訪問代理 的英文怎麼說

中文拼音 [fǎngwèndài]
訪問代理 英文
aa access agent
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. Various sensors that are besotted in the 3d world through vrml can effectively sense all kinds of operators " behaviors ; java byte codes that are besotted in the interface between vrml and java through the " script " node can finish difficult tasks. so the alteration can be concluded as follows : operators touch parts of the shelf, and the java byte codes execute the relative function, finally results are reported to the operators. ( 3 ) through detailed studying the working function of the throttling experiment, i constructed a mathematical model of the experiment and simulated the model

    Vrml可以在瀏覽器環境中為3d實驗臺模型添加多種感知器,能夠良好地感知操作者的各種意圖;在vrml和java技術的介面中,可以利用java程序碼來完成一些復雜的任務,從而實現了實驗的交互:實驗者感知實驗臺的各種儀器,程序完成相應的任務,然後返回相應的結果; 3 )仔細研究了節流調速實驗的液壓迴路原,對實驗過程建立了相關數學模型,進行模擬分析並獲得了模擬結果,實現了基於模型驅動方法的虛擬實驗; 4 )實驗臺遠程的實現。
  2. Using the mode of ais network at sea for reference, relying on the background of " human first " navigation human culture, using the theory of modern logistic " bpr, and get the idea of " the core is information flowing ", then describer the seaman ' s work on board particularly. apply some modern technology, such as : network and digital communication, database, visual procedure, from network construction, database designing, database linking, to interaction windows designing, achieve the following functions step by step

    借鑒ais海上網路建設模式,依託以人為本的航海人文背景,利用現物流論的過程優化念,現物流的核心為信息流的念,對航海活動中船方工作內容予以細化,利用現網路與數據通信技術、數據庫技術、可視化編程技術等,分網路建設、數據庫設計、編程工具與數據庫的方法、可視化界面的設計等若干步驟,逐步實現系統如下方面的功能。
  3. Finally you will need access to a broker

    最後用戶需要訪問代理
  4. Code snippets manager can be accessed from the tools

    可以從「工具」菜單中碼段管器」 。
  5. To access the code snippets manager

    碼段管
  6. Which credentials your system should use to access the proxy

    系統應使用哪些憑據訪問代理
  7. Design on cooperation interface model for workflow access proxy

    的工作流訪問代理協作介面模型設計
  8. Interface provides the methods and properties that are required by the

    訪問代理服務器所需的方法和屬性。
  9. Fixed server role have unrestricted access to proxies. members of

    固定服務器角色的成員可以無限制地訪問代理
  10. Controls whether the system uses the default network credentials to access a proxy

    控制系統是否使用默認網路憑據訪問代理
  11. “ the isa server requires authorization to fulfill the request. access to the web proxy service is denied

    你們用的isa防火墻的,提示的很清楚。沒有訪問代理服務器的權限。
  12. If the login for the user has access to the proxy, or the user belongs to any role with access to the proxy, the user can use the proxy in a job step

    如果用戶的登錄帳戶具有訪問代理帳戶的權限,或者用戶屬于具有訪問代理帳戶的權限的任何角色,則用戶可以在作業步驟中使用帳戶。
  13. We have proposed a solution which makes use of the database access agent to resolve the problems of information security and database flux control that will be encountered in the design and development of erp system

    論文結合erp系統的設計與開發,提出用數據庫訪問代理解決erp系統發展將要面臨的信息安全性和數據庫服務器流量控制題。
  14. This download provides detailed instructions for installing, activating, and configuring a microsoft office live communications server 2005 access proxy in federation, remote user, and branch office topologies

    本下載針對安裝激活和配置聯盟遠程用戶和分支機構拓撲中的microsoft office live communications server 2005訪問代理服務器提供了詳細說明。
  15. In the article, the author gives out the current status of the information system, sums up the security requirements and the purpose of the project. based on the theory of access control, the author gives out the solutions for the pki / ca infrastructure, network access proxy mechanism, authentication and authorization mechanism and the security architecture for the application system

    論文中對鐵路信息系統現狀進行了分析,歸納出明確的需求及目標,並依據信息系統安全中有關控制框架及機制的相關論設計並實現了鐵路信息系統安全框架中的數字證書( pki ca )及用戶目錄管( ldap )系統、網路訪問代理和認證授權機制、基於pki ca的身份認證和授權系統及應用系統安全框架和支持平臺。
  16. It becomes more difficult to manage, integrate and share the control system real - time data when we set up the industrial real - time database because of complicated affair between every department and isomeric character of the system. a three - level - structure model and the method to establish database is provided based on corba criterion with its character of being regardless of programming languages, hardware platform and network protocol. a universal real - time database faces multi - system is also set up by learning the distributed criterion, it can realize the request broker, and the application software can visit the database pellucidly ; thus the power station simulation model can be linked with the control system such as infi90, ovation and be made use of the control object, a closed simulation and control experiment system is set up

    在創建工控領域實時數據庫時,企業各部門間的復雜事務及內部異構性給實時數據的管、集成和共享帶來了一定的困難,根據corba規范具有語言無關性、平臺無關性和網路協議無關性的特點提出基於分散式計算規范corba的三層體系結構模型及建立與維護實時數據庫的方法和途徑;通過corba規范建立面向多個分散控制系統的通用實時數據庫,實現數據訪問代理,使應用軟體可以透明地對實時數據庫進行、存取、管;將infi90 、 ovation分散控制系統與火電廠模擬機模型進行有效的互連,以全物過程模擬數學模型為對象,構建了閉環控制模擬實驗研究系統,實現數據的高效連通及管;進而通過基於corba的實時數據庫構建一個從火電廠模擬機對象到過程式控制制設備再到sis系統的綜合自動化試驗平臺。
  17. Therefore, this thesis studies on the architecture, key technologies and methods for the implementation of the database access agent. furthermore, the emphasis of this thesis is focused on the database flux control, database encryption techniques, and encrypted network transmission

    論文主要研究了數據庫訪問代理的系統結構、關鍵技術及實現方法,其中重點研究了數據庫訪問代理設計與實現中數據庫服務器流量控制、數據庫加密設計和網路傳輸加密等內容。
  18. In the chapter of component based database access agent, the component criterion for the agent is selected and the component frame of the agent is designed based on the discussion for the component development technology. in the chapter of the platform of network communication, its operational principle is discussed at first, then the program structure of the platform and the key technology of encrypted network transmission is focused. in the chapter of the design and implementation of the server of the agent, the operational principle is researched, the program structure is designed, and the key technologies of database flux control, data buffer, and database security are studied

    基於組件的數據庫訪問代理設計介紹了組件開發技術、數據庫訪問代理的組件標準選擇及數據庫訪問代理的組件框架設計;網路通信平臺設計和實現研究了網路通信平臺的工作原、實現過程中使用的基本技術,論述了網路加密傳輸關鍵技術,設計了網路通信平臺的程序結構;服務端設計和實現研究了服務端的工作原,論述了數據庫流量控制和優先級調度、數據緩沖及安全數據庫支持等關鍵技術,設計了服務端的程序結構;客戶端設計和實現研究了客戶端的工作原,設計了客戶端的程序結構和組件介面。
  19. If each accessing to global view must be translated into accessing to ldb, the cost will be very expensive. so there are materialized views in most multidatabase

    如果每一次對全局視圖的都要轉換為對底層數據庫的價是很昂貴的,所以多庫系統中一般都保持一個物的全局視圖。
  20. Several problems may arise when applications contain a mixture of data access code, business logic code, and presentation code. the traditional development mode can n ' t fulfill the need of web applications rapidly growing

    傳統的開發模式將數據碼、邏輯處碼和表示碼相互混合,帶來了諸多題,已經不能滿足web應用快速發展的需要。
分享友人