英语人>网络例句>UNIX 相关的网络例句
UNIX相关的网络例句
与 UNIX 相关的网络例句 [注:此内容来源于网络,仅供参考]

Operation as a function of the document description and code, containing all the file manipulation functions, suitable for the windows...

操作文件的函数的说明和代码,包含了所有文件操作的功能,适合在windows和unix下运行。

We're either looking at a file because it has a well-known name and defined format or because it has a well-known filename extension that indicates the format of the contents.

同时我们针对的是对文件的操作,因为在Unix它有固定的格式或者在Windows中它有扩展名表示其内容的格式。

The file uses a simple, classically UNIX free-format syntax, but can become forbiddingly complicated when a user has POP3 and IMAP accounts at multiple sites.

这个例子,可以看一下Listing 1,是一些我的简化版本。

The incapability of access control mechanism of Linux/Unix in defending malware is shown.

第二,设计了适合在安全操作系统中实施的恶意代码防御框架。

We develop the optimal JAPE grammar rules for IBM and HP web pages that describe IT product specification and download 36 IT product web pages to test the extraction performance. The testing result show the average recall and precision are over 90%. It reveals the JAPE grammar rules have good extraction performance when optimized for specific knowledge domain.

我们针对HP和IBM的网页撰写适当的JAPE语法规则,再从这两家公司的个人电脑(包含Desktop和Notebook),Unix伺服器,显示器及印表机等四大产品线,抽样36个网页进行产品规格的资讯撷取,其平均召回率和正确率都超过90%以上,由此可以验证JAPE语法规则针对特定领域的资讯撷取有相当不错的效能表现。

It is a multiplatform toolkit. It runs on all major operating systems. Including Unix, Windows and Mac.

它是一个多平台的工具包,可以在所有的主流操作系统上运行,包括Unic,Windows和Mac。

Generally, the traditional Intrusion Detection Techniques can be categorized into anomaly detection or misuse detection. Based on the mechanism of computer immune system, this paper presents a new anomaly detection technique to detect intrusion into computer system. In this technique, a Markov chain model is used to represent a temporal profile of normal behavior of a process. The Markov chain model of normal profile can be created by learning the historic data of the sequence of system calls produced by privileged processes running on UNIX system.

传统的入侵检测技术,依照所基于的原则不同,通常分为误用入侵检测与异常入侵检测,本文在入侵研究中所采用的计算机系统免疫思想的基础上,提出了一种新的异常入侵检测技术,通过对特权进程系统调用序列的历史数据的学习,用马尔可夫链模型来建立特权进程的正常时态行为轮廓。

Philosophy is an outgrowth of Unixexperience, and it is an excellent complement to this book.

作者的理论是从Unix的经验中得来,它可以作为本书很好的一个补充。

They lack facilities to create additional links to a directory, rename parent links (".." in Unix-like OS), and create bidirectional links to files.

它是数据的组织者和提供者,至于它的底层,可以是磁盘,也可以是其它动态生成数据的设备。

UNIX System V/386 Release 4 Programmer's Reference Manual.

本书是针对Intel80386处理器的SVR4实现的程序员参考手册。

第25/29页 首页 < ... 21 22 23 24 25 26 27 28 29 > 尾页
推荐网络例句

Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.

在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。

In fact,I've got him on the satellite mobile right now.

实际上 我们已接通卫星可视电话了

The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.

世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。