进行访问
- 与 进行访问 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Andrew Atherton and his party visited the economic center of upper reaches of the Yangtze River and the International Business School, and held talks with the leaders and relevant personnel of above-mentioned department.
Andrew Atherton副校长一行访问我校期间还参观访问了长江上游经济中心和国际商学院并与上述部门的领导及相关人员进行了会谈,已达成初步的合作意向。
-
At the aspect of data preprocessing, the thesis puts forward the mode of Time Window to compartmentalize transanctions, and the method to complete the visiting path.
在数据预处理方面,本文设计了基于时间窗模型的访问事务划分方法和对访问路径进行修补的方法。
-
DOBBS: Mr. Premier, you've had a whirlwind visit to the United States, your first official visit as premier of China.
多布斯:总理先生,你即将结束对美国旋风似的访问,这是你就任总理以来首次对其它国家进行正式访问。
-
As for a given automata,there exists three cases:for some state which did not being visited, for some state itself indeed being not reachable although it has been visited,for some state it is equivalent to other states though it can be reached to, in these three cases it is obviously redundant to construct these automata, and the only way for us is to delete,integrate and reduct these useless states in order to minimize the number of states.
对于一个给定的自动机,它的状态中有一些根本没有被访问过,有一些尽管被访问过,但是本身是不可达的,有一些状态尽管是可达的,但是在功能上却与另一些状态等价,这样的自动机在设计和应用中显然很累赘,可以将一些无用的状态删掉,将另外一些等价状态进行整合和约简,使之状态数达到极小。
-
President Nixon and his party visited Peking and viewed cultural, industrial and agriculture sites, and they also toured Hangchow and Shanghai where, continuing discussions with Chinese leaders, they viewed similar places of interest.
尼克松总统及其一行访问了北京,参观了文化、工业和农业项目,还访问了杭州和上海,在那里继续同中国领导人进行讨论,并参观了类似的项目。
-
People have imminence needs to find out the "interested" information from the user browsing log.
通过对Web用户的访问信息进行有效的数据挖掘,可以获得有关Web用户访问行为的知识。
-
This article analyses the actual reality of network security and briefly intruduces a few of aggressive measures which threaten the safety of network. From these we can see, the passive ways such as firewall and anti-virus software to combat network attack can not meet the increasingly needs of network accessing .As a result, an intrusion detection system must be established to differentiate between the legal accessing and inbreaking attack. That is intrusion detection.
本文首先分析了目前的网络安全现状,简单介绍了几种威胁网络安全的攻击手段,从中可以看出通过防火墙和杀毒工具等软件,被动地防御网络攻击已经不能满足日益增加的网络访问量了,因此必须变被动为主动,对到达的网络访问内容进行审核,来判断是合法的访问还是入侵攻击,这种审核就是入侵检测。
-
In the algorithm, there is no master site that objects address computations must go through or access to a centralized directory. All compute nodes and storage nodes calculate node address independently, the objects access and storage nodes change never require atomic updates to multiple clients. The compute nodes adapt to the change of storage nodes by client image adjustment algorithm.
该算法使得数据对象分配地址的计算不依赖于中央节点计算或者访问一个集中式目录,所有计算节点和存储节点独立地进行地址计算,并且对数据对象的访问操作或新增节点引起的系统规模变化不需要原子更新到其他计算节点,计算节点通过视图校正算法自主学习,自动适应新的系统规模。
-
Intrusion may be come from unauthorized system attacker, may be from authorized user to overstep his authority.
入侵可能是来自互联网的攻击者对系统的非法访问,也可能是系统的授权用户对未授权的内容进行非法访问。
-
It verifies the identity of the WLAN access network to prevent the malicious AP from the re-direction attack, and improves the efficiency of the reauthentication process by using localized authentication mechanisms for 3G mobile subscribers and offline accounting methods based on the fast signature.
该协议对无线局域网访问网络的身份进行验证,抵御了恶意访问点的重定向攻击行为,采用对3G移动用户的局部化认证机制和基于快速签名的离线计费方法,有效地提高了重认证过程的效率。
- 推荐网络例句
-
The split between the two groups can hardly be papered over.
这两个团体间的分歧难以掩饰。
-
This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.
这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。
-
The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.
聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力