查询词典 database access
- 与 database access 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The method comprises the following steps: a conversation initialization request message transmitted by a service requester is received, wherein the request message comprises an application service quality parameter and service description information; according to the application service quality parameter and the service description information, a access protocol intermediate node of the corresponding simple object and a service provider are selected; according to the intermediate node and the service provider, access protocol routing information of the corresponding simple object can be acquired; and the conversation initialization request message containing the access protocol routing information of the simple object is transmitted to the corresponding service provider.
本发明方法包括:接收服务请求方发送的会话初始化请求消息,所述会话初始化请求消息中包含应用服务质量参数以及业务描述信息;根据所述应用服务质量参数以及业务描述信息选择对应的简单对象访问协议中介节点以及服务提供方;根据所述简单对象访问协议中介节点以及服务提供方获取对应的简单对象访问协议路由信息;向对应的服务提供方发送包含所述简单对象访问协议路由信息的会话初始化请求消息。本发明还提供一种路由系统以及相关设备。
-
This system can realize random access as well as sequential access and it has the better performance than the normal data recording system based on sequential access storage devices.
它不仅支持连续数据存取,还可以支持随机数据存取,性能优于通常采用普通顺序存取设备实现连续记录的方案。
-
In order to effectively reduce the effects of multi-access interference on the performance of optical code division multiple access communication systems with intensity modulation and direct detection,according to group information, a novel kind of multi-access interference cancellation scheme based on fiber Bragg gratingused with two dimensional address code MPC/OOC is presented.
摘要在强度调制、直接探测的光码分多址通信系统中,为了有效克服并发用户数之间的多址干扰,提高系统的通信性能,根据组信息,针对由光正交码和修正素数码构成的扩时/跳频地址码MPC/OOC,提出一种基于光纤布拉格光栅的多址干扰消除方案,并详细分析了采用这种多址干扰消除方案的光CDMA通信系统的性能。
-
This paper mainly researches several key technical problems about access control for web services based on SOAP, which includes the architecture design of access control for Web Services based on ABAC, the application of XACML in access control for Web Services, the design and implement of SOAP gateway and SOAP client.
本文主要研究基于SOAP的Web Services访问控制中的几个关键技术问题,包括;基于ABAC的Web Services访问控制体系结构设计、XACML在Web Services访问控制中的应用、SOAP网关和SOAP客户端的设计与实现等。
-
Attribute based access control model for Web Services is systemic researched, and an architecture of access control for Web Services is designed, which combines the architecture of access control of ABAC and the typical application architecture of Web Services.
系统研究了面向Web Services的基于属性的访问控制模型ABAC,并结合ABAC访问控制架构和Web Services典型应用架构设计了Web Services访问控制体系结构。
-
Researchers have paid more attention on discretional access control,role-based access control and view based technology,rather than mandatory access control.
目前关于XML安全性的研究主要集中于自主访问控制、基于角色的访问控制和视图技术,而对于强制访问控制很少有研究。
-
Discretionary Access Control policy is an access control based on ownership relations between subject and object. The subject can discretionarily decide that who, by which means, can access his owned objects.
自主访问控制政策是基于客体—主体的所属关系的访问控制,主体可自主地决定其他的哪些主体可以以何种方式来访问他拥有的客体。
-
Among n web pages, access probability increment will decrease from the first web page to nth web page. Web pages above n will be accessed less frequently then ever. We analysed a Web server log and two proxy server logs. Analysis mainly focus on Web page request distribution, Web static document size distribution, Web static document access distance distribution, Web static doment access intertime distribution.
对一个典型的Web服务器和两个代理服务器的日志进行了分析,并将Web页面请求分布、Web静态文档大小的分布、Web静态文档的访问距离的分布、Web静态文档访问间隔时间分布同既有文献的结果进行了对比,有些结论是相同的,有些不同,可以视为我国WWW访问所特有的访问特性。
-
NET Framework class library. It is the backbone of partially trusted code and is not restricted to file access, but rather affects everything from network access to windowing and more. When you use it in your own component code, users will be able to execute code regardless of origin, and their systems will remain safe. This allows you to write code that is featureful, executes in native machine language, and is distributed across a LBN or even over the Internet. You can take advantage of this feature with only a minimal exposure to the underlying mechanics of code access security.
NET框架类库来施用他是半信托代码的根蒂根基而且不受限于文件拜候,可是对路程经过过程收集拜候窗户或其它的不论什么情况都有至关的影响当您在您本身的组件代码中施用它时,用户可以在不消留心来历的情况下执行代码(好比从1个英特网网站),她们的体系仿照还是是安全的这似的您可以开具富有特征的、路程经过过程本机执行的而且漫衍拜候局域网甚至是英特网的代码您可以哄骗这些特征在代码拜候安全的根蒂根基下最小限度的袒露您的信息
-
We can see that these come to the same thing, since if our access (to an external object, for example) is direct in sense (1), then there is nothing (at the intentional and personal level) to which we have access and in virtue of which we have access to the object.
我们能够明白这些获得的结果时一样的,因为如果我们在1意义上是直接可达的,那么在意向和人格水平,我们可以说,没有东西会是我们拥有的可达物且借助它能够可达对象。
- 相关中文对照歌词
- Big Sunglasses
- Access Me
- Access Babylon
- Poet Laureate Infinity Vocal 2
- Stand By Your Beds
- NPG Operator
- Plastic Soldiers
- Krazy
- Communication
- Mercy
- 推荐网络例句
-
We got alerted a couple of times while we were down south that HETs were on the way to bring us back up north because things were going to go hot again, but it was just rumors.
南下的途中我们不只一次得到警告说重型装备运输车将拉着我们重新北上,因为局势正在变得重新紧张起来,但这只是谣传。
-
It's the one where they find the ghost in the salt mine.
这一集是演他们在盐矿找到鬼
-
Stamens 6, inserted at base of perianth tube, included; filaments short; anthers basifixed. Ovary ovoid-globose, 3-loculed; ovules several per locule.
雄蕊6,着生的在花被基部筒部,内藏;花丝短;花药基着子房球状卵球形,3室;胚珠数个每室。