Search

Search Funnelback University

Search powered by Funnelback
201 - 250 of 913 search results for katalk:PC53 24 / where 0 match all words and 913 match some words.
  1. Results that match 1 of 2 words

  2. Learning compound noun semantics

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-735.pdf
    18 Dec 2008: 21. 2.3.2 Inventory approaches. 22. 2.3.3 Integrational approaches. 24. 2.4 Conclusion. ... 24 2.3. COMPOUNDS AND SEMANTIC RELATIONS IN NLP. data, while Girju (2006; 2007a) describes 22 relations.
  3. Sup Fig 1

    https://www2.mrc-lmb.cam.ac.uk/groups/hmm/publica/YopJSup.pdf
    11 Nov 2008: 24 h after transfection cells were serum-starved for 16 h and then stimulated with 20 ng/ml TNF-α. ... 24. 26. 28. 30. 32. 34. 36. 38. 40. 42. inte.
  4. ortho5.dvi

    www.damtp.cam.ac.uk/user/na/NA_papers/NA2008_04.pdf
    18 Mar 2008: We omit the lemma and state the theorem. Theorem 4.3 Define the quadrature rule QM [f ] with points and weights givenby (24). ... Comp., 76:1341–1356, 2007. [24] R. Wong. Asymptotic approximations of integrals. Academic Press, 1989.
  5. Microsoft PowerPoint - Phishing 2008 - Yahoo.ppt [Compatibility Mode]

    https://www.cl.cam.ac.uk/~rnc1/talks/080819-phishing.pdf
    5 Sep 2008: to 19% within 24 weeksrising to 19% within 24 weeks. •
  6. Microsoft PowerPoint - Phishing 2008 - Yahoo.ppt [Compatibility Mode]

    https://www.cl.cam.ac.uk/~rnc1/talks/080818-phishing.pdf
    5 Sep 2008: to 19% within 24 weeksrising to 19% within 24 weeks. •
  7. Kilim: Isolation-Typed Actors for Java (A Million Actors, Safe ...

    https://www.cl.cam.ac.uk/~am21/papers/ecoop08.pdf
    2 May 2008: Kilim: Isolation-Typed Actors for Java. (A Million Actors, Safe Zero-Copy Communication). Sriram Srinivasan and Alan Mycroft. University of Cambridge Computer Laboratory,Cambridge CB3 0FD, UK. {Sriram.Srinivasan,Alan.Mycroft}@cl.cam.ac.uk. Abstract.
  8. Building Adaptable Mobile MiddlewareServices Using Logical Mobility…

    https://www.cl.cam.ac.uk/~cm542/papers/stefchapter.pdf
    29 Feb 2008: In previous work [24], we identified a number of examples showing that allparadigms of logical mobility can bring tangible benefits to mobile computing.The examples included dynamic updating in the face
  9. Bitext Alignment for Statistical Machine Translation

    mi.eng.cam.ac.uk/~wjb31/ppubs/YDengDefenseDec05.pdf
    16 Feb 2008: 20. 21. 22. 23. 24. 25. Coverage. eval02eval03eval04. 1 2 3 4 523.2. ... 23.4. 23.6. 23.8. 24. 24.2. 24.4. 24.6. 24.8. 25. 25.2. BLEU.
  10. A novel auto-calibration system for wireless sensor motes

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-727.pdf
    16 Sep 2008: dBm. 24. -10 dBm level applied at port 2. It also shows a flat response across all 16 frequency channels.
  11. 3 Jul 2008: 1 |φn |2)p2 d x (24). and1. 4π. jφp(x)d x = limn1. ... Ann. Math. 113, 1–24 (1981)22. Schoen, R., Uhlenbeck, K.: Boundary regularity and the Dirichlet problem for harmonic maps.
  12. Dynamics of small bodies in planetary systems Mark C. ...

    https://people.ast.cam.ac.uk/~wyatt/wyat08.pdf
    8 Jul 2008: Rather the dust distribution seen at 24 and 70 µm extendsout to 800 AU [73]. ... Wyatt. Eridani disk which is a narrow ring at 60 AU with a well resolved inner hole[24].
  13. Adaptive evaluation of non-strict programs

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-730.pdf
    11 Dec 2008: 24. 3.4 Burst Profiling. 28. 5. 6 CONTENTS. II Theory 30. ... 24 Chapter 3. Online Profiling. speculate it more. Similarly, as the estimated goodness of alet decreases we decrease the depth.
  14. Announcement of a Competition to Predict Aqueous Solubility

    https://www-jmg.ch.cam.ac.uk/data/solubility/pss.doc
    3 Apr 2008: 24 Probenecid. 25 Pyrimethamine. 26 Salicylic acid. 27 Sulfamerazine. 28 Sulfamethizole.
  15. Church’s Set Theory with a Universal Set Thomas Forster ...

    https://www.dpmms.cam.ac.uk/~tef10/church2001.pdf
    7 May 2008: DEFINITION 24 The things that are are values of k are either:. ... PROPOSITION 25 The clauses of definition 24 give a model in which every lowset x has a cardinal: {y : |y| = |x|}.
  16. 629 629..638

    https://www.cl.cam.ac.uk/~cm542/papers/tkde99.pdf
    4 Mar 2008: A first attempt to show Z specifications on the WWWwas described in [24], designing a plug-in for Netscape andInternet Explorer that accepts Z specifications written usingone of the existing LaTeX ... 1998. [24] L. Mikusiak, M. Adamy, and T. Seidmann,
  17. Prolog lecture 5 ● Data structures● Difference lists● Appendless ...

    https://www.cl.cam.ac.uk/teaching/0809/Prolog/Prolog08ML5R2.pdf
    2 Dec 2008: rotate([H|T]-[H|A],T-A). 24. Converting to difference lists. add in the tail variables. ... Slide 19. Slide 20. Slide 21. Slide 22. Slide 23. Slide 24.
  18. Distributed Systems Part 2, Part 2 (General) and Diploma, ...

    https://www.cl.cam.ac.uk/teaching/0708/DistSys/0ds2008.pdf
    24 Mar 2008: Middleware RPC, OOM, MOM, event-based middleware. pages1-32. T1-26. D1-20. 1-29. N1-24 A1-23.
  19. 6 Jun 2008: JFP 18 (4): 437–502, 2008. c 2007 Cambridge University Pressdoi:10.1017/S0956796807006600 First published online 17 October 2007 Printed in the United Kingdom. 437. Dynamic rebinding for marshalling and update,via redex-time and destruct-time
  20. A rigorous approach to networking: TCP, from implementation to ...

    https://www.cl.cam.ac.uk/~pes20/Netsem/stream_spec.pdf
    27 Feb 2008: On the practice of protocol design This paper is the latest in a line ofwork developing rigorous techniques for real-world protocol modelling and speci-fication ... http://www.cl.cam.ac.uk/users/pes20/Netsem/.24. K. Wansbrough, M. Norrish, P. Sewell, and
  21. The Descriptive Complexity of Parity Games Anuj Dawar1 and ...

    https://www.cl.cam.ac.uk/~ad260/papers/csl08.pdf
    18 Jul 2008: 12,24]. Theorem 4. Let ψ be an LFP-sentence and A a relational structure. ... The-oretical Computer Science 224, 237–265 (1999). 24. Stirling, C.: Bisimulation, model checking and other games.
  22. 1 Intrinsic Aqueous Solubility Prediction Scoring Sheet Code Name ...

    https://www-jmg.ch.cam.ac.uk/data/solubility/pss.pdf
    3 Apr 2008: OH. O. 23 (1R, 2R)-(-)- Pseudoephedrine and enantiomer. NH. OH. 24 Probenecid.
  23. Adaptive Routing for Intermittently Connected Mobile Ad Hoc Networks…

    https://www.cl.cam.ac.uk/~cm542/papers/wowmom05.pdf
    29 Feb 2008: In Figure 1.a, there is a comparison between the deliv-ery ratios of the three protocols in each of three differentscenarios (with 16, 24 and 32 hosts). ... 60. 80. 100. 120. 16 24 32Number of hosts. Del. iver.
  24. D23Ld.dvi

    www.damtp.cam.ac.uk/user/examples/D23Ld.pdf
    5 Dec 2008: This equation determines λ as a function of α. 24. Cop.
  25. peers_multi.eps

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-725.pdf
    15 Jul 2008: In the graph theory literature, one. 7. usually considers the adjacency or the Laplacian ma-trix [24, 9], both which employ different normalizationsand therefore lead to different spectra. ... 003 0.496INET 18,504 4.02 1,683 3 15,037,631 7 -0.195 0.004
  26. tech.dvi

    mi.eng.cam.ac.uk/reports/svr-ftp/hsu_tr584.pdf
    5 Sep 2008: µPRA = pW TWS TSI TspI′. (24). This is a measurement of system accuracy, and includes errors from every component of thesystem.
  27. ase03.dvi

    https://www.cl.cam.ac.uk/~cm542/papers/ase03.pdf
    29 Feb 2008: CODEWEAVE: Exploring Fine-Grained Mobility of Code. Cecilia Mascolo, Gian Pietro Picco, and Gruia-Catalin Roman. AbstractThis paper is concerned with an abstract exploration of code mobility constructs designed for use in settings where. the level
  28. 1 CAR: Context-aware Adaptive Routingfor Delay Tolerant Mobile…

    https://www.cl.cam.ac.uk/~cm542/papers/tmc08.pdf
    14 Jul 2008: For this reason, we have used a mobility model based on socialnetwork theory, the Community based mobility model [11], [24].This relies on the simple observation that mobile networks aresocial networks
  29. Operating Systems Steven Hand Michaelmas / Lent Term 2008/09 ...

    https://www.cl.cam.ac.uk/teaching/0809/OpSysI/os1a-slides1.pdf
    5 Nov 2008: 00 I Opcode S Ra Rd Operand 2. 31 25 24 21 20 19 16 15 1211 026. ... 640x480, 800x600, 1024x768, 1280x1024, 1600x1200. • Depths: 8-bit (LUT), 16-bit (RGB=555, 24-bit (RGB=888), 32-bit (RGBA=888). •
  30. Knuz3.dvi

    www.damtp.cam.ac.uk/user/na/NA_papers/NA2008_07.pdf
    31 Jul 2008: 9.3.9]:. u0(t) = 1, u1(t) =3t 5t3. 24, u2(t) =. 81t2 462t4 385t61152. , ... 9.6.24]. Kν (νz) =1. 2. eνφ(v) dv, φ(v) = z cosh v v.
  31. Dissertation

    https://www2.mrc-lmb.cam.ac.uk/groups/wschafer/AndyHuang.pdf
    6 Mar 2008: algorithm [24]. Redundant pixels on the skeleton are eliminated by thinning. ... skeleton algorithm [7, 24]. However, sometimes the binary worm body shape has an internal hole,.
  32. BATH_100_X_R_LL.eps

    https://www.cl.cam.ac.uk/~ey204/pubs/2008_BIOWIRE.pdf
    3 Sep 2008: Fig. 7(b) shows three stages of epidemic spread during a 24-hour period. ... InUbiComp, pages 315–332, 2006.24. G. Palla et al. Uncovering the overlapping community structure of complex networks in.
  33. 9 Nov 2008: 24. There aremany on ommuni ations (e.g. Kurose and Ross[25) and Operating Systems(e.g.
  34. Thinking inside the box: system-level failures of tamper proofing

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-711.pdf
    26 Feb 2008: Ioniccontamination, hot-carrier effects, and electromigration can ‘imprint’ the storedstate over time [24, 25], and extreme temperature or voltage may cause RAMcontent to remain for seconds or even minutes after power
  35. Combining computational effects: commutativityand sum Martin Hyland,1 …

    https://www.dpmms.cam.ac.uk/~jmeh1/Research/Publications/2002/hpp02.pdf
    19 Aug 2008: The following result is a restatement of the first main result of [24]. ... 1–24, Berlin: Springer-Verlag, 2001. 23. G. D. Plotkin and A. J.
  36. 11 Jan 2008: γm(t)ot. )(24). γm(t) is the component posterior derived from P (θ|O, H, λ̂k1).For the frame independent assumption it is necessary to obtain. ... where G and k are the standard sufficient statistics given in equa-tions 23 and 24, except that γm(t)
  37. Q-CAD: QoS and Context Aware Discovery Framework for Mobile ...

    https://www.cl.cam.ac.uk/~cm542/papers/qcad05.pdf
    29 Feb 2008: Fuggetta, G. Picco, and G. Vigna. Understanding CodeMobility. IEEE Transactions on Software Engineering,24(5):342–361, May 1998.
  38. ASTlecture_01

    https://www.cl.cam.ac.uk/teaching/0708/AdvSysTop/ASTlecture_01.pdf
    10 Feb 2008: shaded fields little-used today. 24. IP Hour Glass. ... 0/16. 12.3.0.0/2412.3.1.0/24. ::. 12.3.254.0/24.
  39. A QUALITY-GUIDED DISPLACEMENTTRACKING ALGORITHM FOR ULTRASONIC…

    mi.eng.cam.ac.uk/reports/svr-ftp/chen_tr593.pdf
    17 Jan 2008: Among several techniques for displacement estimation [12, 24], correlation maximization wasthe first to be proposed and remains the most widely used [16]. ... As p1 is the only point ready for processing,it is selected and fed into any suitable
  40. Operating Systems Steven Hand Michaelmas / Lent Term 2008/09 ...

    https://www.cl.cam.ac.uk/teaching/0809/OpSysI/os1a-handout1.pdf
    5 Nov 2008: 00 I Opcode S Ra Rd Operand 2. 31 25 24 21 20 19 16 15 1211 026. ... 640x480, 800x600, 1024x768, 1280x1024, 1600x1200. • Depths: 8-bit (LUT), 16-bit (RGB=555, 24-bit (RGB=888), 32-bit (RGBA=888). •
  41. Vedanta TRM

    https://www.cl.cam.ac.uk/teaching/0809/SWEng/brady.ppt
    21 Oct 2008: 19. 20. 21. 22. 23. 24. 25. Number of bugs when released.
  42. A new approach to Internet banking

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-731.pdf
    10 Dec 2008: V.Tor Evil Tor nodes. Tor [24] is an anonymization system advocated by the Electronic Freedom Foun-dation. ... 24 AN ANALYSIS OF E-BANKING VULNERABILITIES. Cost. One of the obvious metrics is cost.
  43. chapterMascolofinal

    https://www.cl.cam.ac.uk/~cm542/papers/principles.pdf
    29 Feb 2008: Radio connectivity is, by default, not transitive. However, ad-hoc routing protocols have been defined [24] in order to overcome this limitation and allow routing of packets through mobile hosts.
  44. NONPARAMETRIC SURFACE REGRESSIONFOR STRAIN ESTIMATION J. E. Lindop,…

    mi.eng.cam.ac.uk/reports/svr-ftp/lindop_tr598.pdf
    6 Mar 2008: The. 6. 20 40 60 80 100sample number. ry=24 a. ry=44 a. ... a). 20 40 60 80 100sample number. ry=24 a. ry=44 a.
  45. Topological GroupsPart III, Spring 2008 T. W. Körner March ...

    https://www.dpmms.cam.ac.uk/~twk10/Topg.pdf
    8 Mar 2008: 24. 12 The inversion theorem. Before proving Bochner’s theorem we need some simple results on positivedefinite functions.
  46. Abstra t Games for Linear Logi Extended Abstra t ...

    https://www.dpmms.cam.ac.uk/~jmeh1/Research/Oldpapers/hs99.pdf
    22 Aug 2008: R x if and only if ju xj 1.Girard's Coheren e spa es [24,28 are essentially G?(Rel) for this orthogona-17. ... Springer Verlag, 1993.[16 G.M. Bierman. On intuitionisti linear logi. Te hni al Report 346, Universityof Cambridge Computer Laboratory, August
  47. Predictive Resource Scheduling in Computational Grids∗ Clovis…

    https://www.cl.cam.ac.uk/~cm542/papers/ipdps07.pdf
    29 Feb 2008: environment. An alternative predictive technique for scheduling of re-sources in parallel systems is presented in [24] based on theprediction of the future CPU loads.
  48. jsac.dvi

    https://www.cl.cam.ac.uk/~cm542/papers/jsac.pdf
    1 Apr 2008: Approaches based on the replication of messages on allhosts have also been presented, such as epidemic-style tech-niques [24] that exploit a virus-spreading metaphor to indicatethe dissemination of information
  49. 29 Feb 2008: In [56] CORBA and IIOP are used together with the WAP (Wireless AccessProtocol) stack [24] in order to allow the use of CORBA services on a fixednetwork through mobile devices connected
  50. Mediation, Modulation, and Consequences of Membrane-Cytoskeleton…

    https://www2.mrc-lmb.cam.ac.uk/groups/hmm/publica/DohertyMcMahonAnnRevBiophys08.pdf
    22 May 2008: sona. l use. onl. y. ANRV343-BB37-04 ARI 24 April 2008 15:9. ... l use. onl. y. ANRV343-BB37-04 ARI 24 April 2008 15:9. Endocyticevents.
  51. Prolog Lecture 2 ● Rules● Lists● Arithmetic● Last-call optimisation●…

    https://www.cl.cam.ac.uk/teaching/0809/Prolog/Prolog08ML2R2.pdf
    2 Dec 2008: How about a “test to destruction”?biglist(0,[]).biglist(N,[N|T]) :-. M is N-1,biglist(M,T),M=M. 24. ... Slide 20. Slide 21. Slide 22. Slide 23. Slide 24. Slide 25.

Refine your results

Format

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.