英语人>网络例句>operand 相关的网络例句
operand相关的网络例句

查询词典 operand

与 operand 相关的网络例句 [注:此内容来源于网络,仅供参考]

Accordingly, the operand of * is a copy of the unincremented value of iter.

因此,解引用操作*的操作数是 iter 未加 1 前的副本。

The operand of *, therefore, is the result of applying the increment operator to iter.

而操作符*的操作数是 iter 做了自增操作后的结果。

The monadic Boolean operation the result of which has the Boolean value opposite to that of the operand.

一种一元布尔运算,其运算结果的布尔值与操作数的值相反。同NOT operation。

If the left operand isn't an unary parser, no refactoring will take place.

如果左边的算子不是一元分析器,则重构不会发生。

Along with the password attack method unceasing renewal, the computation ability unceasing enhancement as well as to the operating speed request, the tradition disperses row algorithm MD5, SHA has demonstrated their shortcoming and the insufficiency day by day, and thestructure of hash function is mostly based on block cipher algorithm DES, but the HASH function security is established above the grouping function security, because the DES operand is very big, the operating speed very slowly by and its itself some characteristics, therefore disperses a row function based on the DES algorithm to have potential unsecurity.

随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。

Along with the password attack method unceasing renewal,the computation ability unceasing enhancement as well as to theoperating speed request, the tradition disperses row algorithm MD5,SHA has demonstrated their shortcoming and the insufficiency day byday, and thestructure of hash function is mostly based on block cipheralgorithm DES, but the HASH function security is established above the grouping function security,because the DES operand is very big, the operating speed veryslowly by and its itself some characteristics, thereforedisperses a row function based on the DES algorithm to havepotential unsecurity.

摘要随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。

When using literals in static regexes, you must take care that at least one operand is not a literal.

在静态regexes中使用文字常量时,你必须要小心,至少要有一个操作数不是文字常量。

On second pass, the code for the statements p = 0 and p = 1 has been generated (that is, the size of the emitted opcodes is now known), so the jump opcode at 0x411A16 can be patched with a displacement (more correctly, the immediate value of the operand can now be written).

在第二步中,对p = 0和p = 1已生成的报表的代码(即发射操作码的大小是目前已知),所以在0x411A16跳码可以与位移补丁(更准确,在现在可以直接写入操作数的值)。

Also, we discuss the relation between opcode and operand, the effect of max compress length and combine relation.

操作码和运算元字典的建造先后顺序和空间压力,最长序列的限制也是我们讨论的重点。

Having decremented the existing value in the left-hand operand, we then copy the pointer from rhs into this object.

将左操作数中的当前值减 1之后,再将指针从 rhs 复制到这个对象。

第8/9页 首页 < 1 2 3 4 5 6 7 8 9 > 尾页
推荐网络例句

Shop assistant: Please check at the door.

店员:请您到门口柜台交费。

In the end, transportation of PAHs in the environmental matrix was preliminarily investigated and discussed according to PAHs data of soils and sediments from a certain region in Shanghai. The result indicated that there are two or more pathways on PAHs transportation in the environmental matrix.

最后,对上海特定地区内PAHs在环境介质中的迁移径途进行了分析讨论,结果表明上海市土壤和沉积物等环境介质中PAHs的迁移存在多种途径。

Quick stop! AIDS doctors while the side and say hello and colleagues mention a blood sample box, the Red Cross had sent blankets and so on, with patients有说有笑to go home.

快停车!防艾医生们一边招呼一边和和同事们提着血液采样箱,抱着红十字会送来的被子等,有说有笑地同患者往家走。