英语人>网络例句>计算能力 相关的搜索结果
网络例句

计算能力

与 计算能力 相关的网络例句 [注:此内容来源于网络,仅供参考]

The Internet is sometimes described as a cloud -- a big, borderless area of computing power.

互联网有时候被描述成一朵巨大的、拥有无边际计算能力的云。

The Internet is sometimes described as a cloud, a big borderless area of computing power.

互联网有时被描述作为云彩--一个计算能力大,无边无际的区域。

The Internet is sometime described as a crowd, a big, borderless area of computing power.

互联网有时候被描述成一朵巨大的、拥有无边际计算能力的云。

The Internet is sometimes described as a cloud -- a big, borderless area of computing power.

网络有时称为一朵云,一片巨大、无界、具有计算能力的云。

Over the past few years a host of fast-growing firms such as Elance, oDesk and LiveOps have begun to take advantage of "the cloud"—tech-speak for the combination of ubiquitous fast internet connections and cheap, plentiful web-based computing power—to deliver sophisticated software that makes it easier to monitor and manage remote workers.

在过去几年内诸如Elance, oDesk和LiveOps这样快速发展的公司开始利用&云&--即将无处不在的快速网络连接与廉价的、强大的基于网络的计算能力相结合的技术名词--提供精妙的软件以便可以更容易的监控和管理异地员工。

The data for these absorption spectra have improved enormously in the past 50 years as has the capacity to do all these calculations, so one might anticipate that this is where Plass would have been most overtaken by scientific progress.

过去的50年里,吸收光谱的数据和计算能力都有了大幅提高,所以你可能猜想普拉斯可能因为科学的进步而被赶超。

Shannon's model can be modified to make practical provably secure cryptosystems possible.

假定敌手拥有无限的时间、设备和资金,对敌手的计算能力不做任何限制,那么即使敌手能在很短的时间内将所有的密钥都遍历一遍的话,基于信息理论安全模型的密码系统也不会被攻破。

Along with the password attack method unceasing renewal, the computation ability unceasing enhancement as well as to the operating speed request, the tradition disperses row algorithm MD5, SHA has demonstrated their shortcoming and the insufficiency day by day, and thestructure of hash function is mostly based on block cipher algorithm DES, but the HASH function security is established above the grouping function security, because the DES operand is very big, the operating speed very slowly by and its itself some characteristics, therefore disperses a row function based on the DES algorithm to have potential unsecurity.

随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。

Along with the password attack method unceasing renewal,the computation ability unceasing enhancement as well as to theoperating speed request, the tradition disperses row algorithm MD5,SHA has demonstrated their shortcoming and the insufficiency day byday, and thestructure of hash function is mostly based on block cipheralgorithm DES, but the HASH function security is established above the grouping function security,because the DES operand is very big, the operating speed veryslowly by and its itself some characteristics, thereforedisperses a row function based on the DES algorithm to havepotential unsecurity.

摘要随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。

The precision and the capacity of the programs are illustrated in this paper with a series of researches and applications.

本文通过一系列的数值分析与试验结果的对比和工程应用算例,说明所研发程序的精度和计算能力

第10/61页 首页 < ... 6 7 8 9 10 11 12 13 14 ... > 尾页
推荐网络例句

The split between the two groups can hardly be papered over.

这两个团体间的分歧难以掩饰。

This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.

这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。

The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.

聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力