英语人>网络例句>internet protocol 相关的网络例句
internet protocol相关的网络例句

查询词典 internet protocol

与 internet protocol 相关的网络例句 [注:此内容来源于网络,仅供参考]

The application model of Internet has been changed from the "age of portal","age of e-shopping" to "age of vertical platform of content and service", and after the Legend of NASDAQ Internet Stock and the Internet War, dotcom companies are now facing a crag-fast situation. On one hand, there is still a bright future and numerous business opportunities for Internet economy; On the other hand, dotcom companies cannot survive without profits. How to provide foresighted services and how to seize business opportunities on the basis of complete understand of the fast-developing Internet, is a key subject for dotcom companies to study on..

但是,在互联网的应用模式经历了&门户模式&、&网上商店模式&和&内容+服务的垂直平台模式&,互联网企业经历了那斯达克网络股神话和互联网大战之后,面对着一面是前景无限美好的网络经济未来和巨大的商业机会,另一面是眼下不盈利就无法生存的现实社会,互联网企业如何在迅速发展的互联网事业中,充分认清互联网未来的存在形式,以超前的意识、实用的精神,为全社会设计好、建设好、服务好、使用好互联网做好服务,如何在蓬勃发展的互联网事业中获取商机,是互联网行业目前值得探讨的焦点课题。

This protocol may be used either above the Transmission Control Protocol or above the User Datagram Protocol.

该协议可以用在 TCP 协议或是 UDP 协议上。

According to the equivalence relation on the set of security protocol,equivalence class of security protocol is divided,so amount of researching security protocol is decreased.

利用安全协议集合上的等价关系,可以划分出安全协议等价类,从而减少了需研究的安全协议的数量。

CIFS can be seen as an application protocol such as file transfer protocol and hypertext transfer protocol an implementation.

CIFS可以看做是应用程序协议如文件传输协议和超文本传输协议的一个实现。

Three network coding protocols, i.e., non-regenerative network coding protocol, regenerative complex field network coding protocol and regener-ative Galois field network coding protocol are proposed and applied to the multicastnetwork to enhance the throughput.

然后,本文研究了两源、两宿、单中继的协作组播网络,提出了三种网络编码协议,即非再生网络编码(Non-Regenerative NetworkCoding,NRNC)、复数域再生网络编码(Regenerative Complex FiledNetwork Coding,RCNC)和伽罗华域再生网络编码(Regenerative GaloisFiled Network Coding,RGNC)。

This new curriculum also includes the use of these protocols: IP, Enhanced Interior Gateway Routing Protocol, Serial Line Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2),VLANs, Ethernet, access control lists.

这种新的课程还包括在使用这些协议:知识产权,增强内部网关路由协议,串行线路接口协议帧中继,路由信息协议版本2( RIPv2 ),虚拟局域网,以太网接入控制清单。

But this kind of invasion cannot avoid the detection of IDS using the protocol analysis technology.(2) In the invasion activities of hackers using TCP, the actions about scanning and Denial of Service utilizing the three-handshake protocol are general. The characteristics of the actions are dynamic for its lie on a series of packets from beginning to end. So the IDS using the traditional pattern match technology cannot detect these actions effectively, but the IDS using the protocol analysis technology can do its.

2在利用TCP协议进行的黑客活动中,比较常用的是利用三次握手过程进行扫描行为和拒绝服务攻击,这类攻击的特征必须根据前后的一系列数据包才能确定,因此攻击特征具有动态性,很不适合于采用模式匹配作为信息检测技术的IDS,但协议分析技术可较为迅速地检测出这类攻击。

The formal description technology based on LOTOS, the formal transformation, the formal validation and implemenation are generalized. Constructions of communication service and communication protocol, transformation from service specification into protocol specification based on bisimulation equivalence are also stated in detail. Application of LOTOS specification styles and architecture concept in service and protocol design is studied as an emphasis.

归纳总结了基于LOTOS的形式化描述方法、形式化的转换、验证和实现等方法理论,以及通信服务和协议的构造方法及服务规范到协议规范的等效性转换方法,重点研究了规范风格和结构概念在服务和协议设计中的应用。

We improve the protocol for signing contract based on the research result of secure multiparty computation. In this protocol, the parties obliviously transfer the signed bit and the committed bit; the other parties can prove the validity of this bit based on the confirming sub-protocol, but he can't gain more information about the whole signature by accumulating the more signed bit or the committed bit. After the parties exchange the whole signed information, they declare the commitment about the signature respectively, and gain the whole signature of the other party. At this moment, the party doesn't care about the advance quit of the other party, because he has gained the whole signed information.

在协议执行过程中,参与者将合同的签名位以及他对签名位的承诺不经意传输给对方,对方可以利用验证子协议证明该位的有效性,但是他却不能通过位交换次数的增加获取更多的完整签名的信息;在完成签名位的交换之后,参与者分别公开承诺,并得到对方对合同的完整签名;在公开承诺时,协议参与者已经获得全部的签名内容,要么是签名位,要么是对方对该位的承诺,因此参与者并不需要担心对方提前终止协议,同时本文也利用多方安全计算的结论证明了该协议满足终止公平性。

In the third example, USC ISI's anonymous payment protocol [19] is analyzed to show that the protocol does not provide both the payor and the payee with some accountability assurances discussed in this paper, in agreement with the goals of this protocol.

在第三个例子, USC ISI 的匿名付款协议[ 19 ] 被分析表示,协议不提供payor 和收款人以一些责任保证被谈论在本文里,在与这个协议的目标的协议。

第5/500页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Internet Thugs Attack
My Internet Girl
You've Got Mail Enhancement
Internet Connection
Internet Going Nutz
Protocol
Internet Killed The Video Star
Internet Relationships (Are Not Real Relationships)
Cybersex
Unorthodox
推荐网络例句

But this is impossible, as long as it is engaging in a market economy, there are risks in any operation.

但是,这是不可能的,只要是搞市场经济,是有风险的任何行动。

We're on the same wavelength.

我们是同道中人。

The temperature is usually between 300 and 675 degrees Celsius.

温度通常在摄氏300度到675度之间。