根日誌 的英文怎麼說

中文拼音 [gēnzhì]
根日誌 英文
root logger
  • : Ⅰ名詞1 (植物的營養器官) root (of a plant) 2 (比喻子孫後代) descendants; posterity 3 [數學] ...
  • : Ⅰ名詞1 (太陽) sun 2 (白天) daytime; day 3 (一晝夜; 天) day 4 (泛指某一段時間) time 5 (日...
  • 日誌 : daily record; journal
  1. New log files are created on an as - needed basis

    據需要創建新的文件。
  2. Another highlight of the architecture is introduction of data mining technique. ids makes use of data mining algorithms to abstract key features of system runtime status from security audit data such as system log and network data stream, and then constructs classify engine of audit data

    本文提出的體系結構中還引入了數據挖掘思想,利用數據挖掘技術中的關聯分析、分類等演算法從系統、系統調用序列、網路流等海量的安全審計數據中提取關鍵的系統特徵屬性,據這些屬性生成安全審計數據的分類模型用於入侵檢測。
  3. Process mining : discovering direct successors in process logs. computers in industry, april 2004, 53 : 231 - 244

    這類演算法主要據引擎中記錄的活動間發生的順序關系來進行挖掘工作。
  4. From the students ' report, teacher ' s log and classroom observation, it is concluded that the three models meet the needs of different students

    據學生的反饋報告、教師教學和課堂觀察分析,筆者認為不同模式適合不同的學生。
  5. If you d like to specify the data journaling method used for your root filesystem

    如果您願意指定用於文件系統的數據記錄方法(
  6. So, if you d like to put your root filesystem into full data journaling mode, add

    因此,如果願意將文件系統置於完整數據記錄方式下,則向內核引導選項添加
  7. The generalization system monitors user ' s operation and records user ' s action information to operation log library using agent techniques. computers can also judge the users whether they are operating correct or wrong basing on log library

    介紹了agent模型,並採用agent技術對用戶的所有綜合行為進行紀錄和監控,形成綜合行為庫,並能庫進行一些簡單的綜合行為分析。
  8. Because the dutch treasury pays 5 percent interest on any excess amount paid that it returns later - more than commercial banks would offer - some firms gladly accept an estimate that is too high, dutch finance minister gerrit zalm complained on his weblog monday. " if it turns out they need the money after all, they just submit a new estimate, " zalm said, adding this kind of " banking with the government " needed to stop as quickly as possible

    據路透社11月7報道,當,荷蘭財政大臣格里特扎爾姆在其網路博客中對上述現象進行了解釋,原來,該國財政部據法律對于多收的稅款在後返還時都將再支付5 %的利息,這個利息額超過了所有商業銀行現行的存款利率額。
  9. To the root logger, so each logging request received will be dispatched to our appender

    添加到根日誌記錄器( root logger ) ,這樣所接收到的每個記錄請求都將被分派到我們的appender 。
  10. Class provides automated maintenance capabilities to archive log files as needed, on a daily or per - application basis

    類提供自動維護功能,可以據需要每天或基於每個應用程序對文件進行存檔。
  11. This holds three configurable values that control when process accounting takes place based on the amount of free space as a percentage on the filesystem that contains the log

    該文件有三個可配置值,據包含的文件系統上可用空間的數量(以百分比表示) ,這些值控制何時開始進行進程記帳:
  12. Secondly, view delta calculation, whose purpose is to calculate view delta based on log analysis data flow, adopts deferred view monitoring method

    2 、視圖增量計算:目的在於分析數據流計算出視圖增量,採用方法為延時的視圖增量計算方法。
  13. Depending on your requirements, you have to balance the benefit of faster audit log queries with a potential penalty in overall system performance

    據您的需求條件,可能需要平衡使用整個系統性能的損失與更快的審核查詢。
  14. Format the logging request according to the user s wishes

    據用戶的願望格式化記錄請求。
  15. By definition, the printing method determines the priority of a logging request

    據定義,列印方法確定記錄請求的優先級。
  16. Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work

    本文首先回顧了xml及xml數據庫的歷史,並總結了目前廣泛使用的xml數據模型,在分析了各種傳統數據庫訪問控制策略,以及xml的專有訪問控制策略的優缺點后,基於w3c的xml數據模型,提出了一種基於子樹的具有高彈性的便於實現的的訪問區域表示法,並將rbac模型引入進來,提出了一種適用於xml數據庫的訪問控制模型x - rbac ,同時為了區分xml數據庫訪問中的合法訪問和合理訪問,我們據數據庫訪問具有頻繁性這一特徵,提出了一種基於區域訪問密度的入侵檢測模型( ids ) ,以對隱藏在正常訪問中的潛在安全威脅進行報警和
  17. Through the study we find : the processive learning assessment is especially useful in leading and facilitating students to grasp learning method ; it is reliable to use rubric, which should be design according to specific learning content, to carry through the processive learning assessment on the whole ; the processive learning assessment including the assessing content such as knowledge and skill, process and method, sensibility, attitude and view of value, adapts to use self - assessment relatively ; in order to assure the reliability of assessing each other, we should keep the learning teams consistent with the assessing teams ; teachers are not proper to assess their students " sensibility, attitude and view of value which is internal ; research on the design of learning journal should be reinforced, and we should decide whether to adopt it according to the degree of mature of the students and the characteristic of assessing content ; it is capable for teachers to make qualitative assessment on student ' s learning process ; parents assessment does n ' t adapt to use qualitative method completely ; the improper work - dividing of assessors and the occasion of assessment will influence the operation of assessment ; when deciding to explain and utilize the assessing result, we should differentiate two kinds of the processive learning assessment strictly

    研究發現:過程性學習評價對于導向與促進學生掌握學習方法特別有用;使用評價量表進行過程性學習評價基本可靠,其設計要以每個具體的學習內容為依據;包括知識技能、過程方法、情感態度價值觀等評價內容的過程性學習評價比較適合採取自評;為了保證互評的可靠性,要保持學習小組與評價小組的一致;教師不適宜評價學生的情感態度價值觀這一類內在的內容;學習的研究設計有待加強,並且要據學生的成熟程度和評價內容的特點決定是否採用;教師對學生的學習過程給予質性評語基本可行;家長評價不適宜採取完全質性的評語方式;評價主體的分工以及評價的時機都會對評價的可操作性產生影響;在決定評價結果的解釋與利用時要嚴格區分兩種類型的過程性學習評價。
  18. Based on the analysis phase, recovery estimates how much log will be read during recovery

    據分析階段的結果,恢復估計在恢復過程中將會讀取多少
  19. A cold restore has to be done if any of the critical dbspaces such as root dbspace, dbspaces containing the logical logs, or the physical log is down

    如果任何關鍵dbspaces (比如dbspace ,這些dbspace包含邏輯或物理)出錯,則必須執行冷還原。
  20. Based on web log of hannan univercity, this paper focused on the following aspects : 1 ) aanalyze and reserch technology of web log mining ; 2 ) bring forward a multi - path partitioning cluster method, which partions and clusteres according to user access path to improve effiency ; 3 ) bring forward a hierarchy search and iterative method to find frequent set

    本文結合海南大學web服務器,主要研究了以下內容: 1 ) web服務器挖掘技術進行了系統的分析和研究。 2 )提出了多路徑分割聚類方法。這種方法據用戶的訪問路徑進行分割聚類,有效地提高了聚類演算法的效率。
分享友人