Search

Search Funnelback University

Search powered by Funnelback
Did you mean economiespast?
11 - 30 of 847 search results for Economics test where 70 match all words and 777 match some words.
  1. Fully-matching results

  2. FRPRCS-8 Full Paper Format

    www-civ.eng.cam.ac.uk/cjb/concplas/16middleton.pdf
    11 Jul 2007: Thirdly, the program was used to predict the failure mode anderimental tests on concrete slabs. ... Values ranged from 0.87 in test A2 to 1.33 in test C2, with the range being between 1.04 and 1.33 for the first 11 tests.
  3. 1 Revised 4 September 2007 The Twelfth Cambridge Conference ...

    https://www.vhi.st-edmunds.cam.ac.uk/system/files/documents/2007-papers-F-Mc.pdf
    4 Sep 2007: on the roots of successful inventions (e.g., Jewkes, 1958) and developed a theoretical infrastructure drawing on a range of disciplines, notably economics, sociology of knowledge, anthropology and management studies.
  4. paper 3 maths.dvi

    https://www.robinson.cam.ac.uk/iar1/teaching/p1paper3_2007.pdf
    18 Jun 2007: a) Test the hypothesis that men and women perform equally well in this exam. ... Doesthis seem realistic? (b) Test the hypothesis of constant returns to scale in the equation (1.1).
  5. Summary

    www-civ.eng.cam.ac.uk/cjb/concplas/13jaafar.pdf
    11 Jul 2007: The test program was designed to examine the effectiveness of spirals as lateral reinforcement. ... Fig. 9 shows the shear load test comparison for the cycled and the reference beams.
  6. 1 Revised 4 September 2007 The Twelfth Cambridge Conference ...

    https://www.vhi.st-edmunds.cam.ac.uk/system/files/documents/2007-papers-M-R.pdf
    4 Sep 2007: 1 Revised 4 September 2007 . The Twelfth Cambridge Conference on Open and Distance Learning . Return to index . Conference Papers by authors M – R . Brent Muirhead  Interactivity challenges facing online educators .
  7. Reflections on TREC Karen Sparck JonesComputer Laboratory, University …

    https://www.cl.cam.ac.uk/archive/ksj21/ksjdigipapers/ipm95.pdf
    8 Jan 2007: In termsof the analysis of system evaluation given in (Galliers and Sparck Jones 1993), theTREC tests have a remit determining the test goal, and a design specifying gauges,data, and procedures, ... them. This dual-purpose modus operandiis associated
  8. UNIVERSITYOF CAMBRIDGE Programming Language Design and Analysis…

    https://www.cl.cam.ac.uk/~am21/papers/sas07slides.pdf
    30 Aug 2007: Because 3GHz seems a natural economic limit for this style of. ... Parallelism” in 1991/1993. • Compiled SPEC test suite. • Looked at instruction traces and assumed various models.
  9. g06-075 1215..1226

    www.jiggins.gen.cam.ac.uk/pdfs/Wilfert2006genome.pdf
    10 Oct 2007: Since linked. markers are not mutually independent, we did not perform aBonferroni test. ... Instead, we used a threshold of p < 0.01 toaccount for the large number of tests.
  10. FRPRCS-8 Full Paper Format

    www-civ.eng.cam.ac.uk/cjb/concplas/09eyre.pdf
    11 Jul 2007: Two different yield criteria were considered in Ref [16] both of which approximate observed results from tests on standard monolithic specimens. ... section. Using fc in lieu of Neilsen’s use of the compressive test strength (fcu ) the reinforcement
  11. Cluster storage for commodity computation

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-690.pdf
    28 Jun 2007: 6 Evaluation 1296.1 Methodology. 130. 6.1.1 Assumptions and goals. 1306.1.2 Test environment. ... Clients using standard tools enjoy lower deployment coststhan those requiring extensive customisation, encouraging standardisationthrough economic pressures
  12. doi:10.1016/j.epsl.2006.12.013

    www.itg.cam.ac.uk/people/heh/Paper203.pdf
    22 Mar 2007: The number of poorlyconstrained parameters, limited data and the problems ofnumerical dispersion make it difficult to test theapplicability of assumptions inherent in the modelling. ... 1: using routines in TOUGH2 [19], 2: after [20] but adjusted for a
  13. Covert channel vulnerabilities in anonymity systems

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-706.pdf
    14 Dec 2007: Technical ReportNumber 706. Computer Laboratory. UCAM-CL-TR-706ISSN 1476-2986. Covert channel vulnerabilitiesin anonymity systems. Steven J. Murdoch. December 2007. 15 JJ Thomson AvenueCambridge CB3 0FDUnited Kingdomphone 44 1223 763500.
  14. John Michael Hammersley JOHN MICHAEL HAMMERSLEY21 March 1920 — ...

    www.statslab.cam.ac.uk/~grg/papers/jmh_biom.pdf
    31 Aug 2007: He returned to Oxford in 1959 as Senior Research Officer at theInstitute of Economics and Statistics. ... be producedto order and if so how; can they be recognised and can we test that they are not im-posters?
  15. Meta-reflections on TREC Karen Sparck JonesComputer Laboratory,…

    https://www.cl.cam.ac.uk/archive/ksj21/ksjdigipapers/trecbook05.pdf
    8 Jan 2007: to distinguish and determine the effects of specific system performance factors bycontrolled laboratory tests. ... properties of real retrieval situations are preserved by the use of soundlydesigned and constructed test collections.
  16. An Empirical Analysis of the Current State of Phishing ...

    https://www.cl.cam.ac.uk/~rnc1/weis07-phishing.pdf
    12 May 2007: and σ which specify the distribution using maximum likelihood estimation. To test the fit, we. ... computed the Kolmogorov-Smirnov test 1000 times to compute the average maximum difference.
  17. British Library Annual Research Lecture, November 1989;London: The…

    https://www.cl.cam.ac.uk/archive/ksj21/ksjdigipapers/bllecture90.pdf
    22 Jan 2007: For example a medical researcher workingon a final project report might, while engaged on the report text itself, also exploit previousreports, extract from test records, communicate with colleagues by netmail, access ... Such a representation would not
  18. Lazy Susan: dumb waiting as proof of work

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-703.pdf
    15 Nov 2007: The purpose of T isto allow the server to test whether the request has timed out. ... Thenode storing data tests the claim from time-to-time, and if the test fails it probabilisticallydrops the stored data.
  19. An introduction to Computer LaboratoryRoss Anderson Professor of…

    https://www.cl.cam.ac.uk/~rja14/musicfiles/manuscripts/2007-09-21.pdf
    24 Oct 2007: 27/40. 28/40. Security Economics. Many systems fail not for technical reasons so much asfrom misplaced incentives - often the people who couldprotect them are not the people who suffer the ... Grand ChallengesI May take fifteen years or more to
  20. Examining the Impact of Website Take-down on Phishing Tyler ...

    https://www.cl.cam.ac.uk/~rnc1/ecrime07.pdf
    11 Oct 2007: Keywordsphishing, security economics, electronic crime. 1. INTRODUCTIONPhishing is the process of enticing people into visiting. ... To test thefit, we computed the Kolmogorov-Smirnov test 1000 timesto compute the average maximum difference D between
  21. DRAFT THE GLOBAL TEACHER CRISIS – MEETING THE CHALLENGE ...

    https://www.vhi.st-edmunds.cam.ac.uk/system/files/documents/2007-bobmoonkeynote.pdf
    19 Oct 2007: status of teachers in that same year. It was a far reaching document which, all credit to its authors, has stood the test of time magnificently. ... Hill, M. A. and King, E. M. (1995)

Refine your results

Format

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.