英语人>网络例句>访问时间 相关的搜索结果
网络例句

访问时间

与 访问时间 相关的网络例句 [注:此内容来源于网络,仅供参考]

Time you hit your late 20's early 30's you'll be visiting your near by physical therapist!!!!

你打你的时间晚20至30年代初期的你将访问您附近的物理治疗师!!

In 1768 Franklin visited England as postmaster general and there he heard a curious complaint by Colonial board of Customs: Why did it take British mail ships which were called packets couple of weeks longer to reach New York from England then it took an average merchant ship to reach Newport, Rhode Islanddespite merchants ships leaving Londonhaving to sail down Thames and then the length of the English channelbefore they sailed across Atlantic, while the packets left from Falmouthin Cornwallright on the ocean's doorstep.

富兰克林在1768年访问英国邮政和有他听到一个奇怪的投诉由殖民局海关:为什么采取英国邮件的船舶,被称为包几个星期的时间来达到纽约英格兰那么它的平均商船来达到罗得岛新港尽管商家船舶离开伦敦后,驶向了泰晤士,然后长度的英吉利海峡,然后在大西洋航行,而包遗留法尔茅斯康沃尔有权对海洋的家门口。

In a cyber warfare at first the attackers usually cast about for the intelligence of the targets, such as the vendors and versions information about the operating systems and services running on them, so they can get everything ready beforehand and exploit the vulnerabilities efficiently to perform a precision bombing. This paper discusses how to defeat reconnaissance through hiding or disguising the behavior characteristics in Web servers' communications.

文章讨论了侦察活动对系统安全的影响,提出了防风墙、安全时间、攻击距离的概念,并利用Linux 2.4内核提供的Netfilter架构访问、修改和丢弃数据包的功能设计了一个Web站点的防风墙原型系统——WSW2,描述了利用行为控制防范操作系统侦察和Web服务器映射的技术,实验证明这种方法可以有效地抵御侦察。

For the implementation of NRBAC model,a new implement mechanism,which is a binary two-key-lock pair access control scheme using prime factorization (TPB-2-KLP),is presented.

针对NRBAC模型的实现,文中又提出了一种新的RBAC实现机制——基于时间戳和素数因子分解的二进制双钥-锁对( TPB-2-KLP)访问控制方案。

After studying the MAC protocol of Ad hoc network and by modifying the Wireless Token Ring Protocol, a new uncontested Distributed Parallel Wireless Polling Access Protocol that can provide MAC QoS guarantees for Ad hoc network is presented, and the mathematical model is established by the embedded Markov chain theory and the probability generating function method. Based on it, the mean value of queue length and message waiting time are explicitly obtained.

摘要该文对Ad hoc网络的MAC层协议进行了研究,通过对无线令牌环协议进行改进,提出了一种新的具有QoS保障的无竞争的分布式并行无线轮询访问协议,并采用嵌入Markov链和概率母函数的分析方法,用限定服务规则进行了系统建模,在系统模型的基础上得到了系统的平均排队队长以及平均等待时间的解析结果。

But whatever language you speak, mid-winter is the best time to visit Quebec City.

但无论你说的语言,中期冬季是最好的时间来访问魁北克市。

Compared with conventional SRAM, the retentive time of data remanence is reduced by 82% while the operation power consumption only increases by 7%.

相比传统的静态随机访问存储器,数据残留的维持时间减小了82%,而工作功耗仅增加了4%。

The lightning locator is a real time computer based system that records all lightning strikes in Eastern North America and it is a vital component of the sophisticated fire prediction system based in Sault Ste.

闪电定位是一个真正的时间,基于计算机的系统记录所有的雷击在东区北美和这是一个重要组成部分,先进的消防预报系统的总部设在sault专题访问。

Brain Genius 2 once again stars Dr Lababidi, the white-haired academic who compered the first game and blabbers solicitously, Kawashima-style, about the time of day and the frequency of your visits.

脑天才2再次星博士Lababidi ,白头发的学术谁compered的第一场比赛和blabbers殷勤,川岛式的,对时间和频率,您的访问。

Note that since the member variable is a static object, it will retain its state and will no longer need to be initialized after the first time it's been accessed.

请注意,由于成员变量是一个静态对象,它将保持其状态,将不再需要在第一时间的被访问初始化。"/页"公共静态MyClass的实例

第11/20页 首页 < ... 7 8 9 10 11 12 13 14 15 ... > 尾页
推荐网络例句

Plunder melds and run with this jewel!

掠夺melds和运行与此宝石!

My dream is to be a crazy growing tree and extend at the edge between the city and the forest.

此刻,也许正是在通往天国的路上,我体验着这白色的晕旋。

When you click Save, you save the file to the host′s hard disk or server, not to your own machine.

单击"保存"会将文件保存到主持人的硬盘或服务器上,而不是您自己的计算机上。