英语人>网络例句>time-sharing 相关的网络例句
time-sharing相关的网络例句

查询词典 time-sharing

与 time-sharing 相关的网络例句 [注:此内容来源于网络,仅供参考]

While library resource sharing is shifting to the new networking environment era, it is also in face of a lot of new challenges and"Access versus Assets"is becoming the new theme of the resource sharing in this new networking era, based on this point this thesis studies the development and the transformation of the resource sharing both in practice and in theory in the networking environment, particularly focus on a serial of issues, including the construction of resource sharing system, digital information resource, digital library, interlibrary loan, document delivery service and collection development etc. The writer also analyzes the coexsitence of the traditional resource sharing and modernizational resource sharing and the relationship between them in 21st, explores the revolutionary changes of resource sharing as the"Assets"model is driving to the"Access"model, discusses the development of specific collection for a single library and how to construct a seamless integrated information resource system in the networking environment, systematically studies and introduces the new organization model of resource sharing, especially emphases that document delivery is the key of the success in resource sharing, and finally tries to outline the main trends which will influence resource sharing.

本文立足于网络环境下资源共享的新主题:存取与拥有,研究和分析了网络环境下资源共享及其体系建设,包括电子信息资源、数字图书馆建设、馆际互借、文献传递服务、文献资源建设等几方面在理论和实践中的发展和变革;论述了21世纪初网络环境下传统型和现代型两种层次并存的资源共享;探讨了文献资源建设从"拥有"模式到"存取"模式的重大转变、特色馆藏建设和无缝一体的网络信息资源体系的建设途径;较为全面、系统地研究和介绍了网络环境下资源共享的新型组织模式的形成及其特点;强调了文献传递是实现资源共享的关键;并试图准确把握网络环境下资源共享研究和实践的发展趋势。

Then, considering the knowledge represented by a set of frequent patterns, we investigate the problems of preserving sensitive patterns in data sharing, hiding sensitive patterns in frequent pattern sharing, and also blocking inference channels in frequent pattern sharing. The main contributions are as follows:(1) For the problem of preserving anonymity in data sharing, we propose a clustering-based approach for implementing l-diversity.

本文首先研究了数据共享中匿名保护问题,接着以频繁模式为知识的表现形式,研究了数据共享中的敏感模式保护,频繁模式共享中的敏感模式隐藏,以及频繁模式共享中的推理控制等问题,主要的研究成果如下:(1)针对数据共享中的匿名保护问题,提出了一种基于聚类的l-多样化实现方法。

During the research of bettering enterprise's technology innovation ability based on endogenetic and ectogenic knowledge sharing, the paper establishes the strategy of looking for the mainbody of outside sourse knowledge sharing. According to the knowledge distance theory, it analyses the obstacle and weekness of ectogenic knowledge sharing, discusses three modes that bettering enterprise technology innovation ability based on ectogenic knowledge sharing. The three modes are indraught, incorporation and cooperation.

2在研究基于外生型知识共享的企业技术创新能力提升路径中,论文根据知识距离理论确立了寻找外源知识共享主体的策略,分析了外生型知识共享的障碍和弊端,讨论了基于引进、购并与合作三种基于外生型知识共享的提升企业技术创新能力模式,并在分析各模式优缺点和应用局限性的基础上,提出了适应于企业不同的发展阶段的综合模式。

During the research of bettering enterprises technology innovation ability based on endogenetic and ectogenic knowledge sharing, the paper establishes the strategy of looking for the mainbody of outside sourse knowledge sharing. According to the knowledge distance theory, it analyses the obstacle and weekness of ectogenic knowledge sharing, discusses three modes that bettering enterprise technology innovation ability based on ectogenic knowledge sharing. The three modes are indraught, incorporation and cooperation.

2在研究基于外生型知识共享的企业技术创新能力提升路径中,论文根据知识距离理论确立了寻找外源知识共享主体的策略,分析了外生型知识共享的障碍和弊端,讨论了基于引进、购并与合作三种基于外生型知识共享的提升企业技术创新能力模式,并在分析各模式优缺点和应用局限性的基础上,提出了适应于企业不同的发展阶段的综合模式。

Firstly, there are less secure and efficient threshold schemes; secondly, the research on multi-secret sharing is rather weak; thirdly, usual verifiable secret sharing don't consider the partners' anonymity, while it is just people's expectation. Last but not least, the problem of variety on shares is becoming a more obvious restrict of efficiency, especially in the facets of the lost and being districted of shares. On the application of verifiable secret sharing, there are also two inadequates : on the one hand , verifiable secret sharing has been used in much threshold cryptography but in less verifiable signatures.

然而,经过认真总结、分析该领域目前研究的发展状况(具体结果将在第一章给出),我们发现在可验证秘密分享的研究方面,仍有下列四个不足之处:一是现有的安全、高效的门限方案不多;二是对多秘密分享的研究非常薄弱,在已有的文献中还见不到安全、实用的可验证多秘密分享方案;三是通常的秘密分享方案没有考虑秘密分享者的匿名性,而这恰恰是人们所希望的;四是秘密分享者的动态管理问题已经越来越明显的制约现有方案的安全,尤其是密钥份额丢失或被破坏时如何恢复更是没有被深入探讨。

Daddy sits on a' front porch swinging Looking out on a vacant field Used to be filled with burley tobacca Now he knows it never will My Brothers found work in Indiana My Sisters a nurse at the old folks home Mama still cooking too much for supper And me I've been a long time gone Been a long time gone No, I ain't hoed a row since I don't know when Long time gone And it ain't coming back again Deliah plays that old church piano Sitting out on her daddy's farm She always thought that we'd be together Lord I never meant to do her harm Said she could hear me singin' in the choir Me, I heard another song I caught wind and hit the road runnin' And Lord, I've been a long time gone Been a long time gone Lord, I ain't had a prayer since I don't know when Long time gone And it ain't comin' back again Now me, I went to Nashville, Tryin' to beat the big deal Playin' down on Broadway Gettin' there the hard way Living from a tip jar Sleeping in my car Hocking my guitar Yeah I'm gonna be a star Now, me and Deliah singing every Sunday Watching the children and the garden grow We listen to the radio to hear what's cookin' But the music ain't got no soul Now they sound tired but they don't sound Haggard They've got money but they don't have Cash They got Junior but they don't have Hank I think, I think, I think The rest is a long time gone No, I ain't hit the roof since I don't know when Long time gone And it ain't coming back I said a long time gone No, I ain't honked the horn since I don't know when Long time gone And it ain't coming back again I said a long time, long time, long time gone Well it's been a long time Long time, long time, long time gone Oh, it's been a long time gone Long time, long time, long time gone Yeah yeah

爸爸坐在一个'前沿阳台摆动寻找出一个空置场用来填补与白肋烟tobacca 现在他知道这种情况永远不会改变我的兄弟们找到了工作,在印第安纳州我的姐妹的一名护士,老人们在家中妈妈还是烹调太多晚饭我和我已经很长时间了已经很久了不,我不是牺牲品一排,因为我不知道什么时候很长时间了这是不会回来再 deliah发挥老教堂钢琴坐月子,她爸爸的农场她一直以为我们会被一起主我从来没有意思做她的伤害说,她能听到我的声乐发声',在合唱团我,我听到另一首歌 i被风撞上路跑'和主,我已经很长时间了已经很久了上帝,我是不是有一个祈祷,因为我不知道什么时候很长时间了这不是comin '一拖现在我,我去纳什维尔 tryin '拍打大不了? playin '了百老汇发财'有硬办法生活,从群众举报瓦罐睡在我的车 hocking我的吉他嗯,我在哪里也成为明星现在,我和deliah歌唱每星期日看着孩子们和花园成长我们听收音机听到什么的乱打'但音乐是没有,没有灵魂现在,他们健全累,但他们并没有健全的憔悴他们已经获得的金钱,但他们并没有现金他们获得初级,但他们并没有汉克我觉得,我觉得,我觉得其余的是一个长的时间去不,我是打不到屋顶,因为我不知道什么时候很长时间了这是不会回来我说很长时间了不,我不是兄弟非洲之角以来,我不知道什么时候很长时间了这是不会回来再我说了很久,很久,很久了以及它的已经很久了长的时间很长的时间,很长的时间,经历了哦,这是一个漫长的时间去长的时间很长的时间,很长的时间,经历了嗯嗯

The most important thing in romantic relationship is sharing, sharing the time together and sharing the life experience together.

因为在恋爱的过程里最重要的不就是互相分享,分享在一起的时间,分享在一起的生活。

We also analyze the thrashing phenomenon due to false sharing in various array access patterns and coexisting phenomenon of thrashings due to true or false sharing of data, introduce a concept of access intervals for parallel loops, propose a method called blocking and staggering to eliminate the false sharing thrashing at compile-time.

我们又分析了多级存储并行处理系统中各种访问模式下的假共享cache行抖动现象和真假共享抖动并存现象,引入了并行循环访问距概念,提出了消除假共享抖动的编译方法——块化错位方法。

In principle, the maximum sharing limit for the petty sharing system shall be calculated by the month, that is, the total amount that is taken according to needs each month must not go beyond the maximum limit; the maximumsharing limit of the large sharing system shall be calculated every half year, that is, the total amount that is taken according to needs every half year should not go beyond the maximum limit.

原则上要求,小额共享制按月计算最高共享限额,即每月按需取用的总额累计不能超过最高限额;大额共享制按半年计算最高共享限额,即每半年按需取用的总额累计不能超过最高限额。

Then, considering the knowledge represented by a set of frequent patterns, we investigate the problems of preserving sensitive patterns in data sharing, hiding sensitive patterns in frequent pattern sharing, and also blocking inference channels in frequent pattern sharing.

本文首先研究了数据共享中匿名保护问题,接着以频繁模式为知识的表现形式,研究了数据共享中的敏感模式保护,频繁模式共享中的敏感模式隐藏,以及频繁模式共享中的推理控制等问题,主要的研究成果如下:(1)针对数据共享中的匿名保护问题,提出了一种基于聚类的l-多样化实现方法。

第1/500页 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Sharing Christmas
Decisions
Sharing The Night Together
Love Is
I Love You
Time
Something 'Bout Heaven
Lay All Your Love On Me
There's Nothing Better Than
Caught In A Dream
推荐网络例句

Salt is good, but if the salt becomes flat and tasteless, with what do you season it?

14:33 盐本是好的,盐若失了味,可用什么叫它再咸呢?

He reiterated that the PLA is an army of the people under the leadership of the Communist Party of China.

他重申,人民解放军是在中国共产党领导下的人民军队。

After five years at the Laue-Langevin Institute in Grenoble, France, Jolie turned his focus to experimental work when, in 1992, he accepted a position at the University of Fribourg in Switzerland.

他在法国格赫诺柏的劳厄–蓝吉分研究所工作了五年之后,1992年转往瑞士夫里堡大学从事实验研究。