Search
Search Funnelback University
- Refined by:
- Date: 2009
1 -
7 of
7
search results for `Download and use`
Fully-matching results
-
More Is Different P. W. Anderson Science, New Series, ...
www.tcm.phy.cam.ac.uk/~bds10/aqp/anderson72more_is_different.pdf17 Nov 2009: JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtainedprior permission, you may not download an entire issue of a journal or multiple copies of articles, ... and you may use content inthe JSTOR archive only for your personal, -
Critical regions
https://www.cl.cam.ac.uk/teaching/0910/ConcDistS/05-IPC.pdf23 Oct 2009: Cross address-space IPC. 8. Erlang further information and examples. Part 1 of Concurrent Programming in Erlang is available for download fromhttp://erlang.org/download/erlang-book-part1.pdf. ... use. For an overview, publications and download, see:http:/ -
Critical regions
https://www.cl.cam.ac.uk/teaching/0910/ConcDistS/05-IPC.ppt23 Oct 2009: http://erlang.org/download/erlang-book-part1.pdf. The first part develops the language and includes many small programs, including. ... acceptance and use. For an overview, publications and download, see:. -
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless…
https://www.cl.cam.ac.uk/~fms27/papers/1999-StajanoAnd-duckling.pdf21 Aug 2009: Traditional defences include spread spectrum and frequency hopping, bothof which force the attacker to jam a wider frequency band and thus use morepower. ... The solution that we favour is to always bootstrap by establishing ashared secret and to use -
The Resurrecting Duckling --- what next?
https://www.cl.cam.ac.uk/~fms27/papers/2000-Stajano-duckling.pdf21 Aug 2009: to always bootstrap by establishing a shared secret and to use strongcryptography to download more specific policies into the node. ... I may then use any available gadget for controllingany other, and I could conceivably imprint my MP3 player to my PDA -
The Resurrecting Duckling --- what next?
https://www.cl.cam.ac.uk/~fms27/papers/2001-Stajano-duckling.pdf21 Aug 2009: to always bootstrap by establishing a shared secret and to use strongcryptography to download more specific policies into the node. ... I may then use any available gadget for controllingany other, and I could conceivably imprint my MP3 player to my PDA -
The 12th Cambridge International Conference on Open and Distance…
https://www.vhi.st-edmunds.cam.ac.uk/system/files/documents/2009-mainpaper.pdf11 Sep 2009: Out of this comes the wonderful phenomenon of Wikipedia, which we are not afraid to say we use and use regularly. ... More extensive use of the mass media as well as internet and mobile phone messaging should be encouraged.
Search history
Recently clicked results
Recently clicked results
Your click history is empty.
Recent searches
Recent searches
Your search history is empty.