操作數棧 的英文怎麼說

中文拼音 [cāozuòshǔzhàn]
操作數棧 英文
operand stack
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  • : 數副詞(屢次) frequently; repeatedly
  • : 名詞1 (養牲畜的柵欄) shed; pen 2 (棧道) a plank road built on sides of cliffs for army3 (棧...
  • 操作 : 1 (按照一定的程序和技術要求進行活動) operate; manipulate; handle 2 (所進行的若干連續生產活動的...
  1. Fixed : let delete part of item in stack instead deleting full stack, additional anti - cheating check for operations with npc

    修正:刪除堆據的一部分而不是全部來附加檢查對npc的以防止做弊。
  2. Ing strings onto an array is time - intensive ; first of all, we have a function call which means pushing items onto a stack, and then taking them off, and we also have the additional array management overhead

    到一個字元串中非常耗時;首先,我們要執行一次函調用(這會涉及壓和出) ,還要添加額外的組管理工
  3. Pops 1 value off the stack for the first operand, and 1 value of the stack for the second operand

    對于第一個,從堆中彈出1個值;對于第二個,從堆中彈出1個值。
  4. Obviously, the straightforward method is faster because there aren ' t any function calls or stack manipulation, but the recursive way is more elegant and better reflects the problem

    很明顯,直接方法執行速度要快一些,因為沒有涉及到任何函調用或堆
  5. Because of lacking the hardware testing tools, a kind of low - cost testing scheme has been designed, and compared with other schemes. after adding usb host protocol stack to stite / os20 embedded operating system, and based on a large number of data verification and analysis, the conclusion was drawn that the usb host can communicate with usb devices correctly according to the protocol

    在缺乏硬體測試工具的情況下,本人設計了一種低成本的測試方案,並對這種方案進行分析比較,在大量據驗證分析的基礎上得出結論:在stlite / os20嵌入式系統中加入本課題設計的usb主機協議后, usb主機能夠正確按照協議與usb設備進行通信。
  6. It uses a stack architecture, meaning instruction operands are loaded to an internal stack before they re used

    它使用堆體系結構,這意味著在使用指令之前要先將它們裝入內部堆
  7. This paper mostly expatiates tcp / ip protocol stack system as well as the data _ transmission manner on the network. it introduces program principle of socket of exploitation entironment of windows sockets network communications program : software entironment is operating system of windows 98 either windows nt because they all sustain windows sockets api

    本文主要講述了tcp ip協議堆的體系以及它在網路上傳送據的方式,介紹socket (套接字)的編程原理, windowssockets網路通信程序的開發環境:軟體環境即為所採用的系統,可以是windows98 ,也可以是windowsnt ,因為它們都支持windowssocketsapi 。
  8. The way the msil instruction pushes operand onto the stack

    Msil指令將推到堆上的方式。
  9. How the microsoft intermediate language msil instruction pushes operand onto the stack

    Microsoft中間語言( msil )指令將推到堆上的方式。
  10. Then, in order to resolve the lack of tcp / ip stack in c / os kernel, this paper presents a simplified scheme to implement a embed tcp / ip stack at last, the fire control information exchange system is constructed based on arm processor and c / os kernel. 3. using pc104 embedded computer as the hardware platform, this paper introduces the process of developing fire control information exchange system that runs under wince through windows socket programming and evc develop tools

    熟悉並移植c / os嵌入式系統,並通過添加tcp / ip協議和應用層介面函,設計和開發基於arm處理器和c / os嵌入式系統的信息交換系統; 3 .採用pc104工控機為硬體平臺,熟悉嵌入式vc ( evc )開發環境和基於windowssocket的網路編程模式,開發了基於wince系統的信息交換系統。
  11. The rpc binding style uses the names of the method and its parameters to generate structures that represent a method s call stack, so it makes the web services look like a single logical component with encapsulated objects, all handled in the soap rpc stack

    Rpc綁定方式採用方法名稱和參來產生代表方法調用堆的結構,因此,它使web服務看起來像一個帶有封裝對象的單一的邏輯組件,所有都在soap rpc堆中處理。
  12. Gets the maximum number of items on the operand stack when the method is executing

    獲取執行方法時上的項的最大目。
  13. In the implementing of virtual machine, all p - instructions are encapsulated as classes. the virtual machine maintains the run - time environment, which is composed of code section, data section, function calling stack, operand stack, instruction pointer, etc. all that is good to the executing and the debugging of program

    在虛擬機實現方面,將所有p -指令封裝為類來實現;並用虛擬機維護由代碼區、據區、函調用操作數棧和指令計器等共同構成的運行時環境,控製程序的執行,有利於實現調試功能。
  14. Secondly, it can detect opened ports on the basis of results of the first port - scan, and get the information of service and version of these opened ports. thirdly, through many kinds of detecting ways, it can get the os - fingerprints of tcp / ip protocol stack of the destination computer, and guess the faraway operation system exactly. at last, taking cve ( common vulnerabilities and exposures ) as the standard, a more practical vulnerability database by combining the structures of two large - scale oversea vulnerability databases is designed

    設計開發的網路漏洞探測系統具有較強的綜合性能,能夠提供多種埠掃描技術,在第一次掃描結果的基礎上對開放的埠進行第二次探測,得到開放的埠的服務和版本信息,通過多種探測方法獲得目標主機的tcp / ip協議指紋信息、較準確的推測出遠程系統,並以cve ( commonvulnerabilitiesandexposures )為標準,結合國外兩個大型漏洞據庫的結構,設計了較實用的漏洞據庫。
  15. This operation does not do anything but check to make sure that the type of the argument on the top of stack is what is expected

    就會被發出。這項只用於保證堆頂部的參類型是預期的。
分享友人