Search

Search Funnelback University

Search powered by Funnelback
61 - 70 of 849 search results for katalk:PC53 24 / where 0 match all words and 849 match some words.
  1. Results that match 1 of 2 words

  2. Computer Laboratory Course material 2007–08: Introduction to Security

    https://www.cl.cam.ac.uk/teaching/0708/IntroSec/
    22 May 2008: Taken by:This 8-h lecture course takes you onto a quick tour through the basics of computer security and cryptography on 2008 April 24-May 20, 12:00-13:00,
  3. Church’s Set Theory with a Universal Set Thomas Forster ...

    https://www.dpmms.cam.ac.uk/~tef10/church2001.pdf
    7 May 2008: DEFINITION 24 The things that are are values of k are either:. ... PROPOSITION 25 The clauses of definition 24 give a model in which every lowset x has a cardinal: {y : |y| = |x|}.
  4. Delivered by Ingenta to:Dublin City University IP : 136.206.1.20Thu,…

    www-g.eng.cam.ac.uk/nms/publications/pdf/King_JNN2008.pdf
    17 Jul 2008: Delivered by Ingenta to:Dublin City University. IP : 136.206.1.20Thu, 17 Jul 2008 13:44:24. ... IP : 136.206.1.20Thu, 17 Jul 2008 13:44:24. RESEARCHARTICLE. King et al.
  5. Bitext Alignment forStatistical Machine Translation Yonggang Deng A…

    mi.eng.cam.ac.uk/~wjb31/ppubs/YDengDissertationDec05.pdf
    16 Feb 2008: Bitext Alignment forStatistical Machine Translation. Yonggang Deng. A dissertation submitted to the Johns Hopkins University in conformity with the. requirements for the degree of Doctor of Philosophy. Baltimore, Maryland. 2005. Copyright c 2005 by
  6. dc1.dvi

    https://www.cl.cam.ac.uk/teaching/0708/DigiCommI/dc1.pdf
    15 Jan 2008: analog. Digital Communications I Slide 5-24. Exercises. 5-1 List 5 types of coding you encounter everyday, indicate thecommunications channel, the type of information beingencoded, the type of coding taking
  7. Capratse03.dvi

    https://www.cl.cam.ac.uk/~cm542/papers/tse03.pdf
    29 Feb 2008: being the semantic function shown in Figure 24 in theAppendix.Election of the Winner.
  8. Exploiting Reflection inMobile Computing Middleware Licia Capra a…

    https://www.cl.cam.ac.uk/~cm542/papers/mcr02.pdf
    29 Feb 2008: Examples include,but are not limited to, OpenCorba [24], dynamicTAO [23]and OpenORB [5]. ... Badrinath. An Architecture for ExportingEnvironment Awareness to Mobile Computing.IEEE Trans-actions on Software Engineering, 24(5):391–400, 1998.
  9. 29 Apr 2008: 3.1.1. TIMMI2. The observations on TIMMI2 were taken over three runs on 11-12 September 2003, 19-21 November 2003 and 24-26 January2005 (proposals 71.C-0312, ... 123356d G1V O(0.1)e 20.9 14+ 1270 (53) 3 615 (56)128400 G5V 0.3i 20.4 260+ 178 (24) 61+ 64
  10. A Framework for Multi-region Delay Tolerant Networking Mirco…

    https://www.cl.cam.ac.uk/~cm542/papers/winsdr08.pdf
    12 Jul 2008: only be ableto communicate with DTN nodes (i.e., they must implementthe bundle standard [24]).Support for Multicast The semantics of multicast com-munication in delay tolerant networks presents many openresearch ... 28] Z. Zhang. Routing in
  11. paper.dvi

    https://www.cl.cam.ac.uk/~acr31/pubs/hylick-harddrive2.pdf
    18 Nov 2008: Throttling Zhu et. al. present Hibernator, an energymanagement system for drive arrays in large storage envi-ronments [24]. ... 24] Q. Zhu, Z. Chen, L. Tan, Y. Zhou, K. Keeton, and J.

Refine your results

Format

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.