策略訪問點 的英文怎麼說

中文拼音 [lüèfǎngwèndiǎn]
策略訪問點 英文
policy access point
  • : Ⅰ名詞1 (通「冊」 古代寫字用的竹片或木片) bamboo or wooden slips used for writing on in ancient ...
  • : Ⅰ名詞1 (簡單扼要的敘述) summary; outline; brief account; résumé: 節略 memorandum; aide mémoire;...
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ名詞1 (液體的小滴) drop (of liquid) 2 (細小的痕跡) spot; dot; speck 3 (漢字的筆畫「、」)...
  • 策略 : 1 (制定的行動方針和斗爭方式) tactics 2 (講究斗爭藝術) tactful 3 [數學] (對策) policy; strat...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重研究了如何在操作系統中實現多種安全,並在linux內核版本2 . 2 . 14中根據控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主控制、基於bell - lapadula模型多級安全規則的強制控制以及基於biba模型的強制控制等多種安全,從而有效地增強了操作系統中信息的保密性和完整性。
  2. Firstly, aiming at the remarkable characteristics of web sites, it discusses the state of the art in researching on web - server cluster systems, and brings forward a whole architecture of remote experiment system as well as education web site. on the basis of this, it design and achieve a content - based dispatching algorithm running on application layer for multiple services, named as mc - rr

    首先,針對當前web站的顯著特性,討論了web服務器集群系統的研究現狀和技術成果,提出了遠程實驗及教育網站的整體建設體系結構,並設計實現了應用層上的基於內容分類的多種類型任務輪轉( mc - rr )調度
  3. In this paper, according to the fully time compulsory education curriculum standards of chemistry ( experiment draft ) which requests that the students should be able to pose some valuable questions from their daily life or from their chemistry learning and express their questions clearly, the author discussed the inquiry value of the questions in chemistry instruction based on the theory of scientific epistemology, cognitive psychology and ability psychology. furthermore the parameters for measuring the students " questioning ability are also talked about from the perspectives of the motivations of questioning, the cognitive foundation, the value of the questions, the ability of posing questions by themselves and the ability of expressing their questions. after reading many literatures and interviewing some experienced chemistry teachers, the author proposed instructions strategies in cultivating the students " questioning ability in chemistry instruction from five aspects, they are : to stimulate the students to question ; to construct the cognitive foundation of questioning ; to augment the value of the questions ; to make the students pose their questions by themselves ; to cultivate the students " ability of expressing their questions

    本文在研究的過程中,採用了文獻閱讀和向任課教師談的方法,以《標準》中對「提出題」要素的要求「能從日常現象或化學學習中,經過啟發或獨立地發現一些有探究價值的題;能比較清楚地表述所發現的題」為主線,運用科學認識論、認知心理學及能力心理學的相關理論作為理論基礎,結合中學生化學學習的特,從題的遷移價值、思維價值、能力培養價值和情感價值四方面深入探討了化學教學中題的「探究價值」 ;通過對化學教學中學生「提出題」能力的涵義及結構的分析,從提動機、提的認知基礎、所提題的價值、提的自主性和表達題的能力五個方面建立了衡量學生「提出題」能力的指標體系;在此基礎上相應從五方面提出了化學教學中學生「提出題」能力培養的教學,分別是激發學生「提」動機的、建構「提」認知基礎的、提高題價值的、提高學生「提」自主性和培養學生「表達題」能力的
  4. Attribute denying access to that site, then no code will execute

    屬性的,拒絕該站,則不會執行任何代碼。
  5. Adaptive stack cache with fast address generation policy decouples stack references from other data references, improves instruction - level parallelism, reduces data cache pollution, and decreases data cache miss ratio. stack access latency can be reduced by using fast address generation scheme proposed here

    該方案將棧從數據高速緩存的中分離出來,充分利用棧空間數據的特,提高指令級并行度,減少數據高速緩存污染,降低數據高速緩存失效率,並採用快速地址計算,減少棧的命中時間。
  6. The proxy server often enforces policies such as forbidding access to certain web sites or even requiring user authentication before connection

    代理服務器通常強制實施安全,比如禁止某些web站,或者在連接之前要求用戶驗證。
  7. In a complete authentication system, you still need to write a policy decision point to decide if a user may access a web page

    在完整的認證系統中,您仍需要編寫,以確定用戶是否可以web頁面。
  8. For example, consider the scenario where a subject makes a request to access a target resource. the policy enforcement point checks with the policy decision point before making a decision and releasing the target resource to the subject

    比如,假設這樣一個場景:某一主體請求目標資源,執行( pep )在決定將目標資源發布給主體之前,要使用( pdp )進行檢查。
  9. Based on the analysis of above drawbacks, this paper proposes frequent access pattern tree algorithm ( fapt ). this algorithm includes two steps : access pattern tree method, through the pattern matching method it saves user ' s visit sequences with tree ; pruning method, it uses frequent degree to prune access pattern tree which is under the frequent degree

    在分析以上不足的基礎上,提出了頻繁模式樹( fapt )演算法,該演算法包括以下兩個步驟:模式樹的生成,通過模式匹配的方法將用戶序列以樹形結構來存儲;修剪的,利用頻繁度對模式樹進行修剪,修剪掉其中低於頻繁度的節
  10. Manual configuration of large amount of distributed firewalls, as the access control enforcement points, can not meet the global security requirements in the open and dynamic environment, and make such burden to the administrator ; a variety of multiple clients may need different restricted access rules according to their requirements of quite different security levels, and these rules need to be generated centralized

    作為控制實施的每個客戶端網卡,如果採用人工配置,不僅會導致龐大的工作量而且不能滿足整個動態局域網的安全要求;網路上各個客戶端的安全級別不同,所以不同用戶的安全規則需要集中制定。
  11. It focuses on adoption of proper techniques and policies to improve case quality, boost access performance, and increase the efficiency and competence of the cbr systems

    如何採取合適的和技術來提高案例的質量,改進案例庫性能,提高cbr系統的效率和能力成為人們關注的焦
  12. After analyzing the data access characteristics of lsb, we present a segmental hybrid data layout ( shdl ) scheme to be used in multi - node video servers

    本文在分析lsb數據特性的基礎上,提出了多節視頻服務器中的分段混合數據布局方案shdl 。
  13. With the evolution of network technologyjnternet takes more and more great part in our life. in the same time, the security of network become the focus of people. the traditonal method used for defence is adopt as strategy of prohibit, such as firewall, encrypt, access control, security system e. t. these methods all have some impact on defence, but from the view of system security management. but they are not enough only for defence. intrusion detection system can detect outside attack or misuse, it is an kind of logical compensation for defence

    隨著網路技術的迅速發展,網路日益成為人們生活的重要部分,與此同時,黑客頻頻入侵網路,網路安全題成為人們關注的焦,傳統安全方法是採用盡可能多的禁止來進行防禦。目前採用的手段有防火墻、加密、身份認證、控制、安全操作系統等,這些對系統非法入侵都起到一定的作用。然而從系統安全管理角度來說,僅有防禦是不夠的,還應採取主動
  14. Different from traditional routers, the gateway proposed here focuses on the routing strategies rather than the routing protocol itself. it maximizes the utilization rate of each network access line by forwarding data packets according to the routing strategies of each network respectively

    與傳統路由器不同,本文提出的轉發網關,並不關心路由協議本身,而將重放在路由上,通過兩個網路的不同路由實現數據包的動態轉發,使得每條接入線路的利用率達到最大。
  15. This thesis is directed by the thought above, we adapt the approach of concrete evidence through the help of activity of math with the way of survey communication chatting to the students and then gain scientific esplaination and analysis to show the character of the personalized thought so that we can design the personal teaching stradgy, which can improve the thought of math to promote the way of being transferred from the fact and skill to gain some method of solving problems to increase the ability of math thought which we called the thought of math. so we can realize the aim of making the reach into practice

    本文正是在上述思想的指導下,採用實證方式,以數學活動為載體,對學生進行觀察、交流、談、調查,通過對獲得的材料的解釋和分析,來揭示初中生的個性化的思維特,並制定相應的以優化學生數學思維的教學,促進學生由掌握數學事實和技能,轉變為掌握解決題的一般方法,提高數學思維的能力,即形成「數學式的思考」 ,實現研究為實踐服務的目的。
  16. If the technicians applied technology in the wrong, even achieving the business logic, but probably leading to many vices including low performance, low scalability, close coupling, low software duplication. so how to assemble the j2ee technology reasonable and achieve a system with high performance and high expansibility is my research emphasis in the thesis. in order to solve the problems and implement efficient web application, the paper put forward ejs _ mvc model according mvc pattern and we can assemble component by using ejs _ mvc model, it can solve many problems of web application and improving system with clear flow and clear function partition, in addition, due to controller is the most importance in the ejs _ mvc model, so the thesis also discuss some problems about controller design ; if the model is not designed accurately, system performance will encounter fatal influence, so the article lucubrate ejb technology from ejb choice, ejb optimized design, database access, design pattern etc and bring forward some strategies and methods about how to build efficient business tier ; finally based on ejs _ mvc model, a example that contains simple business logic is developed according to the object - orient software engineering thinking and some strategies and methods proposed by the thesis, in the process of achieving system function, the emphasis is probing into how t o assemble and apply technology reasonable and providing a new thinking thread and method contributing to build high effective and flexible j2ee application

    由於j2eeweb應用是由組件組成,因此為了解決上述題,實現高效的應用,本文首先從如何合理組合組件入手,找到一種方法使各組件能具體分工而又緊密合作,在深入研究各組件基礎上,根據mvc模提出了ejs _ mvc模型概念,指出可按此模型組合各層組件,該模型可以解決傳統web開發中存在的題,而且具有系統流程與系統功能劃分清晰,可擴展性、可維護性強等優,另外由於控制器是ejsmvc模型的重中之重,它起到承上啟下的作用,它設計好壞直接關繫到整個應用的性能、伸縮性與擴展性,因此又探討了控制器設計的有關題;另外如果模型設計不當的話,對系統性能造成的影響可能是致命的,因此本文又從ejb組件選擇、 ejb調優設計、數據庫和設計模式等方面對ejb技術作了全面的分析研究,指出在業務層中如何避免太多網路遠程調用和提高業務層性能,特別是根據前面的分析總結出了業務層的優化分層組合模型,這個模型的使用無疑會使業務層具有較高的性能與伸縮性;最後選擇一個業務邏輯較簡單的系統,使注意力集中到運用的j2ee技術上來,按照ejs _ mvc模型與軟體工程流程以及本論文所提出的方法與實現業務邏輯,在實現過程中具體探討如何合理運用組合技術,就多層j2ee體系結構的設計思想作深入的探討實踐,為實現高效、靈活的多層j2ee應用提供一種新的思路及方法。
  17. In the paper, the theory of access control 、 the concept of system call 、 the mechanism of loadable module and multiple security strategy framework - - gfac are introduced in emphasis. the paper also introduce particularly the architecture 、 function components 、 design and implementation of operating system firework and its each component " design and implementation

    論文重介紹了控制的理論、系統調用的概念、可卸載內核模塊的機制以及多安全支持框架gfac ;並詳細闡述了操作系統級防火墻的體系結構、各個功能模塊、設計與實現以及操作系統級防火墻各個組件的設計與實現。
  18. Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work

    本文首先回顧了xml及xml數據庫的歷史,並總結了目前廣泛使用的xml數據模型,在分析了各種傳統數據庫控制,以及xml的專有控制的優缺后,基於w3c的xml數據模型,提出了一種基於子樹的具有高彈性的便於實現的的區域表示法,並將rbac模型引入進來,提出了一種適用於xml數據庫的控制模型x - rbac ,同時為了區分xml數據庫中的合法和合理,我們根據數據庫具有頻繁性這一特徵,提出了一種基於區域密度的入侵檢測模型( ids ) ,以對隱藏在正常中的潛在安全威脅進行報警和日誌。
  19. This thesis put research emphasis on the shared i / o driver model and access policy in the satellite - carried embedded multiprocessor real - time operating system, in which the processors share a single i / o system

    本文重研究在多處理器共享i / o的系統中,星載嵌入式多處理器實時操作系統對于共享i / o的及驅動模型。
  20. Principles of programming languages, portland, oregon, usa, 2002, pp. 307 - 318. 25 peng li, steve zdancewic. downgrading policies and relaxed noninterference

    1提出了xml的降級控制題,它把降級的焦從代碼層轉移到數據層。
分享友人