目標機器 的英文怎麼說

中文拼音 [biāo]
目標機器 英文
object machine
  • : Ⅰ名詞1 (眼睛) eye 2 (大項中再分的小項) item 3 [生物學] (把同一綱的生物按彼此相似的特徵分為幾...
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : machineengine
  • : 名詞1. (器具) implement; utensil; ware 2. (器官) organ 3. (度量; 才能) capacity; talent 4. (姓氏) a surname
  • 目標 : 1. (對象) target; objective 2. (目的) goal; aim; destination
  • 機器 : 1. (用來轉換或利用機械能的機構) machine; machinery; engine 2. (引申為機構) apparatus; organ
  1. In the preparation part, it defines the architecture of mipsx and its application binary interface. in the porting part, it describe the porting of compiler ' s backend

    其中移植的準備工作中詳細說明了mipsx的系統結構和應用二進制介面的定義,而移植的具體步驟中詳細闡述了對編譯後端的移植過程。
  2. An emulator is a software or hardware approach to emulate a hardware platform on other platform. jit ( just - in - time ) compiler is widely adapted to speed - up emulation, which compiles the instruction of the source platform into target instruction on - the - fly

    由於硬體平臺的不同,一個高效的模擬可以採用即時編譯( just - in - timecompiler )技術,即時的把源指令編譯成目標機器指令運行。
  3. At the base of compiler forepart, considering repertoire, addressing mode and instruction period of object machine, adopting backfill to fill data for machine code in order to generate right object code, assemble language program

    在編譯前端的基礎上,考慮的指令系統、尋址方式和指令周期,採用回填技術對碼填充數據以生成等價有效的代碼? ?匯編語言程序。
  4. The information of running programs users can get is just the register, memory and symbol state

    所看到的程序執行現狀,也只是方當前程序寄存、內存、符號信息等基本信息。
  5. Theory analysis and experimental simulations of pursuit - evasion problem with maneuvering target in sight coordinate system are performed using the two methods

    並應用這兩種方法針對視線坐系的兩空間飛行動下的追逃進行了理論推導和實驗模擬。
  6. The relationship between machine description and code generation, and the technique of mapping rtl into object code by tree pattern matching are described in detail

    重點研究了描述與代碼生成之間的關系、如何選用合適的中間表示進行目標機器指令系統的描述、樹模式匹配的代碼生成技術等。
  7. The destination has enough space for product deployment 300 - 400 mb based on the products chosen

    目標機器應該為產品部署留出足夠的空間(根據選擇產品,這個空間大約是300 - 400 mb )
  8. Using a debugger you can download software to the target for immediate execution

    你能使用除錯下載軟體到並直接運行。
  9. The debugger runs on a host computer and connects to the target through a serial port or network connection

    除錯在宿主上運行並且通過串口或網路連接到上。
  10. Usually, what happens in practice is that the attacker will break onto a machine that is on the same network segment as one of the two machines in question usually the network of the target

    通常,實際發生的情況是,攻擊者將非法闖入與討論中的兩個之一位於相同網段上的一臺(通常是目標機器的網路) 。
  11. Data of flying state, targets, arms distribution, and tactical decisions is transmitted through the data chain among member air - fighters in muti - aircraft operation

    在多協同作戰中,友相互之間要通過數據鏈傳輸數據。傳輸的內容包括友的飛行狀態,、武分配及戰術決策等信息。
  12. A cross - compiler runs on a host computer and produces object code for the target

    交叉編譯在主上運行並且產生代碼。
  13. In another way, we develop a compiler in virtue of gcc ' s intermediate language, rtl ( register transfer language ), but we must rewrite the program of code generation and code optimization

    此外,我們藉助gcc編譯過程中產生的中間代碼rtl ( registertransferlanguage )文件,重寫代碼生成和優化功能程序,為新的目標機器開發c語言編譯
  14. To implement dynamic binary translation effectively, several optimized methods come up in this thesis : efla algorithm to enhance the efficiency of emulating the condition code of the source platform on target platform ; two algorithms to handle the active and passive exception in application level ; and a translation - guided algorithm for register allocation

    針對動態二進制翻譯,本文提出了若干種優化方案:提高在目標機器上模擬源志位效率的efla演算法;處理應用級主動異常和被動異常的兩個演算法;翻譯制導的寄存優化演算法。
  15. Files to the target machine

    文件復制到目標機器
  16. No connection could be made because the target machine actively refused it

    不能做任何連接,因為目標機器積極地拒絕它。
  17. First, the attacker needs to make sure that the fake packets will actually be routed to the target

    首先,攻擊者需要確保假的信息包確實被路由到目標機器
  18. Second, even if packets make it to the target, responses will be routed to the forged ip address

    其次,即使信息包被傳遞到目標機器,響應也將被路由到偽造的ip地址。
  19. Once you re on the same network segment, you re almost always able to see all traffic addressed to the machine of interest

    一旦您位於相同的網段上,幾乎總能看見流向目標機器的所有信息包。
  20. On auditmachine assuming we have our machinelist. txt file containing the names of our target machines and we have our audit accounts set up correctly, we will generate an output file called audit. xml

    (假設我們使machinelist . txt包含我們的目標機器的名稱) ,並且我們的審計帳戶設置正確,那麼我們將生成一個名為audit . xml的輸出文件。
分享友人