调用
- 与 调用 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Calendar-Driven News Feed and Routing Service will automatically invoke the services at the preferred time according to your calendar schedule.
日历驱动新闻Feed和路由服务会自动调用的服务的首选时间根据您的日历日程。
-
Typically, once you log in, you will choose a newsgroup of interest and call
一般来说,在你登陆完成后,你要调用group方法来选择一个感兴趣的新闻组。
-
If a view controller is unarchived from a nib file, this method is invoked after its view is set.
如果一个视图控制器是从nib文件读档,此方法将在设置好视图之后被调用。
-
If an argument is given, it will be returned from the method call, otherwise nil is returned.
如果给出一个参数,那么将从调用的方法中返回,否则返回nil。
-
A new expression node representing the function call operation.
一个新的表达式节点,表示该函数调用操作。
-
In order to satisfy combined simulation and optimization for the engine, the multi-objective and multi parameter nonlinear restriction programming was performed using the Matlab code that transfered the import parameters such as the structural, injection, valve timing, combustion timing and other parameters to the simulation model.
用Matlab编制了多目标、多参数非线性约束优化算法程序,通过调用仿真计算模型,改变输入参数如压缩比、空燃比、点火提前角和气门正时等的输入数值,实现了联合仿真优化。
-
Ordinarily, the candidate set for a call includes only member functions or nonmember functions but not both.
一般而言,函数调用的候选集只包括成员函数或非成员函数,不会两者都包括。
-
When we use an overloaded operator, the call does not tell us anything about the scope of the operator function that is being used. Therefore, both member and nonmember versions must be considered.
使用重载操作符是时,调用本身不会告诉我们与使用的操作符函数作用域相关的任何事情,因此,成员和非成员版本都必须考虑。
-
If the call is successful, the return value is nonzero.
如果这个调用是成功的,返回值非零。
-
Generally, the traditional Intrusion Detection Techniques can be categorized into anomaly detection or misuse detection. Based on the mechanism of computer immune system, this paper presents a new anomaly detection technique to detect intrusion into computer system. In this technique, a Markov chain model is used to represent a temporal profile of normal behavior of a process. The Markov chain model of normal profile can be created by learning the historic data of the sequence of system calls produced by privileged processes running on UNIX system.
传统的入侵检测技术,依照所基于的原则不同,通常分为误用入侵检测与异常入侵检测,本文在入侵研究中所采用的计算机系统免疫思想的基础上,提出了一种新的异常入侵检测技术,通过对特权进程系统调用序列的历史数据的学习,用马尔可夫链模型来建立特权进程的正常时态行为轮廓。
- 推荐网络例句
-
The labia have now been sutured together almost completely.The drains and the Foley catheter come out at the top.
此刻阴唇已经几乎完全的缝在一起了,排除多余淤血体液的管子和Foley导管从顶端冒出来。
-
To get the business done, I suggest we split the difference in price.
为了做成这笔生意,我建议我们在价格上大家各让一半。
-
After an hour and no pup, look for continued contractions and arching of the back with no pup as a sign of trouble.
一个小时后,并没有任何的PUP ,寻找继续收缩和拱的背面没有任何的PUP作为一个注册的麻烦。