Search
Search Funnelback University
- Refined by:
- Date: 2008
61 -
70 of
849
search results for katalk:PC53 24 /
where 0
match all words and 849
match some words.
Results that match 1 of 2 words
-
Computer Laboratory Course material 2007–08: Introduction to Security
https://www.cl.cam.ac.uk/teaching/0708/IntroSec/22 May 2008: Taken by:This 8-h lecture course takes you onto a quick tour through the basics of computer security and cryptography on 2008 April 24-May 20, 12:00-13:00, -
Church’s Set Theory with a Universal Set Thomas Forster ...
https://www.dpmms.cam.ac.uk/~tef10/church2001.pdf7 May 2008: DEFINITION 24 The things that are are values of k are either:. ... PROPOSITION 25 The clauses of definition 24 give a model in which every lowset x has a cardinal: {y : |y| = |x|}. -
Delivered by Ingenta to:Dublin City University IP : 136.206.1.20Thu,…
www-g.eng.cam.ac.uk/nms/publications/pdf/King_JNN2008.pdf17 Jul 2008: Delivered by Ingenta to:Dublin City University. IP : 136.206.1.20Thu, 17 Jul 2008 13:44:24. ... IP : 136.206.1.20Thu, 17 Jul 2008 13:44:24. RESEARCHARTICLE. King et al. -
Bitext Alignment forStatistical Machine Translation Yonggang Deng A…
mi.eng.cam.ac.uk/~wjb31/ppubs/YDengDissertationDec05.pdf16 Feb 2008: Bitext Alignment forStatistical Machine Translation. Yonggang Deng. A dissertation submitted to the Johns Hopkins University in conformity with the. requirements for the degree of Doctor of Philosophy. Baltimore, Maryland. 2005. Copyright c 2005 by -
dc1.dvi
https://www.cl.cam.ac.uk/teaching/0708/DigiCommI/dc1.pdf15 Jan 2008: analog. Digital Communications I Slide 5-24. Exercises. 5-1 List 5 types of coding you encounter everyday, indicate thecommunications channel, the type of information beingencoded, the type of coding taking -
Capratse03.dvi
https://www.cl.cam.ac.uk/~cm542/papers/tse03.pdf29 Feb 2008: being the semantic function shown in Figure 24 in theAppendix.Election of the Winner. -
Exploiting Reflection inMobile Computing Middleware Licia Capra a…
https://www.cl.cam.ac.uk/~cm542/papers/mcr02.pdf29 Feb 2008: Examples include,but are not limited to, OpenCorba [24], dynamicTAO [23]and OpenORB [5]. ... Badrinath. An Architecture for ExportingEnvironment Awareness to Mobile Computing.IEEE Trans-actions on Software Engineering, 24(5):391–400, 1998. -
Astronomy & Astrophysicsmanuscript no. 8719 c© ESO 2008April 28,…
https://people.ast.cam.ac.uk/~wyatt/swd08.pdf29 Apr 2008: 3.1.1. TIMMI2. The observations on TIMMI2 were taken over three runs on 11-12 September 2003, 19-21 November 2003 and 24-26 January2005 (proposals 71.C-0312, ... 123356d G1V O(0.1)e 20.9 14+ 1270 (53) 3 615 (56)128400 G5V 0.3i 20.4 260+ 178 (24) 61+ 64 -
A Framework for Multi-region Delay Tolerant Networking Mirco…
https://www.cl.cam.ac.uk/~cm542/papers/winsdr08.pdf12 Jul 2008: only be ableto communicate with DTN nodes (i.e., they must implementthe bundle standard [24]).Support for Multicast The semantics of multicast com-munication in delay tolerant networks presents many openresearch ... 28] Z. Zhang. Routing in -
paper.dvi
https://www.cl.cam.ac.uk/~acr31/pubs/hylick-harddrive2.pdf18 Nov 2008: Throttling Zhu et. al. present Hibernator, an energymanagement system for drive arrays in large storage envi-ronments [24]. ... 24] Q. Zhu, Z. Chen, L. Tan, Y. Zhou, K. Keeton, and J.
Search history
Recently clicked results
Recently clicked results
Your click history is empty.
Recent searches
- People aliens |u:www.jbs.cam.ac.uk (1,135) · moments ago
Recent searches
Your search history is empty.