操作數棧 的英文怎麼說
中文拼音 [cāozuòshǔzhàn]
操作數棧
英文
operand stack-
Fixed : let delete part of item in stack instead deleting full stack, additional anti - cheating check for operations with npc
修正:刪除堆棧中數據的一部分而不是全部來附加檢查對npc的操作以防止做弊。Ing strings onto an array is time - intensive ; first of all, we have a function call which means pushing items onto a stack, and then taking them off, and we also have the additional array management overhead
到一個字元串中非常耗時;首先,我們要執行一次函數調用(這會涉及壓棧和出棧操作) ,還要添加額外的數組管理工作。Pops 1 value off the stack for the first operand, and 1 value of the stack for the second operand
對于第一個操作數,從堆棧中彈出1個值;對于第二個操作數,從堆棧中彈出1個值。Obviously, the straightforward method is faster because there aren ' t any function calls or stack manipulation, but the recursive way is more elegant and better reflects the problem
很明顯,直接方法執行速度要快一些,因為沒有涉及到任何函數調用或堆棧操作。Because of lacking the hardware testing tools, a kind of low - cost testing scheme has been designed, and compared with other schemes. after adding usb host protocol stack to stite / os20 embedded operating system, and based on a large number of data verification and analysis, the conclusion was drawn that the usb host can communicate with usb devices correctly according to the protocol
在缺乏硬體測試工具的情況下,本人設計了一種低成本的測試方案,並對這種方案進行分析比較,在大量數據驗證分析的基礎上得出結論:在stlite / os20嵌入式操作系統中加入本課題設計的usb主機協議棧后, usb主機能夠正確按照協議與usb設備進行通信。It uses a stack architecture, meaning instruction operands are loaded to an internal stack before they re used
它使用堆棧體系結構,這意味著在使用指令操作數之前要先將它們裝入內部堆棧。This paper mostly expatiates tcp / ip protocol stack system as well as the data _ transmission manner on the network. it introduces program principle of socket of exploitation entironment of windows sockets network communications program : software entironment is operating system of windows 98 either windows nt because they all sustain windows sockets api
本文主要講述了tcp ip協議堆棧的體系以及它在網路上傳送數據的方式,介紹socket (套接字)的編程原理, windowssockets網路通信程序的開發環境:軟體環境即為所採用的操作系統,可以是windows98 ,也可以是windowsnt ,因為它們都支持windowssocketsapi 。The way the msil instruction pushes operand onto the stack
Msil指令將操作數推到堆棧上的方式。How the microsoft intermediate language msil instruction pushes operand onto the stack
Microsoft中間語言( msil )指令將操作數推到堆棧上的方式。Then, in order to resolve the lack of tcp / ip stack in c / os kernel, this paper presents a simplified scheme to implement a embed tcp / ip stack at last, the fire control information exchange system is constructed based on arm processor and c / os kernel. 3. using pc104 embedded computer as the hardware platform, this paper introduces the process of developing fire control information exchange system that runs under wince through windows socket programming and evc develop tools
熟悉並移植c / os嵌入式操作系統,並通過添加tcp / ip協議棧和應用層介面函數,設計和開發基於arm處理器和c / os嵌入式操作系統的信息交換系統; 3 .採用pc104工控機為硬體平臺,熟悉嵌入式vc ( evc )開發環境和基於windowssocket的網路編程模式,開發了基於wince操作系統的信息交換系統。The rpc binding style uses the names of the method and its parameters to generate structures that represent a method s call stack, so it makes the web services look like a single logical component with encapsulated objects, all handled in the soap rpc stack
Rpc綁定方式採用方法名稱和參數來產生代表方法調用堆棧的結構,因此,它使web服務看起來像一個帶有封裝對象的單一的邏輯組件,所有操作都在soap rpc堆棧中處理。Gets the maximum number of items on the operand stack when the method is executing
獲取執行方法時操作數堆棧上的項的最大數目。In the implementing of virtual machine, all p - instructions are encapsulated as classes. the virtual machine maintains the run - time environment, which is composed of code section, data section, function calling stack, operand stack, instruction pointer, etc. all that is good to the executing and the debugging of program
在虛擬機實現方面,將所有p -指令封裝為類來實現;並用虛擬機維護由代碼區、數據區、函數調用棧、操作數棧和指令計數器等共同構成的運行時環境,控製程序的執行,有利於實現調試功能。Secondly, it can detect opened ports on the basis of results of the first port - scan, and get the information of service and version of these opened ports. thirdly, through many kinds of detecting ways, it can get the os - fingerprints of tcp / ip protocol stack of the destination computer, and guess the faraway operation system exactly. at last, taking cve ( common vulnerabilities and exposures ) as the standard, a more practical vulnerability database by combining the structures of two large - scale oversea vulnerability databases is designed
設計開發的網路漏洞探測系統具有較強的綜合性能,能夠提供多種埠掃描技術,在第一次掃描結果的基礎上對開放的埠進行第二次探測,得到開放的埠的服務和版本信息,通過多種探測方法獲得目標主機的tcp / ip協議棧指紋信息、較準確的推測出遠程操作系統,並以cve ( commonvulnerabilitiesandexposures )為標準,結合國外兩個大型漏洞數據庫的結構,設計了較實用的漏洞數據庫。This operation does not do anything but check to make sure that the type of the argument on the top of stack is what is expected
操作就會被發出。這項操作只用於保證堆棧頂部的參數類型是預期的。分享友人