英语人>网络例句>被调用的 相关的搜索结果
网络例句

被调用的

与 被调用的 相关的网络例句 [注:此内容来源于网络,仅供参考]

If you have supplied a handler for a specific message, or for a range of messages, in your parent window's class, it will override reflected message handlers for the same message provided you don't call the base class handler function in your own handler.

如果你在控件的父窗口类中为一个或一定范围特定的消息提供了一个处理函数,对于同样的消息,如果在您的处理中您并没有调用其基类的处理函数它就会覆盖掉被反射的消息处理。

You can't guarantee that all the event handlers will be called because some ill-formed event handler might throw an exception, but you can guarantee that your derived class's behavior is correct.

你不能保证所有的事件句柄会被调用,因为一些有问题的事件句柄可能抛出异常,但是你可以保证你的派生类的行为是正确的。

This is a vector of standard STL containers which contain the token sequences identified at the position of the macro call as the arguments to be used during the macro expansion.

它是一个标准STL容器的vector,其中含有在宏调用的位置上被标识为在宏扩展时使用的参数的单词序列。

The results prove that the method is prompter than the conventional ones and reduces the amount of work greatly. Moreover, when the DB is connected with regional information system, it is possible to make a study on the changing characteristics of regional land use through quantity change, and to find out the laws on the dynamic changes of spatial distribution and type of land use by land use maps.

结果表明与传统调查方法相比速度快,工作量大大减少,且把数据库与区域信息系统连接或被调用,不仅可以通过数值的变化,研究区域土地利用状况的变化特征,还可以从图形上体现出土地利用类型的空间分布规律,以及空间分布的动态变化情况。

Reentrant Said of software that can be executed multiple times simultaneously.

可再入的函数可以被安全地递归调用或由多任务多次调用。

It is important to realize that scopes are determined textually: the global scope of a function defined in a module is that module's namespace, no matter from where or by what alias the function is called.

作用域决定于源程序的文本:一个定义于某模块中的函数的全局作用域是该模块的命名空间,而不是该函数的别名被定义或调用的位置,了解这一点非常重要。

This type of calling is known as IMPLICITE calling as the name of the module is implied by the contents of the working storage variable.

这种被工作单元区内容中的变量以调用模块名字的的形式的调用是固定调用。

The essence of EDID is to set up a normal behavior fuzzy sub collection A on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection B with real time transfer array, then detect with the principle of minimum distance in fuzzy discernmethodThe innovation point of this paper is : Put forward the method of EDID, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of IDS; Use tree type structure to preservation the character database, have saved greatly stock space; in detection invade , carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method.

本文的创新点是:通过对特权进程的系统调用及参数序列的研究,提出了基于Euclidean距离的入侵检测方法EDID,不仅能有效降低漏报率和误报率,而且使实时入侵检测成为可能;设计有独立而完整的特征数据库,根据被监控程序的类别,分别设计正常行为、异常行为等,提高了检测系统的强健性和可伸缩性;特征数据库按树型结构存储,大大节省了存储空间;在检测入侵时,实行频度优先原则,优先分析和处理信息表中的高频度行为特征,提高检测的速度和效率,使实时入侵检测成为可能;同时实现了异常入侵检测和误用入侵检测,弥补了单一检测方法的不足。

By the time your AddDevice function executes, all three of their AddDevice functions have already been called.

你的AddDevice函数执行的时候,所有它们的AddDevice函数的三个已经被调用了。

After an interrupt is generated, the CPU compares the interrupt number (x8) against the size of the IDT -- stored in the interrupt descriptor cache register. If the INT# x 8 doesn't exceed the IDT size, then the interrupt is considered invokable, and the IDT base address is fetched from the descriptor cache; then the ISR's protected mode address is fetched from the IDT.

在产生一个中断之后, CPU 将会把中断号(乘以8)和 IDT 的长度进行比较( IDT 的长度存储在中断描述符缓冲寄存器中),如果中断号乘以8之后的值没有超过 IDT 的长度,则该中断被认为是可调用的,然后将 IDT 的基址从中断描述符缓冲寄存器中取出; ISR 的保护模式帝制从 IDT 中取出。

第8/14页 首页 < ... 4 5 6 7 8 9 10 11 12 ... > 尾页
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。