英语人>网络例句>store access time 相关的网络例句
store access time相关的网络例句

查询词典 store access time

与 store access time 相关的网络例句 [注:此内容来源于网络,仅供参考]

Attribute based access control model for Web Services is systemic researched, and an architecture of access control for Web Services is designed, which combines the architecture of access control of ABAC and the typical application architecture of Web Services.

系统研究了面向Web Services的基于属性的访问控制模型ABAC,并结合ABAC访问控制架构和Web Services典型应用架构设计了Web Services访问控制体系结构。

Researchers have paid more attention on discretional access control,role-based access control and view based technology,rather than mandatory access control.

目前关于XML安全性的研究主要集中于自主访问控制、基于角色的访问控制和视图技术,而对于强制访问控制很少有研究。

Discretionary Access Control policy is an access control based on ownership relations between subject and object. The subject can discretionarily decide that who, by which means, can access his owned objects.

自主访问控制政策是基于客体—主体的所属关系的访问控制,主体可自主地决定其他的哪些主体可以以何种方式来访问他拥有的客体。

Among n web pages, access probability increment will decrease from the first web page to nth web page. Web pages above n will be accessed less frequently then ever. We analysed a Web server log and two proxy server logs. Analysis mainly focus on Web page request distribution, Web static document size distribution, Web static document access distance distribution, Web static doment access intertime distribution.

对一个典型的Web服务器和两个代理服务器的日志进行了分析,并将Web页面请求分布、Web静态文档大小的分布、Web静态文档的访问距离的分布、Web静态文档访问间隔时间分布同既有文献的结果进行了对比,有些结论是相同的,有些不同,可以视为我国WWW访问所特有的访问特性。

NET Framework class library. It is the backbone of partially trusted code and is not restricted to file access, but rather affects everything from network access to windowing and more. When you use it in your own component code, users will be able to execute code regardless of origin, and their systems will remain safe. This allows you to write code that is featureful, executes in native machine language, and is distributed across a LBN or even over the Internet. You can take advantage of this feature with only a minimal exposure to the underlying mechanics of code access security.

NET框架类库来施用他是半信托代码的根蒂根基而且不受限于文件拜候,可是对路程经过过程收集拜候窗户或其它的不论什么情况都有至关的影响当您在您本身的组件代码中施用它时,用户可以在不消留心来历的情况下执行代码(好比从1个英特网网站),她们的体系仿照还是是安全的这似的您可以开具富有特征的、路程经过过程本机执行的而且漫衍拜候局域网甚至是英特网的代码您可以哄骗这些特征在代码拜候安全的根蒂根基下最小限度的袒露您的信息

We can see that these come to the same thing, since if our access (to an external object, for example) is direct in sense (1), then there is nothing (at the intentional and personal level) to which we have access and in virtue of which we have access to the object.

我们能够明白这些获得的结果时一样的,因为如果我们在1意义上是直接可达的,那么在意向和人格水平,我们可以说,没有东西会是我们拥有的可达物且借助它能够可达对象。

In order to satisfy the requirement of various space mission simulations and analysis, a standard interface and common service for access to the system resources, that is, resource access protocol, is designed, thus the independencies of resource storage manner and resource representation are realized. The design of resource access protocol introduced the object-oriented hierarchical method.

结合航天任务的仿真和分析对资源管理的要求,总结出资源管理系统应具备的功能和特点;从对分布式仿真资源进行高效管理和使用的角度着手,提出了基于代理的系统构建方式;进而设计了资源管理系统的体系结构,并分别探讨了体系结构的四个层次:基础资源层、通用操作环境、仿真应用接口层和管理控制层。

Brewster Kahle launched the Internet Archive in 1996. From the start it provided Open Access to its mirror of the historical Internet as well as to many special collections.The Internet Archive sponsors the Open Access Text Archive, Ourmedia (http://ourmedia.org/), and the new Open Education Resources project, and cosponsors the Open Access Million Book Project with Carnegie Mellon University.

2.1996年布鲁斯特·卡利建立了互联网档案,从此它提供了开放近用的历史档案如许多典藏,互联网档案主办机构赞助开放近用典藏,Ourmedia( http://ourmedia.org/),和新的开放教育资源项目,并且与卡内基梅隆大学共同赞助对一百万本书采开放近用计画。

To overcome the shortcoming of the double-way authentication access control scheme based on Harns digital signature, a new double-way authentication protocol is proposed to improve the old one. A new single-key-lock-pair access control scheme is proposed as a improved access control scheme, based on the property that a integer can be denoted into only one binary digital.

针对基于Harn数字签名双向认证访问控制实现方案中所存在的问题,运用密码技术改进了原方案的双向认证协议,并作为对原访问控制方案的改进,基于整数二进制表示的唯一性,提出了一种新的单钥-锁对访问控制方案。

MAX1999EEI Pinout: 8- to 32-bit and 16- to 32-bit word packing options Programmable wait state options: 2 to 31 CCLK Digital audio interface includes six serial ports, two pre- cision clock generators, an input data port, three programmable timers and a signal routing unit Serial ports provide: Six dual data line serial ports that operate at up to 50 Mbits/s for a 200 MHz core on each data line each has a clock, frame sync, and two data lines that can be configured as either a receiver or transmitter pair Left-justified sample pair and I2S support, programmable direction for up to 24 simultaneous receive or transmit channels using two I2S compatible stereo devices per serial port TDM support for telecommunications interfaces including 128 TDM channel support for telephony interfaces such as H.100/H.110 Up to 12 TDM stream support, each with 128 channels per frame Companding selection on a per channel basis in TDM mode Input data port provides an additional input path to the DSP core configurable as either eight channels of I2S or serial data or as seven channels plus a single 20-bit wide syn- chronous parallel data acquisition port Supports receive audio channel data in I2S, left-justified sample pair, or right-justified mode Signal routing unit provides configurable and flexible connections between all DAI components, six serial ports, an input data port, two precision clock generators, three timers, 10 interrupts, six flag inputs, six flag outputs, and 20 SRU I/O pins Serial peripheral interface Master or slave serial boot through SPI Full-duplex operation Master-slave mode multimaster support Open drain outputs Programmable baud rates, clock polarities, and phases 3 Muxed Flag/IRQ lines 1 Muxed Flag/Timer expired line ROM based security features: JTAG access to memory permitted with a 64-bit key Protected memory regions that can be assigned to limit access under program control to sensitive code PLL has a wide variety of software and hardware multi- plier/divider ratios JTAG background telemetry for enhanced emulation features IEEE 1149.1 JTAG standard test access port and on-chip emulation Dual voltage: 3.3 V I/O, 1.2 V core Available in 136-ball BGA and 144-lead LQFP packages Lead free packages are also available

MAX1999EEI引脚说明: 8 - 32位和16 - 32位字包装选择可编程等待状态的选择:2至31个CCLK数字音频接口包括6个串行端口,两个前643时钟发生器,输入数据端口, 3可编程定时器和一个信号路由单元串行端口提供:六双串口数据线,在高达50 Mbps的操作/为200兆赫的每个数据行每个人都有一个时钟,帧同步的核心秒,和两个数据可以作为任何一个接收器或发射器对左对齐和I2S配对样本的支持下,最多可同时接收或传送24个频道,每使用两个系列的I2S兼容立体声设备配置可编程方向线;港口的TDM通信接口,包括支持128个电话接口的TDM的渠道,如H.100/H.110支持多达12个的TDM流的支持下,每帧128个频道每个压缩扩展每通道的基础上选择在TDM模式输入数据端口提供了一个额外的输入路径的DSP核心配置为I2S或串行数据或7加一个20位宽的SYN -异步的并行数据采集接口通道或8通道;支持接收通道I2S音频数据,左对齐样本对,或右对齐模式信号路由单元组件之间提供所有戴配置和灵活的连接,6个串行端口,一个输入数据端口,两个精密时钟发生器,3个定时器,10个中断,六旗投入,产出6个旗,20曼谷南南区域股的I / O管脚串行外设接口的硕士或奴隶通过SPI串行启动全双工运作主从模式多主机支持开漏输出可编程波特率,时钟极性和第三期合并调制旗/ IRQ线路1合并调制旗/定时器过期线光盘的防伪特征:JTAG的访问与64位受保护的关键允许内存内存可分配给程序访问控制的限制下对敏感地区有一个代码锁相环/遥测分比率为背景的JTAG仿真功能增强的IEEE 1149.1 JTAG标准测试访问端口的软件和硬件多钳各种各样和片上仿真双电压:3.3六/输出,可在1.2 V核心136球BGA封装和144引脚LQFP封装无铅封装,也可

第6/500页 首页 < ... 2 3 4 5 6 7 8 9 10 ... > 尾页
相关中文对照歌词
Party At The Liquor Store
Store Run
Booty Store
Access Me
Big Sunglasses
Access Babylon
I Download
Corner Store
Birthday
Candy Shop
推荐网络例句

Listen,point and check your answers.

听,指出并且检查你的答案。

Warming needle is one of effective treatment methods for knee arthralgia aggravated by cold,and it is simple,safety,so it should be developed in clinical acupuncture and moxibustion extensively.

但以本院科针灸门诊在2005年1月—2006年6月期间共收治膝痛患者100余例,经过临床的诊断后,其中施以温针治疗的48例,疗效显著,报道如下。1临床资料本组病例48

Some known methods of remnant pump detection and automatic laser shut-down use communications, such as an OSC.

一些已知的残余泵浦检测和自动激光关断的方法利用诸如OSC的通信。