英语人>网络例句>communications protocol 相关的网络例句
communications protocol相关的网络例句

查询词典 communications protocol

与 communications protocol 相关的网络例句 [注:此内容来源于网络,仅供参考]

According to the equivalence relation on the set of security protocol,equivalence class of security protocol is divided,so amount of researching security protocol is decreased.

利用安全协议集合上的等价关系,可以划分出安全协议等价类,从而减少了需研究的安全协议的数量。

CIFS can be seen as an application protocol such as file transfer protocol and hypertext transfer protocol an implementation.

CIFS可以看做是应用程序协议如文件传输协议和超文本传输协议的一个实现。

Three network coding protocols, i.e., non-regenerative network coding protocol, regenerative complex field network coding protocol and regener-ative Galois field network coding protocol are proposed and applied to the multicastnetwork to enhance the throughput.

然后,本文研究了两源、两宿、单中继的协作组播网络,提出了三种网络编码协议,即非再生网络编码(Non-Regenerative NetworkCoding,NRNC)、复数域再生网络编码(Regenerative Complex FiledNetwork Coding,RCNC)和伽罗华域再生网络编码(Regenerative GaloisFiled Network Coding,RGNC)。

Open Shortest Path First is a routing protocol developed for Internet Protocol networks by the Interior Gateway Protocol working group of the Internet Engineering Task Force. The working group was formed in 1988 to design an IGP based on the Shortest Path First algorithm for use in the Internet.

最短路径优先是Internet 任务工程组的一个工作组为IP网络开发的一个内部网关路由选择协议,该工作小组成立于1988年并致力于为INTERNET应用设计一个基于最短路径优先算法的内部网关路由协议。

This new curriculum also includes the use of these protocols: IP, Enhanced Interior Gateway Routing Protocol, Serial Line Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2),VLANs, Ethernet, access control lists.

这种新的课程还包括在使用这些协议:知识产权,增强内部网关路由协议,串行线路接口协议帧中继,路由信息协议版本2( RIPv2 ),虚拟局域网,以太网接入控制清单。

It is part of the Transmission Control Protocol/Internet Protocol protocol suite.

在SNMP环境下,几乎所有的工作都是由网络管理系统来处理的。

But this kind of invasion cannot avoid the detection of IDS using the protocol analysis technology.(2) In the invasion activities of hackers using TCP, the actions about scanning and Denial of Service utilizing the three-handshake protocol are general. The characteristics of the actions are dynamic for its lie on a series of packets from beginning to end. So the IDS using the traditional pattern match technology cannot detect these actions effectively, but the IDS using the protocol analysis technology can do its.

2在利用TCP协议进行的黑客活动中,比较常用的是利用三次握手过程进行扫描行为和拒绝服务攻击,这类攻击的特征必须根据前后的一系列数据包才能确定,因此攻击特征具有动态性,很不适合于采用模式匹配作为信息检测技术的IDS,但协议分析技术可较为迅速地检测出这类攻击。

The Line Printer Remote is a printer protocol that uses Transfer Control Protocol/ Internet Protocol to establish connections between printers and workstations on a network.

该行式打印机远程是一种协议,它使用的打印机传输控制协议/ Internet协议来建立一个打印机和工作站之间的网络连接。

The formal description technology based on LOTOS, the formal transformation, the formal validation and implemenation are generalized. Constructions of communication service and communication protocol, transformation from service specification into protocol specification based on bisimulation equivalence are also stated in detail. Application of LOTOS specification styles and architecture concept in service and protocol design is studied as an emphasis.

归纳总结了基于LOTOS的形式化描述方法、形式化的转换、验证和实现等方法理论,以及通信服务和协议的构造方法及服务规范到协议规范的等效性转换方法,重点研究了规范风格和结构概念在服务和协议设计中的应用。

We improve the protocol for signing contract based on the research result of secure multiparty computation. In this protocol, the parties obliviously transfer the signed bit and the committed bit; the other parties can prove the validity of this bit based on the confirming sub-protocol, but he can't gain more information about the whole signature by accumulating the more signed bit or the committed bit. After the parties exchange the whole signed information, they declare the commitment about the signature respectively, and gain the whole signature of the other party. At this moment, the party doesn't care about the advance quit of the other party, because he has gained the whole signed information.

在协议执行过程中,参与者将合同的签名位以及他对签名位的承诺不经意传输给对方,对方可以利用验证子协议证明该位的有效性,但是他却不能通过位交换次数的增加获取更多的完整签名的信息;在完成签名位的交换之后,参与者分别公开承诺,并得到对方对合同的完整签名;在公开承诺时,协议参与者已经获得全部的签名内容,要么是签名位,要么是对方对该位的承诺,因此参与者并不需要担心对方提前终止协议,同时本文也利用多方安全计算的结论证明了该协议满足终止公平性。

第3/403页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Advanced Communications
Protocol
People Of Tomorrow
Super Balls
Stop! Before It's Too Late And We've Destroyed It All
Bird Flu
Sea Legs
The Set Up
I Still Like Bologna
Hostiles
推荐网络例句

Although translator has turned from being a crystal ball by which the original culture can unrestrainedly penetrate to another crystal ball by which the target culture can freely traverse, the translator's personal embodiment, in the process of cognitive act, are still absent in translation studies. Translators are still subjects without body or simply disembodied subjects.

译者虽然由原语文化可以自由穿透的玻璃球变成了译语文化可以自由穿越的玻璃球,但译者认知过程中的个体体验在翻译研究中依然缺席,译者依然仅仅是一个没有躯体体验的主体。

Chillingly, he claimed our technology is 'not nearly as sophisticated' as theirs and "had they been hostile", he warned 'we would be been gone by now'.

令人毛骨悚然的,他声称我们的技术是'并不那么复杂,像他们一样,和"如果他们敌意",他警告说,'我们将现在已经过去了。

And in giving such people " a chance to be themselves," he saw himself as a champion of th South's hardscrabble underclass, both black and white.

他给了这些人一个"成就自己"的机会,同时将自己看成是南方那些贫困的下层人民的声援者。