英语人>网络例句>data sharing 相关的网络例句
data sharing相关的网络例句

查询词典 data sharing

与 data sharing 相关的网络例句 [注:此内容来源于网络,仅供参考]

While library resource sharing is shifting to the new networking environment era, it is also in face of a lot of new challenges and"Access versus Assets"is becoming the new theme of the resource sharing in this new networking era, based on this point this thesis studies the development and the transformation of the resource sharing both in practice and in theory in the networking environment, particularly focus on a serial of issues, including the construction of resource sharing system, digital information resource, digital library, interlibrary loan, document delivery service and collection development etc. The writer also analyzes the coexsitence of the traditional resource sharing and modernizational resource sharing and the relationship between them in 21st, explores the revolutionary changes of resource sharing as the"Assets"model is driving to the"Access"model, discusses the development of specific collection for a single library and how to construct a seamless integrated information resource system in the networking environment, systematically studies and introduces the new organization model of resource sharing, especially emphases that document delivery is the key of the success in resource sharing, and finally tries to outline the main trends which will influence resource sharing.

本文立足于网络环境下资源共享的新主题:存取与拥有,研究和分析了网络环境下资源共享及其体系建设,包括电子信息资源、数字图书馆建设、馆际互借、文献传递服务、文献资源建设等几方面在理论和实践中的发展和变革;论述了21世纪初网络环境下传统型和现代型两种层次并存的资源共享;探讨了文献资源建设从"拥有"模式到"存取"模式的重大转变、特色馆藏建设和无缝一体的网络信息资源体系的建设途径;较为全面、系统地研究和介绍了网络环境下资源共享的新型组织模式的形成及其特点;强调了文献传递是实现资源共享的关键;并试图准确把握网络环境下资源共享研究和实践的发展趋势。

Therein, by adopting the ISCSI protocol, the local data storage sub-system constructs the circuital access pattern of the taxation data. The system eliminates the unbalance phenomena between the capability and the demand of the data storage under the traditional bus storage pattern. Under the centralized control pattern, it provides the information access and shares service with the great data volume, the high speed of data transportation and the high availability for the taxation system. By remotely building a backup data center that is totally consistent with the local data center on the IT foundational fabric, the remote data backup sub-system uses the geographical dispersibility of the remote data center and adopts the LVR software replication technology. It implements the synchronous data replication between the local and remote data center, changes the zero standing capability on the great disaster event under the single data center pattern and raises the standing capability on the disaster events for the application and data in the taxation system. By adopting the dynamic replication technology between the heterogeneous data source, the heterogeneous data conformity sub-system successfully shields the various heterogeneous ingredients of the present system.

其中,本地数据存储子系统采用ISCSI协议构建了税务数据网络存储模式,消除了传统总线型存储模式下数据存储性能和存储需求之间的失衡现象,在集控管理模式下为税务系统提供了超大数据容量、高数据传输率和高可用性的信息存取和共享服务;远程数据备份子系统通过在异地构建一个和本地数据中心IT基础架构完全一致的备份数据中心,利用远程数据中心在地理上的分散性,基于LVR软件复制技术实现了本地和远程数据中心之间信息的实时同步,改变了过去单一数据中心模式下对大型灾难事件的零抗灾能力,提高了税务系统内应用和数据对灾难性事件的抵御能力;异构数据整合子系统采用异类数据源动态复制技术,成功屏蔽了目前系统内存在的各项异构成分。

This paper analyzed data from multiple sources and different structures, concluded three types of info: Login info, Event info, and Packet data info, then created the formation for every type of data; In order to combine future possible new data, IDS using profile and formation string together, create and practice data formation standard algorithm; Because in the collected data, there is info that is redundant or has minor effect on the IDS, this paper discussed the rules of redundant data differentiating and safe data differentiating, Then create data filter rule base; Data collecting system uses distributivity design, collecting module like a black box. we can get data which was filterd and had standard formation, if we created a new model string for new data source. Module work individually; filter data right away at the collecting node.

本文分析了多种来源的、不同结构的数据,将其总结成登录信息、事件信息和网络数据包信息三种类型,并为每种类型的数据设计了固定的格式;为了与将来可能出现的新型数据兼容,采用了配置文件与模式字符串相结合的方法,设计并实现了数据格式标准化算法;由于收集到的数据中存在冗余的信息和对入侵检测影响不大的信息,本文分别讨论了冗余数据辨别规则和安全数据辨别规则,并建立起数据过滤规则库;数据收集系统采用分布式设计,收集器以黑盒形式提供,对新的数据源只需设计一个新的模式字符串,即可得到过滤后的、具有标准格式的数据,各收集器间独立工作;在收集点即对数据进行过滤,只向分析中心报告可疑数据,以减少传输和存储的数据量,降低对网络性能的影响。

Then, considering the knowledge represented by a set of frequent patterns, we investigate the problems of preserving sensitive patterns in data sharing, hiding sensitive patterns in frequent pattern sharing, and also blocking inference channels in frequent pattern sharing. The main contributions are as follows:(1) For the problem of preserving anonymity in data sharing, we propose a clustering-based approach for implementing l-diversity.

本文首先研究了数据共享中匿名保护问题,接着以频繁模式为知识的表现形式,研究了数据共享中的敏感模式保护,频繁模式共享中的敏感模式隐藏,以及频繁模式共享中的推理控制等问题,主要的研究成果如下:(1)针对数据共享中的匿名保护问题,提出了一种基于聚类的l-多样化实现方法。

This invention discloses a user data process method, which contains 1, judging each data package in IP data steam sent form high layer of empty command protocol stack, if the received IP data package is TCP ACK data package, then executing step 2, if the received data package is not TCP ACK, then executing step 3, 2, making PDCP layer function process to IP data package and ending current process, 3, making flow control to IP data package and then executing 2,, said invention can precedential send TCP ACK data package to opposite part in preserving original TCP/IP and universal mobile telecommunication system data transmission system base, to reduce data package reversion time delay and keep stable data transmission rate.

本发明公开了一种用户面数据处理方法,其主要处理步骤如下:a。对从空口协议栈中高层下发的IP数据流中的每一个数据包进行判断:当前接收到的IP数据包是否为TCP的ACK数据包,对所有是TCP的ACK数据包的IP数据包执行步骤b;对所有不是TCP的ACK数据包的IP数据包执行步骤c;b。对IP数据包进行PDCP层的功能处理,结束当前处理流程;c。对IP数据包进行流控,再转入步骤b。采用本发明方法能够在保持原有TCP/IP和全球移动通信系统数据传输机制的基础上,优先将TCP的ACK数据包发送到对方,从而减少TCP的ACK数据包的回复时延,保证稳定的用户面数据传输速率。

Firstly, in this paper the importance and necessity for the land using data sharing have been expatiated amply. The land using data sharing, which refers to two main concepts, has been summarized. The two concepts are acquisition and processing of land using data as well as application of land using data. In WebGIS, there are two corresponding roles, namely, data yielder and data user or consumer.

本论文首先详细阐述了土地利用数据共享的重要性和必要性,并总结土地利用数据共享活动涉及了两个主要概念:土地利用数据的获取与处理、土地利用数据的应用,在WebGIS中即对应两个角色:数据提供者和数据使用者即用户。

During the research of bettering enterprise's technology innovation ability based on endogenetic and ectogenic knowledge sharing, the paper establishes the strategy of looking for the mainbody of outside sourse knowledge sharing. According to the knowledge distance theory, it analyses the obstacle and weekness of ectogenic knowledge sharing, discusses three modes that bettering enterprise technology innovation ability based on ectogenic knowledge sharing. The three modes are indraught, incorporation and cooperation.

2在研究基于外生型知识共享的企业技术创新能力提升路径中,论文根据知识距离理论确立了寻找外源知识共享主体的策略,分析了外生型知识共享的障碍和弊端,讨论了基于引进、购并与合作三种基于外生型知识共享的提升企业技术创新能力模式,并在分析各模式优缺点和应用局限性的基础上,提出了适应于企业不同的发展阶段的综合模式。

During the research of bettering enterprises technology innovation ability based on endogenetic and ectogenic knowledge sharing, the paper establishes the strategy of looking for the mainbody of outside sourse knowledge sharing. According to the knowledge distance theory, it analyses the obstacle and weekness of ectogenic knowledge sharing, discusses three modes that bettering enterprise technology innovation ability based on ectogenic knowledge sharing. The three modes are indraught, incorporation and cooperation.

2在研究基于外生型知识共享的企业技术创新能力提升路径中,论文根据知识距离理论确立了寻找外源知识共享主体的策略,分析了外生型知识共享的障碍和弊端,讨论了基于引进、购并与合作三种基于外生型知识共享的提升企业技术创新能力模式,并在分析各模式优缺点和应用局限性的基础上,提出了适应于企业不同的发展阶段的综合模式。

Firstly, there are less secure and efficient threshold schemes; secondly, the research on multi-secret sharing is rather weak; thirdly, usual verifiable secret sharing don't consider the partners' anonymity, while it is just people's expectation. Last but not least, the problem of variety on shares is becoming a more obvious restrict of efficiency, especially in the facets of the lost and being districted of shares. On the application of verifiable secret sharing, there are also two inadequates : on the one hand , verifiable secret sharing has been used in much threshold cryptography but in less verifiable signatures.

然而,经过认真总结、分析该领域目前研究的发展状况(具体结果将在第一章给出),我们发现在可验证秘密分享的研究方面,仍有下列四个不足之处:一是现有的安全、高效的门限方案不多;二是对多秘密分享的研究非常薄弱,在已有的文献中还见不到安全、实用的可验证多秘密分享方案;三是通常的秘密分享方案没有考虑秘密分享者的匿名性,而这恰恰是人们所希望的;四是秘密分享者的动态管理问题已经越来越明显的制约现有方案的安全,尤其是密钥份额丢失或被破坏时如何恢复更是没有被深入探讨。

The target king security analysis system is becomes by the wealth culture dissemination center research and development, in integrates 2380 outstanding targets, target operational, you do not need the profound stock theory, may the proper operation, be truly the fool type speculates in the stock market the software; In the software speculates in the stock market in the toolbar, has each kind of stock calculator, the real-time foreign exchange treasure, the video on demand, the online P2 television, the stock good world information, the daily publication magazine, the electronic painting pen, to grasp the chart tool, the organization memoir, the fund radar, the big list inquiry, ultra to win functions and so on rank, and in this help video frequency has the auspicious thin software operation video frequency help and ten extended functions, the user may act according to own demand the software which likes oneself to integrate in this software; But in software's time sharing chart, we integrated this important connection website for you, the user, so long as enters some stock in the time sharing chart, has underneath the left ultra wins the picture, ultra to win the rank, to win the data, ultra to win the data, the L2 data, the DDE target, the BBD target, the panoram information, the unification stock market, the stock news and so on this connection website, the user, so long as clicks may examine this stock the related information; But "the service" in the option card also integrated several hundred well-known finance and economics websites and the video frequency website in the software, may for the user inquiry finance and economics information, ultra win finance and economics related contents and so on data, fund quotation, finance and economics video frequency, news information.

指标王证券分析系统是由财富文化传播中心研发而成,内集成2380个优秀指标,指标操作性强,你不需要高深的股票理论,就可以正确操作,真正是傻瓜式炒股软件;在软件的炒股工具栏内,有各类股票计算器、实时外汇宝、网络电视、在线P2电视、股行天下资讯、每日报刊杂志、电子画图笔、抓图工具、机构研究报告、资金雷达、大单查询、超赢排行等功能,且此帮助视频内有祥细的软件操作视频帮助和十个扩展功能,用户可以根据自己的需求把自己喜欢的软件集成到本软件中;而在软件的分时图中,我们又为你集成了该股重要的关联网站,用户只要进入某股票的分时图中,在左下方就有超赢图片、超赢排行、全赢数据、超赢数据、L2数据、DDE指标、BBD指标、全景资讯、统一股市、个股新闻等该股关联网站,用户只要点击就可以查看该股的相关信息;而在软件的&服务&选项卡中还集成了几百个知名的财经网站和视频网站,可供用户查询财经资讯、超赢数据、基金行情、财经视频、新闻资讯等财经相关内容。

第1/500页 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Sharing Christmas
Decisions
Sharing The Night Together
Love Is
Data De Groove
The Sexy Data Tango
The Sexy Data Tango (BiTrektual Version)
Pra Te Fazer Lembrar
Networking
I Love You
推荐网络例句

Although translator has turned from being a crystal ball by which the original culture can unrestrainedly penetrate to another crystal ball by which the target culture can freely traverse, the translator's personal embodiment, in the process of cognitive act, are still absent in translation studies. Translators are still subjects without body or simply disembodied subjects.

译者虽然由原语文化可以自由穿透的玻璃球变成了译语文化可以自由穿越的玻璃球,但译者认知过程中的个体体验在翻译研究中依然缺席,译者依然仅仅是一个没有躯体体验的主体。

Chillingly, he claimed our technology is 'not nearly as sophisticated' as theirs and "had they been hostile", he warned 'we would be been gone by now'.

令人毛骨悚然的,他声称我们的技术是'并不那么复杂,像他们一样,和"如果他们敌意",他警告说,'我们将现在已经过去了。

And in giving such people " a chance to be themselves," he saw himself as a champion of th South's hardscrabble underclass, both black and white.

他给了这些人一个"成就自己"的机会,同时将自己看成是南方那些贫困的下层人民的声援者。