英语人>网络例句>日志 相关的搜索结果
网络例句

日志

与 日志 相关的网络例句 [注:此内容来源于网络,仅供参考]

If you're done working on the post for now, you can either click "Publish Post" to convert the draft into a post, or click "Return to list of posts" if you want to leave it as a draft and go back to the Edit Posts page.

当您写完日志了后,你可以通过点击"发布"按钮来发布您的日志;如果您希望以草稿形式保存您的这篇日志,那麼你可以点击"返回到日志列表"回到编辑日志页。

Based on User Session File, which is the result of the preprocessing phase of Web Log Mining, this paper presents a Web Log Mining method for the recognition of user's browse patterns under the Extended Oriented-Tree model. Further more, the method is implemented basically in our lab and tested using real web log data.

本文从Web日志挖掘过程预处理阶段的结果用户会话文件开始,提出了一种基于扩展有向树模型进行用户浏览模式识别的Web日志挖掘方法,并在实验室对该方法进行了简单实现和实际日志数据的测试。

Accordingly, an optimistic data consistency maintenance method based on key-attributes is proposed. In the method, the update of key-attributes is separated from user update requests. Key-Updates are propagated by latency-overlay update propagation model, that is, updates are always propagated to the nodes having maximum or minimum latency, and assured and uncertain propagation paths of updates are all taken into account. Based on classifying key-update conflicts, a double-level reconciling mechanism including buffer preprocessing and update-log processing is applied to detect and reconcile conflicts, and then conflicts are solved by policies as last-writer-win and divide-and-rule. Lastly, update-log management method and maintenance method brought by node failure and network partitioning are discussed for the above is deployed based on the information storied in update-log.

在该方法中,首先分离出用户提交的更新请求中关于关键属性的更新;然后采用基于延迟-覆盖的更新传播模型进行更新传播,即基于副本间的网络延迟选择具有最大和最小网络延迟的结点转发更新,并在传播过程中记录和综合考虑更新的确定传播和不确定传播两条路径;在对关键更新冲突分类的基础上,采用更新缓冲区和更新日志两层更新协商机制并结合最新写胜出和分而治之规则,优化关键更新冲突的发现和解决;更新日志信息是方法中各种策略开展的基础,讨论了更新日志中信息管理方法以及结点失效和网络划分发生时信息的维护方法。

It can also reduce the scope of log records to be analyzed and help to detect anormal log records. Time-line sequence is an important character of log records. Most secure events consist of multi-stages. They will be loged in different network devices or in different system logs. These records have a partial sequence in time and same values in some fileds.

时间上的顺序性是日志记录的重要特征,大多数黑客入侵行为都不是独立的,而是由多个阶段组成的,这在日志系统中的表现就是对于一次入侵行为会在不同的网络设备或不同的系统日志中进行记录,这些记录在时间上存在一个偏序关系,在某些属性域存在相同的值。

My English level will be leastwise four class.of course,It is the most best for six class.hehe!So breast log must write,and that must interpret using English.The means is very good not only for exercising English compose,but also being use to writing log every day.But,I worry about no mass and feeling for my log!*_*struggle,put on steam!

所以每天的心情日志更是要写了,而且都要用英文自己翻译一遍,这样刚好可以用来练习英文写作,而且也可以让自已养成每天写日志的好习惯呀,只是有点担心这样的日志会没有质量和感觉了!

Writing unvalidated user input to log files can allow an attacker to forge log entries or inject malicious content into the logs..

将一个没有过经过验证的用户输入写入日志文件中将允许攻击者伪造日志输入或者将恶意的内容注入到日志中。

So its important for network managers to develop system to monitor network traffic, attacks and resources. It will help network managers to manage network more effectively.The article analyzes two normal approaches to realize network monitor, one is based on packets captured and another is based on logs generated by network gateway. Then, it introduces the three common kinds of log format, syslog, traffic log and WELF.

本文首先分析了网络监视系统实现的常用技术,基于包捕获的技术和基于网关设备日志分析的技术,接着详细分析了三种通用的网络设备日志——Syslog格式日志、Traffic Log格式日志与WELF格式日志,在此基础上详细介绍了本文的重点,基于网关日志分析的网络监视系统一LNMS (Log-based Network Monitor System)的设计和实现。

Center of a log changes a design to collect a project, front has 230 server, use Syslogd amasses a daily record, protect disk of existence this locality while send a log center server to Syslog-ng additionally, central server issues the daily record to two destination at the same time: Memory of this locality disk and a FIFO.

一个日志中心化设计收集项目,前端有230台的服务器,使用syslogd收集日志,保存在本地磁盘的同时另外发一份到syslog-ng的日志中心服务器上,中心服务器同时把日志分发到两个目的地:本地磁盘存储和一个FIFO。

This invention provides a method which can automatically stop using the current log file based on users' settings and can produce the new server log file and write log record in new server log file on the server.

本发明提供了一种可以依据用户设置条件自动停止使用当前日志文件,在服务端产生新日志文件并在新日志文件中写入日志记录的方法。

The specific modus operandi is after the client receive the log records that system produce, it will upgrade condition to check whether log records has met the updated conditions according to configuration server user name and log file; if original log files meet the conditions, they will erect new log files; when current log records read in new log files, they stop using the original log files.

具体做法是客户端设备收到系统内部产生的日志记录后,根据配置的服务器端用户名以及日志文件更新条件检测日志文件是否已经满足更新条件;如果原日志文件满足更新条件,则建立新的日志文件;将当前日志记录写入新日志文件中,停止使用原日志文件。

第1/77页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.

在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。

In fact,I've got him on the satellite mobile right now.

实际上 我们已接通卫星可视电话了

The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.

世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。