英语人>网络例句>进行访问 相关的搜索结果
网络例句

进行访问

与 进行访问 相关的网络例句 [注:此内容来源于网络,仅供参考]

In this paper, a self-adaptive algorithm is presented based on Poisson process analysis, which can adjust the revisiting pattern and revisiting frequency according to the estimated change frequency. This algorithm can also tune the parameters so that the estimated value will fall into the best applicable range of the estimator.

在此,基于泊松过程进行分析,对估测器的适用范围进行了讨论,根据估测结果的偏离值和有效性对估测公式进行参数调整,同时根据估测值的大小不断调整数据源的访问频率和次数,从而使数据源访问模式和估测器互相适应,使估测器在最佳估测范围内获得估测值。

The reporter understands from 360 safe centers, had intercepted and capture in them " professional " in trojan of date of net silver-colored pilfer,"Net silver great robber "," net silver-colored burglar " and " cateran of body of net silver-colored concealed " wait for trojan and its mutation thousands of, they undertake special design in the light of net silver-colored user: Some can judge net silver operation automatically to undertaking, record clavier operation; Have a plenty of browser data is hijacked when the user visits net silver-colored page; Some net silver-colored pages that visit the netizen directly even hijack those who forge " fishing " page.

记者从360安全中心了解到,在他们已经截获的"专业"网银盗号木马中,"网银大盗"、"网银窃贼"以及"网银隐身劫匪"等木马及其变种数以千计,它们针对网银用户进行特殊的设计:有的能自动判断网银操作正在进行,并记录键盘操作;有的是在用户访问网银页面时劫持浏览器数据;有的甚至直接将网友访问的网银页面劫持到伪造的"钓鱼"页面。

In 360 safety the center intercepts and capture " professional " in trojan of date of net silver-colored pilfer,"Net silver great robber "," net silver-colored burglar " and " cateran of body of net silver-colored concealed " wait for trojan and its mutation thousands of, they undertake special design in the light of net silver-colored user: Some can judge net silver operation automatically to undertaking, record clavier operation; Have a plenty of browser data is hijacked when the user visits net silver-colored page; Some net silver-colored pages that visit the netizen directly even hijack those who forge " fishing " page.

在360安全中心截获的"专业"网银盗号木马中,"网银大盗"、"网银窃贼"以及"网银隐身劫匪"等木马及其变种数以千计,它们针对网银用户进行特殊的设计:有的能自动判断网银操作正在进行,并记录键盘操作;有的是在用户访问网银页面时劫持浏览器数据;有的甚至直接将网友访问的网银页面劫持到伪造的"钓鱼"页面。

LOBs support random access to data, but LONG s support only sequential access.

Oracle 能够对 LOB 数据进行随机访问,但对 LONG 数据只能进行顺序访问。

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。

The paper novelly proposes an access control policy based-on user s intention,which is able to defend unknown file attack s,and has extraordinarily less risk than prevalent access control policies.

针对文件攻击,提出一种量化的评估方法,对主流访问控制策略进行了量化评估,指出主流访问控制策略的脆弱性在于赋予了程序访问用户能够访问的文件集合的权利。

On account of hard partitional clustering algorithms having not taken the fuzziness or the uncertainty of Web logs into account, fuzzy C-Means clustering algorithm is used in this paper to mine Web logs.

对该矩阵进行模糊聚类分析后,获得具有相似访问偏好的用户,进一步处理得到用户共同的访问请求和访问行为,为个性化服务提供了依据。

The invention discloses an access control table and safety policy database method in data communication field, including: 1, initializing a Radix tree of access control table or safety policy database; 2, constructing clauses and subclauses of a rule; 3, inserting the rule in the Radix tree; 4, repeating the steps 2 and 3, in order to insert all the rules in the Radix tree, and forming the complete access control table or safety policy database; 5, searching matching rules.

本发明公开了一种数据通讯领域中访问控制列表和安全策略数据库的方法,包括:1。对访问控制列表或安全策略数据库的Radix树进行初始化;2。构造规则条目;3。将规则插入Radix树;4。重复第二步和第三步,将所有规则插入到Radix树中,形成整个访问控制列表或安全策略数据库;5。查询匹配的规则。

So some key issues of access control and trust management in grid environments are researched in this thesis and our work mainly include: The traditional security mechanisms are mainly concerned about the security of the provider of resources and miss the protection of the access requesters.

为解决网格环境的动态性和不确定性带来的安全问题,对网格环境下的访问控制和信任模型进行深入研究,既具有理论意义亦具有实用价值,研究内容主要包括:传统的访问控制方法仅仅对资源提供方提供了保护,没有考虑访问主体的安全。

Witnessed by Chinese Premier Wen and Russian Prime Minister Vladimir Putin, Minister Liu signed "Agreement Between the Government of the People's Republic of China and the Government of the Russian Federation on Jointly Building, Using, Managing, and Safeguarding the Railway Bridge Across the Border River of Heilongjiang Linking Tongjiang City of Heilongjiang Province of the People's Republic of China with Nizhneleninskoye in the Jewish Autonomous Oblast of the Russian Federation" with Russian Transport Minister Igor Levitin in Moscow on October 28th.

10月27日至31日,在国务院总理温家宝对俄罗斯进行正式访问并举行中俄总理第十三次定期会晤、对哈萨克斯坦进行正式访问并出席上海合作组织成员国总理第七次会议期间,陪同出访的铁道部部长刘志军,10月28日在莫斯科,由温家宝总理和俄罗斯总理普京见证,与俄罗斯运输部部长列维京签署了《中华人民共和国政府和俄罗斯联邦政府关于共同建设、使用、管理和维护中华人民共和国黑龙江省同江市—俄罗斯联邦犹太自治州下列宁斯阔耶居民点区域内黑龙江铁路界河桥的协定》;10月31日在阿斯塔纳,由温家宝总理和哈萨克斯坦总理马西莫夫见证,与哈萨克斯坦铁路国有股份公司总裁马明签署了《中华人民共和国铁道部和哈萨克斯坦铁路国有股份公司合作备忘录》。

第7/44页 首页 < ... 3 4 5 6 7 8 9 10 11 ... > 尾页
推荐网络例句

The split between the two groups can hardly be papered over.

这两个团体间的分歧难以掩饰。

This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.

这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。

The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.

聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力