英语人>网络例句>authorization 相关的网络例句
authorization相关的网络例句

查询词典 authorization

与 authorization 相关的网络例句 [注:此内容来源于网络,仅供参考]

Such network behavior leads to blabbing personal secrets illegally and spread files without authorization. This problems lead to the motivation of this investigation to detect and filter P2P traffic.

基於上述原因,一般的ISP业者、企业主管机关与学术研究相关单位皆为此而困扰,所以对P2P网路的侦测与防范就有其必要性。

While P2P network spreading rapidly, P2P traffic has occupied up to 80% of corporations and schools' network traffic. Under limited network resources, such high occupancy consumes most of network bandwidth. Since to there is no log file to keep connection record with the P2P network. Such network behavior leads to blabbing personal secrets illegally and spread files without authorization.

P2P网路日益普及,已经占了一般企业与学术网路流量的百分之八十以上,而如此高的使用率,在有限的网路频宽下,容易将一般网路资源耗尽;也因为P2P网路采用端对端的架构,没有像传统用户伺服器(Client-Server)模式容易将连线纪录保存下来,所以一旦有非法使用者将企业或私人私密资料藉由P2P网路泄漏给第三者,也不易由传统检查纪录档的方式查询;也因此,除了公司企业的泄密危机外,常常会存在著网路间流传非授权软体或档案的威胁。

The accusers denote in their indictment that, Shenzhen Aowo International Technology Development Co Ltd and Shenzhen Aowo Medical New Technology Co Ltd illegally use patent Circumrotating Coniform Focused Gama-ray Radiation Unit without authorization to produce gama knife systems, Concord Medical Services Holdings Limited and its affiliated enterprises Shenzhen Aohua Medical Device Development Co Ltd and Shenzhen Aohua Medical Device Leasing Co Ltd sell the illegal products, as well as invest 26 gama knife therapy centers.

原告在起诉状中表示,深圳奥沃国际科技发展有限公司和深圳市奥沃医学新技术发展有限公司未经许可,非法使用&旋转锥面聚焦式伽玛射线辐射单元&专利技术生产伽玛刀,泰和诚医疗集团有限公司属下的深圳傲华医疗设备发展有限公司和深圳傲华医疗设备租赁有限公司则销售这些侵权产品,并在各地投资建立了26家伽玛刀治疗中心。

It is illegal to copy or reproduce copyrighted material without authorization from the owner of the copyright.

这是非法复制或复制受版权保护的材料从未经授权的所有者的著作权。

Mr Guo thinks, the caption after Sohu net is changed and the thematic photograph that report formerly are contrary to, its do sth without authorization changes the behavior of caption to make the audience of numerous and unidentified truth and netizen produce erroneous impression, small swallow of the person that think to die is to love another person, derogated reputation of the person that die, cause huge spirit harm and negative effect to them.

郭先生认为,搜狐网更改后的标题与原报道的主题相悖,其擅自改标题的行为使众多不明真相的观众和网民产生错误印象,认为逝者小燕是移情别恋,贬损了逝者名誉,给他们造成极大的精神伤害以及负面影响。

It unseals or uses the sealed or distrained facilities, equipment or apparatuses without authorization

对查封或者扣押的设施、设备、器材,擅自启封或者使用的

Nevertheless, android system disappears tardy, at the moment, obtain the Nuojiya that Google edifies to announce, will buy share of Symbian the others, establish Symbian foundation, the mobile phone operating system that will develop to provide authorization freely , will provide more mobile phone application software in order to open source way in addition.

不过,Android系统迟迟不见踪影,此时此刻,获得Google启迪的诺基亚宣布,将收购Symbian其余股份,创建Symbian基金会,将开发一个免费提供授权的手机操作系统,此外将更多的手机应用软件将以开源方式提供。

For authorization needed to set up a bank, there should be a definition of bank to prevent behaviors eluding this market permission.

由于法律对商业银行的设立采取特许制度,因此需要界定商业银行的实质,以防止逃避银行监管的脱法行为。

With the development of computer and network technology, there are more and more applications of digital contents which are easy to be copied, modified and spread. Because of these features, the digital contents are also always under the risk to be filched, juggled, accessed without authorization and illegally distributed. The digital contents can hardly be protected effectively in the network environment due to its large-scale disordered distribution, which has hindered the development of the applications based on the digital contents.

随着计算机技术和网络技术的发展,具有易复制、易修改和易传播特征的数字内容的各种应用蓬勃兴起,但这些特性同时是一把双刃剑,使得数字内容在其生命周期内随时面临被窃取、篡改、非授权访问和非授权分发的威胁,造成数字内容价值的降低甚而丧失,这直接或间接地制约着各种数字内容应用的发展。

Based on the existing grid security architecture, gives a kind of Grid Security and Trust Architecture inosculating trust management, identity authentication, authorization management, resource management and safety monitoring and audit system.

在研究分析现有网格安全体系结构模型的基础上,给出了一种融合信任管理、身份认证、授权管理、资源管理和安全监控审计的网格安全信任体系架构。

第27/37页 首页 < ... 23 24 25 26 27 28 29 30 31 ... > 尾页
相关中文对照歌词
Black Cop
The ?
Space Mix (The Ultimate Nonstop Mix)
Impossible
推荐网络例句

Apllied the data of QuickBird-2——the highest resolution remote sensing,and based on the theory and methodology of fractal geometry,we have quantitatively studied remote sensing lineations in Gaolong gold deposit of Guangxi.

采用Quick Brid-2高分辨率卫星遥感数据,通过分形几何学的盒计维数法,定量研究广西高龙金矿区遥感线性构造。

So, sometimes, to change the color can not be your food (referring to the above-mentioned crustacean) has been a sign of boiling over.

所以,有时,来改变颜色,不能你的食物一直是沸腾了的迹象。

MILAN - Nils Liedholm told 'Tuttosport':'It is not a decisive game but actually an important one.

米兰--利德霍尔姆接受全体育采访时说:罗马与米兰的比赛虽不是决定性的,但的确是场重要的比赛。