University of Cambridge Computer Laboratory

Results: 746



#Item
31TRANSFORMING MULTIPLE-RECORD DATA INTO SINGLE-RECORD FORMAT WHEN NUMBER OF VARIABLES IS LARGE. David Izrael, Abt Associates Inc., Cambridge, MA David Russo, Independent Consultant ABSTRACT In one large survey project eac

TRANSFORMING MULTIPLE-RECORD DATA INTO SINGLE-RECORD FORMAT WHEN NUMBER OF VARIABLES IS LARGE. David Izrael, Abt Associates Inc., Cambridge, MA David Russo, Independent Consultant ABSTRACT In one large survey project eac

Add to Reading List

Source URL: www.ats.ucla.edu

Language: English - Date: 2016-08-17 18:18:26
32The semantics of poetry: a distributional reading Aur´elie Herbelot University of Cambridge, Computer Laboratory J.J. Thomson Avenue, Cambridge CB1 8AZ United Kingdom

The semantics of poetry: a distributional reading Aur´elie Herbelot University of Cambridge, Computer Laboratory J.J. Thomson Avenue, Cambridge CB1 8AZ United Kingdom

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-26 06:49:42
33Do You Believe in Tinker Bell? The Social Externalities of Trust Khaled Baqer and Ross Anderson Computer Laboratory, University of Cambridge, UK

Do You Believe in Tinker Bell? The Social Externalities of Trust Khaled Baqer and Ross Anderson Computer Laboratory, University of Cambridge, UK

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-02-02 10:23:17
34Securing Your Xen Virtualization Environment Russell Pavlicek Xen Project Evangelist Citrix Systems

Securing Your Xen Virtualization Environment Russell Pavlicek Xen Project Evangelist Citrix Systems

Add to Reading List

Source URL: www.suse.com

Language: English - Date: 2016-07-27 12:56:27
35eV+ Language Reference Guide

eV+ Language Reference Guide

Add to Reading List

Source URL: www1.adept.com

Language: English - Date: 2013-05-09 05:01:48
36Virtualization Guide Red Hat Virtualization Virtualization Guide: Red Hat Virtualization Copyright © 2007 Red Hat, Inc. This Guide contains information on configuring, creating and monitoring guest operating systems on

Virtualization Guide Red Hat Virtualization Virtualization Guide: Red Hat Virtualization Copyright © 2007 Red Hat, Inc. This Guide contains information on configuring, creating and monitoring guest operating systems on

Add to Reading List

Source URL: centos.org

Language: English - Date: 2007-03-21 03:38:02
37Virtualization Guide 5.1 Red Hat Enterprise Linux  Virtualization_Guide

Virtualization Guide 5.1 Red Hat Enterprise Linux Virtualization_Guide

Add to Reading List

Source URL: centos.org

Language: English - Date: 2008-01-29 00:36:15
38An RFID Distance Bounding Protocol Gerhard P. Hancke, Markus G. Kuhn University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK {gh275,mgk25}@cl.cam.ac.uk Abstract

An RFID Distance Bounding Protocol Gerhard P. Hancke, Markus G. Kuhn University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK {gh275,mgk25}@cl.cam.ac.uk Abstract

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-11-25 11:04:54
39XenServer 6.5 Release Notes

XenServer 6.5 Release Notes

Add to Reading List

Source URL: support.citrix.com

Language: English
40Advanced Exploitation: Xen Hypervisor VM Escape Shangcong Luan May 27, 2016 Alibaba Cloud Platform Security Team

Advanced Exploitation: Xen Hypervisor VM Escape Shangcong Luan May 27, 2016 Alibaba Cloud Platform Security Team

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2016-05-27 10:02:21