Search
Search Funnelback University
- Refined by:
- Date: 2008
201 -
250 of
913
search results for katalk:PC53 24 /
where 0
match all words and 913
match some words.
Results that match 1 of 2 words
-
Learning compound noun semantics
https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-735.pdf18 Dec 2008: 21. 2.3.2 Inventory approaches. 22. 2.3.3 Integrational approaches. 24. 2.4 Conclusion. ... 24 2.3. COMPOUNDS AND SEMANTIC RELATIONS IN NLP. data, while Girju (2006; 2007a) describes 22 relations. -
Sup Fig 1
https://www2.mrc-lmb.cam.ac.uk/groups/hmm/publica/YopJSup.pdf11 Nov 2008: 24 h after transfection cells were serum-starved for 16 h and then stimulated with 20 ng/ml TNF-α. ... 24. 26. 28. 30. 32. 34. 36. 38. 40. 42. inte. -
ortho5.dvi
www.damtp.cam.ac.uk/user/na/NA_papers/NA2008_04.pdf18 Mar 2008: We omit the lemma and state the theorem. Theorem 4.3 Define the quadrature rule QM [f ] with points and weights givenby (24). ... Comp., 76:1341–1356, 2007. [24] R. Wong. Asymptotic approximations of integrals. Academic Press, 1989. -
Microsoft PowerPoint - Phishing 2008 - Yahoo.ppt [Compatibility Mode]
https://www.cl.cam.ac.uk/~rnc1/talks/080819-phishing.pdf5 Sep 2008: to 19% within 24 weeksrising to 19% within 24 weeks. • -
Microsoft PowerPoint - Phishing 2008 - Yahoo.ppt [Compatibility Mode]
https://www.cl.cam.ac.uk/~rnc1/talks/080818-phishing.pdf5 Sep 2008: to 19% within 24 weeksrising to 19% within 24 weeks. • -
Kilim: Isolation-Typed Actors for Java (A Million Actors, Safe ...
https://www.cl.cam.ac.uk/~am21/papers/ecoop08.pdf2 May 2008: Kilim: Isolation-Typed Actors for Java. (A Million Actors, Safe Zero-Copy Communication). Sriram Srinivasan and Alan Mycroft. University of Cambridge Computer Laboratory,Cambridge CB3 0FD, UK. {Sriram.Srinivasan,Alan.Mycroft}@cl.cam.ac.uk. Abstract. -
Building Adaptable Mobile MiddlewareServices Using Logical Mobility…
https://www.cl.cam.ac.uk/~cm542/papers/stefchapter.pdf29 Feb 2008: In previous work [24], we identified a number of examples showing that allparadigms of logical mobility can bring tangible benefits to mobile computing.The examples included dynamic updating in the face -
Bitext Alignment for Statistical Machine Translation
mi.eng.cam.ac.uk/~wjb31/ppubs/YDengDefenseDec05.pdf16 Feb 2008: 20. 21. 22. 23. 24. 25. Coverage. eval02eval03eval04. 1 2 3 4 523.2. ... 23.4. 23.6. 23.8. 24. 24.2. 24.4. 24.6. 24.8. 25. 25.2. BLEU. -
A novel auto-calibration system for wireless sensor motes
https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-727.pdf16 Sep 2008: dBm. 24. -10 dBm level applied at port 2. It also shows a flat response across all 16 frequency channels. -
Calc. Var. (2007) 30:523–546DOI 10.1007/s00526-007-0102-0 Calculus of …
www.damtp.cam.ac.uk/user/dmas2/public_ps/Final.pdf3 Jul 2008: 1 |φn |2)p2 d x (24). and1. 4π. jφp(x)d x = limn1. ... Ann. Math. 113, 1–24 (1981)22. Schoen, R., Uhlenbeck, K.: Boundary regularity and the Dirichlet problem for harmonic maps. -
Dynamics of small bodies in planetary systems Mark C. ...
https://people.ast.cam.ac.uk/~wyatt/wyat08.pdf8 Jul 2008: Rather the dust distribution seen at 24 and 70 µm extendsout to 800 AU [73]. ... Wyatt. Eridani disk which is a narrow ring at 60 AU with a well resolved inner hole[24]. -
Adaptive evaluation of non-strict programs
https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-730.pdf11 Dec 2008: 24. 3.4 Burst Profiling. 28. 5. 6 CONTENTS. II Theory 30. ... 24 Chapter 3. Online Profiling. speculate it more. Similarly, as the estimated goodness of alet decreases we decrease the depth. -
Announcement of a Competition to Predict Aqueous Solubility
https://www-jmg.ch.cam.ac.uk/data/solubility/pss.doc3 Apr 2008: 24 Probenecid. 25 Pyrimethamine. 26 Salicylic acid. 27 Sulfamerazine. 28 Sulfamethizole. -
Church’s Set Theory with a Universal Set Thomas Forster ...
https://www.dpmms.cam.ac.uk/~tef10/church2001.pdf7 May 2008: DEFINITION 24 The things that are are values of k are either:. ... PROPOSITION 25 The clauses of definition 24 give a model in which every lowset x has a cardinal: {y : |y| = |x|}. -
629 629..638
https://www.cl.cam.ac.uk/~cm542/papers/tkde99.pdf4 Mar 2008: A first attempt to show Z specifications on the WWWwas described in [24], designing a plug-in for Netscape andInternet Explorer that accepts Z specifications written usingone of the existing LaTeX ... 1998. [24] L. Mikusiak, M. Adamy, and T. Seidmann, -
Prolog lecture 5 ● Data structures● Difference lists● Appendless ...
https://www.cl.cam.ac.uk/teaching/0809/Prolog/Prolog08ML5R2.pdf2 Dec 2008: rotate([H|T]-[H|A],T-A). 24. Converting to difference lists. add in the tail variables. ... Slide 19. Slide 20. Slide 21. Slide 22. Slide 23. Slide 24. -
Distributed Systems Part 2, Part 2 (General) and Diploma, ...
https://www.cl.cam.ac.uk/teaching/0708/DistSys/0ds2008.pdf24 Mar 2008: Middleware RPC, OOM, MOM, event-based middleware. pages1-32. T1-26. D1-20. 1-29. N1-24 A1-23. -
Dynamic rebinding for marshalling and update, via redex-time and…
https://www.cl.cam.ac.uk/~pes20/jfp2008.pdf6 Jun 2008: JFP 18 (4): 437–502, 2008. c 2007 Cambridge University Pressdoi:10.1017/S0956796807006600 First published online 17 October 2007 Printed in the United Kingdom. 437. Dynamic rebinding for marshalling and update,via redex-time and destruct-time -
A rigorous approach to networking: TCP, from implementation to ...
https://www.cl.cam.ac.uk/~pes20/Netsem/stream_spec.pdf27 Feb 2008: On the practice of protocol design This paper is the latest in a line ofwork developing rigorous techniques for real-world protocol modelling and speci-fication ... http://www.cl.cam.ac.uk/users/pes20/Netsem/.24. K. Wansbrough, M. Norrish, P. Sewell, and -
The Descriptive Complexity of Parity Games Anuj Dawar1 and ...
https://www.cl.cam.ac.uk/~ad260/papers/csl08.pdf18 Jul 2008: 12,24]. Theorem 4. Let ψ be an LFP-sentence and A a relational structure. ... The-oretical Computer Science 224, 237–265 (1999). 24. Stirling, C.: Bisimulation, model checking and other games. -
1 Intrinsic Aqueous Solubility Prediction Scoring Sheet Code Name ...
https://www-jmg.ch.cam.ac.uk/data/solubility/pss.pdf3 Apr 2008: OH. O. 23 (1R, 2R)-(-)- Pseudoephedrine and enantiomer. NH. OH. 24 Probenecid. -
Adaptive Routing for Intermittently Connected Mobile Ad Hoc Networks…
https://www.cl.cam.ac.uk/~cm542/papers/wowmom05.pdf29 Feb 2008: In Figure 1.a, there is a comparison between the deliv-ery ratios of the three protocols in each of three differentscenarios (with 16, 24 and 32 hosts). ... 60. 80. 100. 120. 16 24 32Number of hosts. Del. iver. -
D23Ld.dvi
www.damtp.cam.ac.uk/user/examples/D23Ld.pdf5 Dec 2008: This equation determines λ as a function of α. 24. Cop. -
peers_multi.eps
https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-725.pdf15 Jul 2008: In the graph theory literature, one. 7. usually considers the adjacency or the Laplacian ma-trix [24, 9], both which employ different normalizationsand therefore lead to different spectra. ... 003 0.496INET 18,504 4.02 1,683 3 15,037,631 7 -0.195 0.004 -
tech.dvi
mi.eng.cam.ac.uk/reports/svr-ftp/hsu_tr584.pdf5 Sep 2008: µPRA = pW TWS TSI TspI′. (24). This is a measurement of system accuracy, and includes errors from every component of thesystem. -
ase03.dvi
https://www.cl.cam.ac.uk/~cm542/papers/ase03.pdf29 Feb 2008: CODEWEAVE: Exploring Fine-Grained Mobility of Code. Cecilia Mascolo, Gian Pietro Picco, and Gruia-Catalin Roman. AbstractThis paper is concerned with an abstract exploration of code mobility constructs designed for use in settings where. the level -
1 CAR: Context-aware Adaptive Routingfor Delay Tolerant Mobile…
https://www.cl.cam.ac.uk/~cm542/papers/tmc08.pdf14 Jul 2008: For this reason, we have used a mobility model based on socialnetwork theory, the Community based mobility model [11], [24].This relies on the simple observation that mobile networks aresocial networks -
Operating Systems Steven Hand Michaelmas / Lent Term 2008/09 ...
https://www.cl.cam.ac.uk/teaching/0809/OpSysI/os1a-slides1.pdf5 Nov 2008: 00 I Opcode S Ra Rd Operand 2. 31 25 24 21 20 19 16 15 1211 026. ... 640x480, 800x600, 1024x768, 1280x1024, 1600x1200. • Depths: 8-bit (LUT), 16-bit (RGB=555, 24-bit (RGB=888), 32-bit (RGBA=888). • -
Knuz3.dvi
www.damtp.cam.ac.uk/user/na/NA_papers/NA2008_07.pdf31 Jul 2008: 9.3.9]:. u0(t) = 1, u1(t) =3t 5t3. 24, u2(t) =. 81t2 462t4 385t61152. , ... 9.6.24]. Kν (νz) =1. 2. eνφ(v) dv, φ(v) = z cosh v v. -
Dissertation
https://www2.mrc-lmb.cam.ac.uk/groups/wschafer/AndyHuang.pdf6 Mar 2008: algorithm [24]. Redundant pixels on the skeleton are eliminated by thinning. ... skeleton algorithm [7, 24]. However, sometimes the binary worm body shape has an internal hole,. -
BATH_100_X_R_LL.eps
https://www.cl.cam.ac.uk/~ey204/pubs/2008_BIOWIRE.pdf3 Sep 2008: Fig. 7(b) shows three stages of epidemic spread during a 24-hour period. ... InUbiComp, pages 315–332, 2006.24. G. Palla et al. Uncovering the overlapping community structure of complex networks in. -
TCP/IP and the Linux Proto ol Implementation(Networking Coun il ...
https://www.cl.cam.ac.uk/~jac22/out/li.pdf9 Nov 2008: 24. There aremany on ommuni ations (e.g. Kurose and Ross[25) and Operating Systems(e.g. -
Thinking inside the box: system-level failures of tamper proofing
https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-711.pdf26 Feb 2008: Ioniccontamination, hot-carrier effects, and electromigration can ‘imprint’ the storedstate over time [24, 25], and extreme temperature or voltage may cause RAMcontent to remain for seconds or even minutes after power -
Combining computational effects: commutativityand sum Martin Hyland,1 …
https://www.dpmms.cam.ac.uk/~jmeh1/Research/Publications/2002/hpp02.pdf19 Aug 2008: The following result is a restatement of the first main result of [24]. ... 1–24, Berlin: Springer-Verlag, 2001. 23. G. D. Plotkin and A. J. -
This is a placeholder. Final title will be filled later.
mi.eng.cam.ac.uk/~mjfg/yu-asru05.pdf11 Jan 2008: γm(t)ot. )(24). γm(t) is the component posterior derived from P (θ|O, H, λ̂k1).For the frame independent assumption it is necessary to obtain. ... where G and k are the standard sufficient statistics given in equa-tions 23 and 24, except that γm(t) -
Q-CAD: QoS and Context Aware Discovery Framework for Mobile ...
https://www.cl.cam.ac.uk/~cm542/papers/qcad05.pdf29 Feb 2008: Fuggetta, G. Picco, and G. Vigna. Understanding CodeMobility. IEEE Transactions on Software Engineering,24(5):342–361, May 1998. -
ASTlecture_01
https://www.cl.cam.ac.uk/teaching/0708/AdvSysTop/ASTlecture_01.pdf10 Feb 2008: shaded fields little-used today. 24. IP Hour Glass. ... 0/16. 12.3.0.0/2412.3.1.0/24. ::. 12.3.254.0/24. -
A QUALITY-GUIDED DISPLACEMENTTRACKING ALGORITHM FOR ULTRASONIC…
mi.eng.cam.ac.uk/reports/svr-ftp/chen_tr593.pdf17 Jan 2008: Among several techniques for displacement estimation [12, 24], correlation maximization wasthe first to be proposed and remains the most widely used [16]. ... As p1 is the only point ready for processing,it is selected and fed into any suitable -
Operating Systems Steven Hand Michaelmas / Lent Term 2008/09 ...
https://www.cl.cam.ac.uk/teaching/0809/OpSysI/os1a-handout1.pdf5 Nov 2008: 00 I Opcode S Ra Rd Operand 2. 31 25 24 21 20 19 16 15 1211 026. ... 640x480, 800x600, 1024x768, 1280x1024, 1600x1200. • Depths: 8-bit (LUT), 16-bit (RGB=555, 24-bit (RGB=888), 32-bit (RGBA=888). • -
Vedanta TRM
https://www.cl.cam.ac.uk/teaching/0809/SWEng/brady.ppt21 Oct 2008: 19. 20. 21. 22. 23. 24. 25. Number of bugs when released. -
A new approach to Internet banking
https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-731.pdf10 Dec 2008: V.Tor Evil Tor nodes. Tor [24] is an anonymization system advocated by the Electronic Freedom Foun-dation. ... 24 AN ANALYSIS OF E-BANKING VULNERABILITIES. Cost. One of the obvious metrics is cost. -
chapterMascolofinal
https://www.cl.cam.ac.uk/~cm542/papers/principles.pdf29 Feb 2008: Radio connectivity is, by default, not transitive. However, ad-hoc routing protocols have been defined [24] in order to overcome this limitation and allow routing of packets through mobile hosts. -
NONPARAMETRIC SURFACE REGRESSIONFOR STRAIN ESTIMATION J. E. Lindop,…
mi.eng.cam.ac.uk/reports/svr-ftp/lindop_tr598.pdf6 Mar 2008: The. 6. 20 40 60 80 100sample number. ry=24 a. ry=44 a. ... a). 20 40 60 80 100sample number. ry=24 a. ry=44 a. -
Topological GroupsPart III, Spring 2008 T. W. Körner March ...
https://www.dpmms.cam.ac.uk/~twk10/Topg.pdf8 Mar 2008: 24. 12 The inversion theorem. Before proving Bochner’s theorem we need some simple results on positivedefinite functions. -
Abstra t Games for Linear Logi Extended Abstra t ...
https://www.dpmms.cam.ac.uk/~jmeh1/Research/Oldpapers/hs99.pdf22 Aug 2008: R x if and only if ju xj 1.Girard's Coheren e spa es [24,28 are essentially G?(Rel) for this orthogona-17. ... Springer Verlag, 1993.[16 G.M. Bierman. On intuitionisti linear logi. Te hni al Report 346, Universityof Cambridge Computer Laboratory, August -
Predictive Resource Scheduling in Computational Grids∗ Clovis…
https://www.cl.cam.ac.uk/~cm542/papers/ipdps07.pdf29 Feb 2008: environment. An alternative predictive technique for scheduling of re-sources in parallel systems is presented in [24] based on theprediction of the future CPU loads. -
jsac.dvi
https://www.cl.cam.ac.uk/~cm542/papers/jsac.pdf1 Apr 2008: Approaches based on the replication of messages on allhosts have also been presented, such as epidemic-style tech-niques [24] that exploit a virus-spreading metaphor to indicatethe dissemination of information -
Mobile Computing Middleware Cecilia Mascolo, Licia Capra and Wolfgang …
https://www.cl.cam.ac.uk/~cm542/papers/ntw02.pdf29 Feb 2008: In [56] CORBA and IIOP are used together with the WAP (Wireless AccessProtocol) stack [24] in order to allow the use of CORBA services on a fixednetwork through mobile devices connected -
Mediation, Modulation, and Consequences of Membrane-Cytoskeleton…
https://www2.mrc-lmb.cam.ac.uk/groups/hmm/publica/DohertyMcMahonAnnRevBiophys08.pdf22 May 2008: sona. l use. onl. y. ANRV343-BB37-04 ARI 24 April 2008 15:9. ... l use. onl. y. ANRV343-BB37-04 ARI 24 April 2008 15:9. Endocyticevents. -
Prolog Lecture 2 ● Rules● Lists● Arithmetic● Last-call optimisation●…
https://www.cl.cam.ac.uk/teaching/0809/Prolog/Prolog08ML2R2.pdf2 Dec 2008: How about a “test to destruction”?biglist(0,[]).biglist(N,[N|T]) :-. M is N-1,biglist(M,T),M=M. 24. ... Slide 20. Slide 21. Slide 22. Slide 23. Slide 24. Slide 25.
Search history
Recently clicked results
Recently clicked results
Your click history is empty.
Recent searches
Recent searches
Your search history is empty.