Search

Search Funnelback University

Search powered by Funnelback
61 - 80 of 232 search results for postgraduate entry requirements where 9 match all words and 223 match some words.
  1. Results that match 2 of 3 words

  2. full.dvi

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-399.pdf
    10 Nov 2008: time of a certicate. If such an entry condition becomes false, the certi-. ... the functional requirements of the dierent services, it is believed that a general.
  3. 9 Nov 2008: 753371 ARP - User Interfa e - hange ARP entry ags: linux/net/ipv4/arp. ... 754372 ARP - User Interfa e - Get an ARP entry: linux/net/ipv4/arp.
  4. 8 Jan 2008: Transmitting unique URLs trips up spam filters looking for repeated links,and also fools collators like PhishTank into recording duplicate entries. ... The next obvious countermeasure is to impose voting requirements. For ex-ample, a user must have
  5. A wide-area file system for migrating virtual machines

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-714.pdf
    21 Apr 2008: storage requirements of its services. It then discusses related work in two areas. ... After exploring this. algorithm’s requirements and implementation in detail, the chapter concludes by describing.
  6. 1 CAR: Context-aware Adaptive Routingfor Delay Tolerant Mobile…

    https://www.cl.cam.ac.uk/~cm542/papers/tmc08.pdf
    14 Jul 2008: Each entry of this table has the following structure:(targetHostId, nextHopId, dist, bestHopHostId, deliveryProb). ... As said before, the entry isremoved after a number of missing updates: this also avoids theproblem that entries with high probabilities
  7. Kilim: Isolation-Typed Actors for Java (A Million Actors, Safe ...

    https://www.cl.cam.ac.uk/~am21/papers/ecoop08.pdf
    2 May 2008: The process is easily reversed:each method consults the fiber upon entry, jumps directly to the resumptionpoint and restores its state where necessary. ... old. new. rewinding. pausing. normal entry. normal exit. Fig. 10. CFG before and after transform.
  8. ORIGINAL ARTICLE Mirco Musolesi Æ Cecilia Mascolo Æ Stephen ...

    https://www.cl.cam.ac.uk/~cm542/papers/pucj.pdf
    29 Feb 2008: Each entry is characterized by alease (a mechanism similar to that present in Jini [17]). ... its life is not extended), itcan expire and, consequently the entry is deleted fromthe registry.
  9. Performance Analysis and Prediction ofPhysically Mobile Systems…

    https://www.cl.cam.ac.uk/~cm542/papers/wosp07.pdf
    29 Feb 2008: Physical mobility is a requirement which developers havenot yet considered with the due care despite it having a hugeimpact on the performance of the system. ... LQN tasks, one for each component in the componentdiagram. The LQN tasks have as many
  10. A new approach to Internet banking

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-731.pdf
    10 Dec 2008: Shoulder Surfing not only applies to PIN entry, but also to credentials ononline banking. ... V.DNS DNS poisoning. DNS poisoning is a technique by which an attacker inserts bogus entries into thecache of a recursing name server.
  11. Writing on the Clean Slate:Implementing a Socially-Aware Protocol in…

    https://www.cl.cam.ac.uk/~cm542/papers/aoc08.pdf
    17 Apr 2008: Each host maintains a routing table that is implementedas a HashMap containing entries that are instances ofthe class GentlyRoutingTableEntry. ... Automatic Selection of the Protocols Another interest-ing problem is the definition of the automatic
  12. UNIX AND X by Frank H. King An Introduction ...

    https://www.cl.cam.ac.uk/teaching/0809/LongVac/ses1.pdf
    9 Sep 2008: This brings up a menu which contains various entries including Open Terminal (whichmay be the fourth entry). • ... With the exception of C-g,the commands listed in the summary can be found as entries in the Files menu.Against each entry, the associated
  13. Introduction to Security Markus Kuhn Computer Laboratory…

    https://www.cl.cam.ac.uk/teaching/0708/IntroSec/slides.pdf
    3 Jun 2008: 53. PasswordsRandomly picked single words have low entropy, dictionaries have lessthan 218 entries. ... Eavesdropping – one-time passwords, authentication protocols. Inconvenience of multiple password entries – single sign-on.
  14. Adapting Asynchronous Messaging Middlewareto Ad Hoc Networking Mirco…

    https://www.cl.cam.ac.uk/~cm542/papers/mwworkmirco04.pdf
    29 Feb 2008: The hosts that receive advertisement mes-sages add entries to their JNDI registry. ... Each entry is char-acterized by a lease (a mechanism similar to that presentin Jini [15]).
  15. Operating Systems II Steven Hand Michaelmas Term 2005 8 ...

    https://www.cl.cam.ac.uk/teaching/0809/OpSysI/osII-notes.pdf
    5 Nov 2008: requirement Ui to prevent pathological cases. • Overall: lots of confusing parameters to set. ... pld r3 <- [r3, r2] // phys load LPT PTE. mov Tlb <- r3 // install TLB entry.
  16. Adaptive Resource Discovery for Ubiquitous Computing ∗ Rae…

    https://www.cl.cam.ac.uk/~cm542/papers/mpacrae.pdf
    29 Feb 2008: Followingthis discussion, section 3 contains a description of RUBI, ourresource discovery protocol, which has been designed to ad-dress the requirements identified above. ... received. Entries are associated with an expiry timeand will be removed from
  17. Operating Systems II Steven Hand Michaelmas Term 2005 8 ...

    https://www.cl.cam.ac.uk/teaching/0708/OpSystems/osII-notes.pdf
    15 Jan 2008: requirement Ui to prevent pathological cases. • Overall: lots of confusing parameters to set. ... pld r3 <- [r3, r2] // phys load LPT PTE. mov Tlb <- r3 // install TLB entry.
  18. 4 — MEANS AND VARIANCES The term expectation (or ...

    https://www.cl.cam.ac.uk/teaching/0708/Probabilty/prob04.pdf
    23 Jan 2008: 9. 24. 6 52. 25. 4. 1. 6. 25. 24. The sum of the entries in the rightmost column is 7024. ... The Geometric distribution satisfies the informal requirement of being an indexed set ofprobabilities whose sum is 1.
  19. Digicom II 2008-2009

    https://www.cl.cam.ac.uk/teaching/0809/DigiCommII/dcii.pdf
    24 Sep 2008: bandwidth requirementsbandwidth requirements. ## burstiness burstiness in traffic (TSI can in traffic (TSI can!t skip input)t skip input). ## ... Market requirementsMarket requirements. "" products may need to be backwards compatibleproducts may need to
  20. 29 Feb 2008: linkbase”). We use XLink technology to define thelinks between devices and remote tree entry points. ... B. Saikoski, and W. Yu. Next Generation Mid-dleware: Requirements, Architecture and Prototypes.
  21. Operating Systems II— Additional Information — Steven HandLent Term…

    https://www.cl.cam.ac.uk/teaching/0809/OpSysI/osII-additional.pdf
    5 Nov 2008: An IPT is a fixed size hash table containing one entry for each physical frame ofmemory. ... Each hand points to an entry in the core map, a fixeddistance apart.

Refine your results

Format

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.