英语人>网络例句>operand 相关的网络例句
operand相关的网络例句

查询词典 operand

与 operand 相关的网络例句 [注:此内容来源于网络,仅供参考]

Accordingly, the operand of * is a copy of the unincremented value of iter.

因此,解引用操作*的操作数是 iter 未加 1 前的副本。

The operand of *, therefore, is the result of applying the increment operator to iter.

而操作符*的操作数是 iter 做了自增操作后的结果。

The monadic Boolean operation the result of which has the Boolean value opposite to that of the operand.

一种一元布尔运算,其运算结果的布尔值与操作数的值相反。同NOT operation。

If the left operand isn't an unary parser, no refactoring will take place.

如果左边的算子不是一元分析器,则重构不会发生。

Along with the password attack method unceasing renewal, the computation ability unceasing enhancement as well as to the operating speed request, the tradition disperses row algorithm MD5, SHA has demonstrated their shortcoming and the insufficiency day by day, and thestructure of hash function is mostly based on block cipher algorithm DES, but the HASH function security is established above the grouping function security, because the DES operand is very big, the operating speed very slowly by and its itself some characteristics, therefore disperses a row function based on the DES algorithm to have potential unsecurity.

随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。

Along with the password attack method unceasing renewal,the computation ability unceasing enhancement as well as to theoperating speed request, the tradition disperses row algorithm MD5,SHA has demonstrated their shortcoming and the insufficiency day byday, and thestructure of hash function is mostly based on block cipheralgorithm DES, but the HASH function security is established above the grouping function security,because the DES operand is very big, the operating speed veryslowly by and its itself some characteristics, thereforedisperses a row function based on the DES algorithm to havepotential unsecurity.

摘要随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。

When using literals in static regexes, you must take care that at least one operand is not a literal.

在静态regexes中使用文字常量时,你必须要小心,至少要有一个操作数不是文字常量。

On second pass, the code for the statements p = 0 and p = 1 has been generated (that is, the size of the emitted opcodes is now known), so the jump opcode at 0x411A16 can be patched with a displacement (more correctly, the immediate value of the operand can now be written).

在第二步中,对p = 0和p = 1已生成的报表的代码(即发射操作码的大小是目前已知),所以在0x411A16跳码可以与位移补丁(更准确,在现在可以直接写入操作数的值)。

Also, we discuss the relation between opcode and operand, the effect of max compress length and combine relation.

操作码和运算元字典的建造先后顺序和空间压力,最长序列的限制也是我们讨论的重点。

Having decremented the existing value in the left-hand operand, we then copy the pointer from rhs into this object.

将左操作数中的当前值减 1之后,再将指针从 rhs 复制到这个对象。

第8/9页 首页 < 1 2 3 4 5 6 7 8 9 > 尾页
推荐网络例句

You have to walk your own alk in this life.

次生中你必须走自己的路。

To start with, the thesis analyses ***ism in terms of the generic masculine words, word order and semantic derogation of women in greater detail.

论文首先从阳性词泛指,词序,词义的贬降等方面对英语中的性别歧视现象进行了详细的分析。

What about you?You''re an incomplete being as well.

你自己还不也是一个不完全的生物。