Search
Search Funnelback University
- Refined by:
- Date: 2010
41 -
50 of
64
search results for `Watson A A`
Fully-matching results
-
doi:10.1016/j.neuroscience.2004.03.043
www3.eng.cam.ac.uk/~go223/Publications/hajos04.pdf8 Jun 2010: co-ordinates: 0.2– 0.6 mm anterior to bregma, lateral 0 mm and–7 mm below the dura; Paxinos and Watson, 1986) using glassicroelectrodes filled with 2 M NaCl and ... 3.8 mm ventral; Paxinos and Watson, 1986). -
Infrastructure & the Future of Society
https://www.jesus.cam.ac.uk/sites/default/files/inline/files/Rustat%20Conference%20Infrastructure_0.pdf4 Oct 2010: session, Lord Watson of Richmond CBE. A list of the speakers and participants appears. ... authoritarian future. Responding to Lord Watson’s comment on Germany, he said that Germany is a. -
System tests from unit tests
https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-776.pdf26 Mar 2010: A code-coverage-complete test-suite contains two cases – insert(3, []) andinsert(4, [3]). ... The pre-conditions (which includesmethod parameters) for a unit test may be partially implicit. -
Fly-sheets reprinted - Cambridge University Reporter 6188
https://www.reporter.admin.cam.ac.uk/reporter/2009-10/weekly/6188/section9.shtml12 May 2010: Ruth Watson. Christopher Forsyth. A. Mobbs. G. Wild. Gillian M. Fraser. ... We believe that this focus on the individual is inappropriate for a ballot. -
High resolution cortical thickness measurement from clinical CT data…
mi.eng.cam.ac.uk/reports/svr-ftp/treece_tr634.pdf12 Jan 2010: 6(a). 2.3 Mapping of thickness to the cortical surface 9. (a). ... a 2.16 GHz Intel Core2 CPU, with the software running single-threaded. -
Capsicum: practical capabilities for UNIX Robert N. M.…
https://www.cl.cam.ac.uk/research/security/capsicum/papers/2010usenix-security-capsicum-website.pdf2 Jun 2010: file offset) requires CAP READ |CAP SEEK in a capability’s rights mask. ... di-rectly executing the run-time linker, passing the sandboxbinary via a capability. -
EmotionSense: A Mobile Phones based Adaptive Platform for…
https://mobile-systems.cl.cam.ac.uk/papers/Ubicomp10.pdf29 Jun 2010: We present the results of a real deployment designed incollaboration with social psychologists. ... by means of self-report-based methods in a rigorous and quantitative way. -
arX iv:1 004. 0644 v1 [ astr o-ph .EP ...
https://people.ast.cam.ac.uk/~wyatt/sw10.pdf6 Apr 2010: possibilitiesinclude dynamical scattering by a migrating planet, see e.g.Gomes et al. ... This source together with HD 31295 andHD 38206 are described in Appendix A. -
Inglorious Installers: Security in the Application Marketplace…
https://www.cl.cam.ac.uk/~fms27/papers/2010-AndersonBonSta-inglourious.pdf23 Aug 2010: A transparent installer would allow the Administrator to discern thepresence of e.g. ... a) msconfig (b) autoruns. Figure 3.2: Tools for configuring Windows startup applications. -
About this paper The Protection of Information in ComputerSystems ...
https://www.cl.cam.ac.uk/teaching/1011/R01/75-protection.pdf14 Sep 2010: CertifyTo check the accuracy, correctness, and completeness of a security or protection mechanism. ... DomainThe set of objects that currently may be directly accessed by a principal.
Search history
Recently clicked results
Recently clicked results
Your click history is empty.
Recent searches
Recent searches
Your search history is empty.