棧機制 的英文怎麼說

中文拼音 [zhànzhì]
棧機制 英文
the stack mechanism
  • : 名詞1 (養牲畜的柵欄) shed; pen 2 (棧道) a plank road built on sides of cliffs for army3 (棧...
  • : machineengine
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 機制 : 1 (機器製造或加工的) machine processed; machine made 2 (機器的構造和工作原理; 有機體的構造、功...
  1. Based on the detailed analysis on the current main ha technologies and the ha architecture in wacos gateway, which is a typical soft switch network device, and considered the characteristics of trillium ' s implementation of ha and protocols, the dissertation presents a warm - standby ha design based on psf ( protocol - specific - function ) information update mechanism

    在詳細分析了當前主要的ha技術及一種典型軟交換設備? wacos網關中ha體系實現的基礎上,結合trillium公司megaco協議產品及其ha的實現特點,本文提出了基於psf ( protocol - specific - function )信息刷新的溫備份( warm - standby )的ha設計方案。
  2. The major meaning provided in this thesis is that it provides a ha design and implementation based on psf information update mechanism, and implement the fault tolerance function of megaco protocol stack, complete the integration of trillium ' s megaco product, which is a typical distributed telecom software, and wacos ha manager

    本文工作的主要意義在於提供了一種基於psf信息刷新的ha方案,在此基礎上實現了megaco的系統容錯功能,完成了trillium的megac0協議這種典型的分散式大型電信軟體與wacos網關ha管理模塊的集成。
  3. This paper studied landlords ' writs in suchou from late ting dynasty to 1930s in the academic institutions of japan and america and reached the conclusion that the landlord system was still popular in the early 1920s with the land bursary system as the main contributing factor

    摘要作者通過研究日本及美國學術構所藏晚清到1930年代蘇州地區的地主文書,包括佃戶名冊、租簿、賦役書、收租者的信函以及地主租收租程序的文書,進而認為:中國的地主度至少在1920年代初期仍然具有相當強的生命力,而維持其生命力的一個極重要因素便是「租度。
  4. The complete device tree therefore contains stacks for the device, for the hub, and for the host controller

    因此完整的設備樹包含設備的、集線器的和主器的堆
  5. Deadlock prevention and surprise dismount handling during this process require heroic efforts, including a mechanism whereby a file system driver can stash a pointer to an automatic variable ( that is, one allocated on the call / return stack ) to be used in deeper layers of recursion within the same thread

    在這個過程請求宏大結果的時候, (進行)死鎖預防和意外卸下處理,包括一個,憑借這個文件系統驅動可以中斷在相同線程中用於深層遞歸的自動變量的指示器(就是說,在調用/返回堆上分配一個) 。
  6. It s hard enough to rely on your own programming skill or that of your co - workers ; it s scary to have to rely on the documentation skill of anyone whose code you might be using sixteen frames down the call stack as your primary error - handling mechanism

    依賴于您自己的或者您的合作夥伴的編程技巧是非常困難的;如果不得不依賴于某個人的文檔化技巧,那麼對於他的代碼您可能得使用調用中的十六個幀來作為您的主要的錯誤處理,這將會是令人恐慌的。
  7. The esdar - 1 is based on the member durability synthesis assessment method. in this dissertation, using corrosion reinforcement measuring data of experiment member and steelworks outdoor trestle column in shangming city, fujian province, the esdar - 1 is applied to assess corroded member ' s durability. through analyzing durability assessment results

    4 )編了一種基於構件耐久性綜合評定方法的計算軟體? ?現役鋼筋混凝土結構耐久性評估專家系統,並以試驗構件和福建省三明鋼廠露天橋柱鋼筋銹蝕的實測數據,應用專家系統進行了銹蝕構件的耐久性評定。
  8. In this dissertation, based on the st company ' s sti5100 hardware platform, the development of usb host computer software, the test procedure, and the application of this software on dvr set top box have been introduced, which are mainly including the implement of the host controller driver, the kernel of usb protocol stack, the usb device drivers and the usb host protocol stack on dvr set top box

    本文介紹了基於st公司提供的sti5100硬體平臺上usb主軟體的開發與測試和該軟體在dvr頂盒上的應用,主要包括主器驅動、 usb核心協議和usb設備驅動程序三個部分的軟體實現和該usb主協議在dvr頂盒應用的軟硬體實現。
  9. With the development of vlsi and dsp technology, dsl is getting more and more mature. adsl implement a / d, d / a conversion, dmt & tcm and some necessary coding, by this way, adsl can achieve high efficiency of bandwidth and guarantees credibility we use itex adsl development tool ( iadt ) to simulate the central office, by this way, we can observe the performance of the adsl, including the overall performance monitor and subchannel performance monitor, we also present the arithmetic of every modules of the adsl

    在接入骨幹網的策略上,由於atm組網的靈活性,方便性,所以在adsl接入網的局端採用atm的uni (用戶?網路介面) ,利用atm在高速交換網路中的優勢以及以往在電信運營中方便的用戶認證, adsl在用戶認證關聯上採用pppoveratm ( rfc2364 )的方案,總體上說, adsl接入網的協議可以表述為tcp ipoverpppoveratm 。
  10. The main function modules discussed in this paper include : stream media protocols application model and realization, ts parsing module, audio / video decoder, audio / video synchronization model and realization, player memory buffer management module, multi _ task tech under uclinux. we also discuss the difference of the realization of stream media player between two defferent service types : broadcast tv ( btv ) and video - on - demand ( vod )

    從功能上,流媒體播放器主要包含幾個大的功能模塊:流媒體協議的應用模型及實現、多節目復用傳輸流( ts )的解析實現、音視頻媒體數據的解碼、音視頻同步的設計和實現方法、播放器內存管理模型的設計和實現、 uclinux下多任務的實時調度和高效數據交互技術等。
  11. At length, the thesis expounds the register stack and register stack engine in itanium and analyses the existed improvements to stack register allocation strategy in detail

    本文最後概述了itanium中的寄存器和rse,並詳細分析和比較現存的寄存器分配優化方案。
  12. Vdl mode 4 is consulted the data link layer of osi reference model, and it provides upper layers with reliable point - to - point connection. because of the particularity of the civil aviation ' s applications, vdl - 4 protocol will support some special application program directly, such as automatic dependent surveillance - broadcast ( ads - b )

    在對協議進行研究的基礎上,本文實現了與廣播式自動相關監視( ads - b )應用相關的vdl - 4協議的vss子層和lme子層,其中主要包括預約、網路接入和同步數據幀的廣播等。
  13. In order to solve the problems about unfixed instruction length, stack - orientation and addressing virtualization in jvm instruction set, the instruction fetch unit, stack cache and mechanism of address translation in java chip system are studied

    為了解決java虛擬指令系統中指令不定長、面向堆和地址虛擬化等問題,本文研究了java晶元中取指部件、堆緩沖部件和地址轉換以及相應物理存儲器的管理等關鍵技術。
  14. Chapter 3 focused on those key technologies used in hse, such as time synchronization, communication flow control, virtual address management, etc. using finite state machine model, setup and release processes of virtual communication channels provided by hse were particularly studied

    第三章結合hse通信模型,對hse通信的時鐘同步、流量控、虛擬標識管理等關鍵技術進行了深入的研究。通過有限狀態模型,分析了hse通信連接的建立過程和關閉過程。
  15. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作; 3研究了當前常用的各種數據加解密以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體的工作理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體進行了實現,並為它編寫測試代碼評估其性能。
  16. This mechanism is useful if you rewrite the functionality of the stack probe

    在重寫堆探測的功能時非常有用。
  17. Similar mechanisms exist in these two protocols. traditional solutions don ’ t pay attention to this fact. as a result, the mechanisms are executed repeatedly, redundant data are produced and the performance slows down

    而傳統的設計方法對這兩種協議進行嚴格的區分並使其位於協議中不同的層,導致相似的被重復實現並執行,造成數據冗餘,效率低下。
  18. Firstly the paper makes a survey of the development of bluetooth technology in the internal and the external, explains charactoristic and application of bluetooth, points out the purpose and significance of developing bluetooth application. secondly, based on the sig bluetooth specification version1. 1, it analyses the wholesome framework of specification of bluetooth technology and the contents of the bluetooth protocol stack. thirdly, it discusses the wireless layer, baseband layer and hci in detail

    本文首先介紹了藍牙技術的國內外發展概況,簡述了藍牙技術的主要特點和應用,指出了開發藍牙應用的目的和意義;然後以藍牙規范1 . 1版本為基礎,論述了藍牙規范的完整框架和藍牙協議的具體內容,其中重點分析了傳輸協議組、中間件協議組和應用組;最後對低層的藍牙傳輸組中的無線層、基帶層和主器介面進行了詳細的分析。
  19. The actual application shows that this embedded ethenet system can provide multimedia devices with network central control system with availability and promise it communication capability fully. in conclusion, some problems of this system are indicated faithfully

    系統應用表明,利用單片嵌入tcp / ip協議的嵌入式系統應用於網路集中控設備具有很大的方便性,能夠充分保證網路通信的性能。
  20. I ll then give you a detailed look at the mechanisms underlying the java 2 platform security architecture s runtime access checking feature, including the stack inspection and traversal mechanism for determining whether or not a permission is to be granted

    然後詳細分析java 2平臺安全體系結構的運行時訪問檢查功能的底層,包括堆檢查和確定是否授予權限的遍歷( traversal )
分享友人