Search

Search Funnelback University

Search powered by Funnelback
41 - 60 of 121 search results for KA :ZA31 where 0 match all words and 121 match some words.
  1. Results that match 1 of 2 words

  2. University giving evidence to Parliament on the impact of Brexit on…

    https://www.staff.admin.cam.ac.uk/general-news/university-giving-evidence-to-parliament-on-the-impact-of-brexit-on-research-and-science
    Thumbnail for University giving evidence to Parliament on the impact of Brexit on research and science | For staff 16 Jan 2018: Date: Thursday, 18 January. Time: 10.00am – 11.30am. Location: Cancer Research UK Cambridge Institute, Lecture Theatre, Li Ka Shing Centre, Robinson Way, Cambridge CB2 0RE.
  3. security-acs-1-2018

    https://www.cl.cam.ac.uk/teaching/1819/R209/2018-r209-week1-crypto.pdf
    15 Oct 2018: Another is certificates. Sam signs Alice’s public key (and/or signature verification key) CA = sigS{TS,L,A,KA,VA}. •
  4. cipolla.dvi

    mi.eng.cam.ac.uk/~cipolla/publications/article/1998-RoySoc-Cipolla.pdf
    13 Mar 2018: v'$px kÃ Æ ÊV kÃ Æ ÙV3¢{}|'«'=HwbVz{wbxvV1{}|]|vzvVVwbH=|@£&w}kH{}{}|kXvV3vHwkxlÃ/{vg{}|vx'l Å.
  5. Shan.dvi

    https://www.dpmms.cam.ac.uk/~twk10/Shan.pdf
    20 Dec 2018: Coding and Cryptography. T. W. Körner. December 20, 2018. Transmitting messages is an important practical problem. Coding theoryincludes the study of compression codes which enable us to send messagescheaply and error correcting codes which ensure
  6. 20 Feb 2018: Zhang and Chaudhuri2015] Chicheng Zhang and Ka-malika Chaudhuri. 2015. Active learning fromweak and strong labelers.
  7. statphys

    www.damtp.cam.ac.uk/user/tong/statphys/three.pdf
    31 Dec 2018: and, for small ka, the sin function is approximately linear. This means that we get.
  8. 15320956277210 1..9

    www.damtp.cam.ac.uk/user/gold/pdfs/resultsresults.pdf
    20 Jul 2018: DOI: https://doi.org/10.7554/eLife.17210, PMID: 27529126. Michaelis L, Menten ML, Johnson KA, Goody RS.2011.
  9. calib.dvi

    mi.eng.cam.ac.uk/~cipolla/publications/inproceedings/2000-ECCV-Malis.pdf
    13 Mar 2018: KÁ?AIÐOÔR_?A@JI ¿ÛÒõÛ"ø#FS?AI¿ØD4I? AI¿?ÒRS?GD4E)ØJçOF_Fx@4Ñ&RSÙ¿OÔ-D4xOQ_DUDJQ_DJxORSOQ_FCÔ-@JxU¿çR_OMRSÙ¿O,I@JQ_ÁD4EA?GFO%K. ... O#Q_O-U¿Q_OFSO-IZR FRSÙO8xO%D4IO-Q_QS@VQ7Ô@VxU¿çRSO%KÂ@JI õïRSQ_?GD4EGFCò?ÒRSÙ K?Òú
  10. https://www.cl.cam.ac.uk/teaching/1819/CloudComp/lectures/words.txt

    https://www.cl.cam.ac.uk/teaching/1819/CloudComp/lectures/words.txt
    3 Nov 2018: A a aa aal aalii aam Aani aardvark aardwolf Aaron Aaronic Aaronical Aaronite Aaronitic Aaru Ab aba Ababdeh Ababua abac abaca abacate abacay abacinate abacination abaciscus abacist aback abactinal abactinally abaction abactor abaculus abacus Abadite
  11. 20 Feb 2018: Q(b,a) GP (0,k((b,a), (b,a))). (41). The kernel k(, ) is often factored into separate kernels over the belief state and actionspaces kB(b,
  12. Security II: Part 2: Security engineering

    https://www.cl.cam.ac.uk/teaching/1718/SecurityII/drt/security2-part2-1up.pdf
    16 Feb 2018: Security II: Part 2: Security engineeringDaniel R. ThomasDepartment of Computer Science and Technology, University of Cambridge. Lent 2018. GPG: 5017 A1EC 0B29 08E3 CF64 7CCD 5514 35D5 D749 33D9https://www.cl.cam.ac.uk/drt24/. This part of the
  13. Assisted Video Object LabelingBy Joint Tracking of Regions and ...

    mi.eng.cam.ac.uk/~cipolla/publications/inproceedings/2007-ICCV-workshop-assistedlabels.pdf
    13 Mar 2018: a keypoint kA in A which matches kBin B is kept if kB matches kA and vice versa).
  14. 20 Feb 2018: and action spaces kB(b, b′)kA(a,a′)and Qπ(b,a) N(0,σ2) is Gaussian noise, Gaussian pro-cess regression [22] can be applied to find the posterior
  15. cipolla.dvi

    mi.eng.cam.ac.uk/~cipolla/archive/Publications/article/1998-RoySoc-Cipolla.pdf
    13 Mar 2018: v'$px kÃ Æ ÊV kÃ Æ ÙV3¢{}|'«'=HwbVz{wbxvV1{}|]|vzvVVwbH=|@£&w}kH{}{}|kXvV3vHwkxlÃ/{vg{}|vx'l Å.
  16. Security II: Part 2: Security engineering

    https://www.cl.cam.ac.uk/teaching/1718/SecurityII/drt/security2-part2-handout.pdf
    16 Feb 2018: Security II: Part 2: Security engineeringDaniel R. ThomasDepartment of Computer Science and Technology, University of Cambridge. Lent 2018. GPG: 5017 A1EC 0B29 08E3 CF64 7CCD 5514 35D5 D749 33D9https://www.cl.cam.ac.uk/drt24/. This part of the
  17. 1 of 7 978-1-4244-2677-5/08/$25.00 ©2008 IEEE FAILURE PREDICTION AND…

    www.damtp.cam.ac.uk/user/ms100/PAPERS/IEEE-Bayesian2008.pdf
    13 Dec 2018: These microwave frequencies are typically in the C, S, X, Ka, or Ku bands (frequencies above about 1000 MHz).
  18. 13 Mar 2018: "!"#$!%"&')(",-.)! /1032547698:0<;,=?>503@A@CBDBFEHGJIK=MLONQPK03@A@?=AESR3TUS6WV8X47>5BF698:YZ4E8,0F[]E_R3=?E_47476:=AESRS_aKES=Ab"476WV=?8cD0F[1;dBeYf2_6:=CGR34". ;dBFYg2S69=CGRh4"S;di1jlkmonqpr Ls=A>503@?@MBtEeu:Tv"w47ESR_pxL7BeYypxBhL3pzUSN.
  19. Personal Profiles | Cambridge CARES

    https://www.cares.cam.ac.uk/personal-profiles/?category=Researchers&?category=Researchers&offset=2&profile_id=475
    18 Oct 2018: BN, Holz RE, Hyer EJ, Lynch P, Meinardi S, Posselt DJ, Richardson KA, Salinas SV, Smirnov A, Wang Q, Yu L, Zhang J.
  20. Magnus–Lanczos methods with simplified commutators for the…

    www.damtp.cam.ac.uk/user/na/NA_papers/NA2018_01.pdf
    3 Apr 2018: Magnus–Lanczos methods with simplified. commutators for the Schrödinger equation with a. time-dependent potential. Arieh Iserles, Karolina Kropielnicka† & Pranav Singh‡. April 4, 2018. AMS Mathematics Subject Classification: Primary 65M70,
  21. 13 Mar 2018: RYQLR P[&|FLYÁ|FLc&t | kâ[&UR[&gXNQc&[&[&UNFLP LNQU ]bWBcWlRR ]QgXNQU [&TQU VQL [&TiLPR L NQP , LU [eiLj[&YQLT U [&UrkX|FL[&TQdO|i[e]QR=o.

Refine your results

Format

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.