查找
- 与 查找 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
As a last resort, you can search for the corrupted objects and attempt to replace them by hand.
作为最后的办法,你可以查找损坏的对象并尝试用手工的方式来修复他们。
-
Here's a way to find and replace a string of text in one or more files automatically.
这里有一个方法来查找和替换字符串中的一个或多个文本文件自动。
-
This paper first gives an introduction to the AVL tree.Then the paper analyses the definition,properties and main operations of red-black trees.At last, this paper implements the operations of red-black trees in C,and compares the search time of binary search trees and red-black trees.
本文首先介绍了AVL树的定义及其主要操作,然后重点分析了红黑树的定义,特性和它的主要操作,并用C语言实现了红黑树的操作,对二叉查找树和红黑树的查找时间进行了实验对比。
-
Structured system employs a scalable scheme to guarantee search success, but it needs to maintain strictly controlled overly network, it is difficult to adapt to highly dynamic network environment of P2P. In addition, the use of DHTs leads to the fact that only keyword exact-match is available.
结构化系统使用可扩展的方法能保证查找的成功,但由于要维持严格控制的叠加拓扑,因此对P2P网络中大量节点的动态变化适应性较差,且由于分布式哈希表的使用使其只支持精确查找。
-
PBiz is based on the super-proximity routing algorithm proposed in this dissertation, and it also extends the P2P routing algorithm to support exact-match lookup and fuzzy search. Using XML technology, PBiz provides the user with effective navigating service, which enhances the advantage of eCommerce.
与此同时,PBiz并扩展了现有的结构化对等网络路由算法,扩展后的路由算法能同时支持精确查找与模糊查找,同时,结合XML技术,提供给用户实时有效的信息导航服务,进一步提高了电子商务的优势。
-
Because DHT methods just provide exact-match query facility, not satisfying the flexible query requirements, the paper also discusses a scalable, flexible multi-keyword resource located technology. The paper proposes the filtering conjunctive operation scheme similar with distributed database. It also includes an incremental search over the peers to decrease the query latency and bandwidth consumed. Lastly we investigate the popularity of user search behaviors and provide the cache strategy to reduce the overhead associated with operations spread across the wide area to provide the efficient resource query and access in scalable P2P system.
由于分布式哈希路由算法只能提供精确的资源定位,不能满足人们灵活的查找需求,因此本论文也讨论了一种便于扩展,灵活的多关键字资源搜索与信息服务技术,提出类似分布式数据库的过滤器连接算法,并采用增量式查找算法减少查询延迟及带宽消耗,利用缓存策略加速查询,以期为大规模的P2P网络提供高性能的资源搜索与数据访问服务。
-
The enhanced configuration device then reconfigures the Stratix device with this new data, and you have an updated system.The original data that was shipped with the system is still safely stored in the factory application space. So in case there was an error during the update process, perhaps during the remote transmission of the configuration file, the Stratix device can signal用信号通知 the enhanced configuration device
单个ALM的输入能够灵活地分割到两个输出功能块中,使得宽输入的功能函数能更快地运行,因为这可以在一个ALM中完成,不像传统的4输入查找表架构,实现多于4个输入的功能函数时,需要至少两个查找表,因此还需要额外的布线资源(见书P43图1.49);而窄输入的功能函数能有效利用现有的资源,因为ALM能够灵活配置成不同的结构,来适应不同的输入数目。
-
The invention relates to a node marking method in a wireless Mesh network, including that a first node transmits connection request information; a second node returns to connection response information or selects an undistributed correlation sign to mark the connection relation and return to one connection response information; the first node judges whether the correlation sign is conflicted with a distributed correlation sign or not, if yes, then retransmitting is carried out; the first node or the second node transmits information to a correspondent node; the correspondent node searches a corresponding transmitting node from a local record according to the analyzed MAC address and searches a Mesh node mark; by judging according to the mark, if no bit position is corresponding to the Mesh node mark or the corresponding bit position is set as 'no', which means that no data is transmitted to the correspondent node; otherwise, data is transmitted to the correspondent node.
本发明涉及无线Mesh网络中的节点标识方法,包括第一节点发送连接请求消息;第二节点返回连接响应消息,或者选择一个未分配的关联标志来标识连接关系,返回一个连接响应消息,第一节点判断关联标志与已分配的关联标志是否冲突,如是则重新发送;第一或第二节点向对端节点发送消息;对端节点根据解析出的MAC地址从本地记录中查找对应的发送节点,并查找Mesh节点标识;根据标识进行判断,若没有与Mesh节点标识对应的比特位或对应的比特位设置为&否&,则表示没有要发送给对端节点的数据;否则表示有。
-
The corresponding color weighted diagraph was setup in dependence on the inference relation of the security holes in the intruded machine. With the vulnerability-log relation matrix, we searched different forensic information source and got the corresponding support value which could help to prune the false relation between the nodes and get the remote suspicious host. Then analyzing the suspicious host in the same way.
以漏洞间推理关系为前提,从受害主机入手,构造有色加权有向图,在多日志中查找漏洞被利用的解释信息,并由查找结果对漏洞链动态剪枝,得到主机漏洞攻击链和攻击该受害主机的嫌疑主机,对嫌疑主机迭代分析,推理出网络漏洞攻击链。
-
In this paper,computer technology is applied to solve the problem that exist in selecting the differential hanging gear s,such as database generation、hanging gears finding and big error of traditional calculation method,and to improve the precision and speed of finding differential hanging gear s,and to satisfy the needs of actual processing.
运用计算机技术,解决机床差动挂轮选择中存在的数据库生成、挂轮查找以及传统方法计算精度低的问题,提高了机床差动挂轮的计算精度和查找速度,满足了实际生产的需求。
- 推荐网络例句
-
The labia have now been sutured together almost completely.The drains and the Foley catheter come out at the top.
此刻阴唇已经几乎完全的缝在一起了,排除多余淤血体液的管子和Foley导管从顶端冒出来。
-
To get the business done, I suggest we split the difference in price.
为了做成这笔生意,我建议我们在价格上大家各让一半。
-
After an hour and no pup, look for continued contractions and arching of the back with no pup as a sign of trouble.
一个小时后,并没有任何的PUP ,寻找继续收缩和拱的背面没有任何的PUP作为一个注册的麻烦。