英语人>网络例句>optimized code 相关的网络例句
optimized code相关的网络例句

查询词典 optimized code

与 optimized code 相关的网络例句 [注:此内容来源于网络,仅供参考]

In the pre-process of embedding, both chaos encryption sequence and repletion code (a kind of simple error-correction code) are used to improve the security of watermark information and robustness of digital watermarking.

在水印嵌入前的预处理中,使用混沌序列加密和重复编码的方法来提高水印信息的安全性和数字水印的鲁棒性。

Is accepted by permissive person after this licence obtains source code, have the obligation of republication source code.

开源CPU的著作权侵权问题一般不会发生在开源CPU之间,而主要发生在开源CPU与专有CPU之间。

Process, and then reroute the execution of code to go through your own written code

程式码接合是一种接合一段组合语言程式码到到目标程式中的技术,然后使整个程式执行时

For example, if a keyboard is interrupted while sending the second byte of a two-byte break code, it will need to retransmit both bytes of that break code, not just the one that was interrupted.

举个例子,如果当发送一个两字节断码的第2个字节时,键盘被中断,它将需要重新发送此断码的两个字节,而不仅仅时被中断掉的那个字节。

Compared with the corresponding article in the 1979 criminal code, the provision of article 88 is a disadvantage for the defendant. This is also because the crimes before the entry into force of the criminal code shall be subject to prosecution under the provisions of Section 8, Chapter IV of the general provisions of this law. Namely, this provision affirms retroaction of limitations of prosecution. If an act committed by a defendant under provision article 88, that has exceeded the period of limitations of the prosecution, it may inflict criminal responsibility.

刑法第88条的规定与1979年刑法的相关条文相比,一定程度上恶化了被告人的利益,同时,由于刑法第12条对新刑法生效以前实施的犯罪行为"依照本法总则第四章第八节的规定"判断是否应当追诉,肯定了第四章第八节追诉时效的溯及力,如果被告人的行为符合第88条的规定,即使依照旧刑法,已经超过追诉时效的,也可以追究刑事责任。

Joseph Rochefort had worked for several months to read the secret Japanese Naval code called J-N-Twenty-Five. If he could read enough of the code, Mister Rochefort would be able to provide Admiral Nimitz with very valuable information. Admiral Nimitz could use this information to make the necessary decisions to plan for battle.

约瑟夫。罗切福特研究日本海军密码"J-N-Twenty-Five"长达数月,如果他能够读懂这些密码,他就能够给尼米兹上将提供有价值的信息,尼米兹上将将采用这些信息为即将开始的战斗做出必要的决策。

You don't have a choice: as a professional developer, you can't write code based on unsafe buffer manipulation functions. And this is the reason why all the code in this book relies on these safer functions from the C run-time library.

你别无选择:作为一个专业开发人员,你不可能编写基于不安全缓冲区操作的代码,同时这也是为什么本书中所有的代码都是使用来自于C运行库中的安全函数的原因。

PE code, research PE file encryption and shell sabot code examples.

PE 相关代码,研究PE文件加密及加壳脱壳的事例代码。

High byte is scan code, low byte is ASCII code.

高字节是扫描码,低字节是 ASCII 码。

The high byte is the scan code and the low byte is ASCII code.

高字节是扫描码,低字节是 ASCII 码。

第51/500页 首页 < ... 47 48 49 50 51 52 53 54 55 ... > 尾页
相关中文对照歌词
Episodes
I Solemnly Swear
Area Code 229
Code 4 Love
Rebel Code
Crack The Code
Code Of Silence
Love Is Pain
Code Red
Bro Code (The Motto Freestyle)
推荐网络例句

However it can often be frust ating for a child when people are unable to pronounce their name.

但它往往可以令人沮丧的一个孩子当人们无法断言他们的名字。

All these compounds were obtained from this genus for the first time. Compound, 4-cumylphenol, was a new nature product.

所有化合物均为首次从本属海藻中分离得到,其中4cumylphenol为新天然产物。

But this is unbelievable .too much.

但是这太令人难以置信。