英语人>网络例句>匿名 相关的搜索结果
网络例句

匿名

与 匿名 相关的网络例句 [注:此内容来源于网络,仅供参考]

It is a compile-time error for an expression in an anonymous o bject initializer to be of the null type.

匿名对象初始化器中的表达式是 null 类型是一个编译期错误。

This kind of shameless faceless mail, how do you let me respond to?

这种无耻的匿名邮件,你让我怎么回应?

The network is faceless making is carried out to protect privacy originally.

网络匿名制原本是为保护隐私而推行的。

Ask faceless message personage says, the director of YouTube still improves this system in effort.

要求匿名的消息人士说,YouTube的主管仍在努力改善该系统。

You should be willing, leave a message with real name, not faceless.

你们要愿意,就用实名留言,别匿名了。

Be as long as in the course after the investigation of 3 months, zhao Junxiong of inquisitor of special investigation panel announced on April 17, the 4 people such as Li Jianxi are confirmed to carry a group tall canal is faceless hold, with death duty of avoid high specified number, sue Li Jianxi and personnel of 10 experience case with dodge a tax and false-hearted blame.

在经过长达3个月的调查后,非凡调查小组检察官赵俊雄4月17日公布,李健熙等四人被证实通过集团高管匿名持股,以规避高额遗产税,并以逃税和背信罪起诉李健熙和10名涉案人员。

In according to the self-circulating of money , money is money, it does not point out the material of money. Electronic money shows its value with numeral, and uses the data encryption system to protect itself from falsifier. As long as the numeral of material is decided by users, electronic money will become a real money with anonymity, transferability and relativity.

根据货币自我循环论证,货币就是货币,并未指出货币的素材,电子货币可以数码表示其价值,利用暗码技术可达到防伪功能,只要素材数码由使用者自行决定,电子货币满足构成货币的三要素,成为真正的货币,具匿名性、移转性与相对性。

We provide sender anonymity for public service connection and file sharing. No modification to the underlying p2p networks is needed.

这套系统可以同时在对於外部的公开服务以及内部的档案分享上提供发讯息发者的匿名性,在此同时并不需要对於原来的结构性同侪网路进行修改。

This method combined the traceroute result with the topology information obtained by tomography to construct a final topology using minimum similarity cluster algorithm and merging and constructing anonymous routers algorithm.

该方法可通过提出的最小相似度聚类算法和匿名节点构造归并算法,将网络层析成像获得的拓扑信息与traceroute探测结果融合,构成最终的拓扑结构。

This method combined the traceroute result with the topology information obtained by tomography to construct a final topology using minimum similarity cluster algorithm and merging and constructing anonymous routers algorithm.the simulation on ns2 shows that this method not only be able to infer the network topology which contains uncooperative routers, but also enormously reduce the number of probes.

该方法可通过提出的最小相似度聚类算法和匿名节点构造归并算法,将网络层析成像获得的拓扑信息与traceroute探测结果融合,构成最终的拓扑结构。ns2的仿真表明,该方法不仅可识别包含不协作节点的网络拓扑,且所使用的探测包的数量也大大减少。

第17/51页 首页 < ... 13 14 15 16 17 18 19 20 21 ... > 尾页
推荐网络例句

Do you know, i need you to come back

你知道吗,我需要你回来

Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.

1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。

Chapter Three: Type classification of DE structure in Sino-Tibetan languages.

第三章汉藏语&的&字结构的类型划分。