation.pdf
    24 Nov 2008: It satisfies the requirements, andmaintains demonstrably improved latency and reduced jitter over existingsystems, particularly when scheduling concurrent UDP and TCP streams.
  45. Adaptive evaluation of non-strict programs

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-730.pdf
    11 Dec 2008: more slowly than otherwise, or perhaps even to not terminate. This requirement to be conserva-.
  46. xmiddle: A Data-Sharing Middleware for Mobile Computing Cecilia…

    https://www.cl.cam.ac.uk/~cm542/papers/xmiddle.pdf
    29 Feb 2008: For the shop catalogue,resolutor can be set to last, to distribute the latest versions of productcatalogue entries. ... Xmiddle Primitives. Connect.Each entry in the LinkedFrom and LinkedBy tables identifies a re-mote host as well as a specific branch of
  47. Operating Systems I Steven Hand Michaelmas / Lent Term ...

    https://www.cl.cam.ac.uk/teaching/0708/OpSystems/handout-1up.pdf
    15 Jan 2008: Memory requirement = x y depth, e.g.1280x1024 @ 16bpp needs 2560KB.
  48. iwsawc1

    https://www.cl.cam.ac.uk/~cm542/papers/iwsawc.pdf
    29 Feb 2008: The healthcare environment is quite unique in that it brings with it several constraints and requirements that any deployable application would have to adhere to. ... The conflict resolution process is carried out on a per update basis, so each time an
  49. UNIVERSITYOFCAMBRIDGEComputerLaboratory Computer Science TriposPart…

    https://www.cl.cam.ac.uk/teaching/0708/CompConstr/notes07.pdf
    16 Jan 2008: So, on entry to a procedure, we expect to see instructions such as. ... entry, even if this “wastes space” for local variable only in-scope for part of thefunction body).
  50. Part Ib Java Tick 0 1 Introduction This exercise ...

    https://www.cl.cam.ac.uk/teaching/0708/IbAsExBrfg/IBTick0.pdf
    14 May 2008: Anyaffiliated students who take direct entry into Ib in the Michaelmas Term should consult the departmentas necessary, special arrangements will be made for them. ... Ensure that what is submitted to the tickerssatisfies all of the core requirements and,
  51. PPE online lecture notes _2_

    https://www.cl.cam.ac.uk/teaching/0708/PPEthics/PPE_lecture_notes.pdf
    17 Apr 2008: It will, therefore, be a matter of your exercising your personal judgement in meeting the Code's requirements. ... iii) can I demonstrate adequate knowledge of the specific business application and requirements successfully to undertake the work?

Refine your results

Format

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.