訪問日誌 的英文怎麼說

中文拼音 [fǎngwènzhì]
訪問日誌 英文
access log
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ名詞1 (太陽) sun 2 (白天) daytime; day 3 (一晝夜; 天) day 4 (泛指某一段時間) time 5 (日...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 日誌 : daily record; journal
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息涉及信息存儲方式、信息權限控制、用戶身份驗證、密碼和管理等諸多題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  2. These modules provide interfaces to be used directly from userspace : raw character access, raw block access, ftl flash transition layer - a type of filesystem used on flash, and jfs or journaled file system - which provides a filesystem directly on the flash rather than emulating a block device

    這些模塊提供從用戶空間直接使用的介面:原始字元、原始塊、 ftl (閃存轉換層, flash transition layer用在閃存上的一種文件系統)和jfs (即文件系統, journaled file system在閃存上直接提供文件系統而不是模擬塊設備) 。
  3. The sql server 2005 database engine sets file access permissions on the physical data and log files of each database to specific accounts

    Sql server 2005數據庫引擎為特定帳戶設置了對每個數據庫中的物理數據和文件的文件權限。
  4. Access to a recovery log is only performed when the exclusive lock is held

    對恢復只有在持有排它鎖定時進行。
  5. Component is configured to access the new event log

    組件將配置為新的事件
  6. You can also use cmp enterprise javabeans to wrap the audit log table and allow users to access information via the dynamic ejb query language

    您也可以使用cmp enterprise javabeans來包裝那些審核表,並允許用戶通過動態的ejb查詢語言來這些信息。
  7. On core service, we implement an access control strategy based on role, digital signature and encryption / decryption of soap message by using usbkey hardware, stateful web service through extending simple object access protocol ( soap ), and a kind of log management based on rank. on transport adaptering, we implement mechanisms for priority - based transmitting and rules - based transmitting, and implement a transport adapter based on http request / response model. finally, on service adaptering, we discuss two service wrapper mechanisms : runtime wrapper mechanism and factory method wrapper mechanism, which can be used to encapsulate difference of various web service containers, and implement a service adapter

    在核心服務方面,通過擴展簡單對象協議( simpleobjectaccessprotocol , soap )實現有狀態的web服務,然後討論了基於角色的控制與基於usbkey盤的soap消息的數字簽名與加密的實現、基於分級的處理模型的實現;在傳輸適配方面,實現了基於優先級和基於規則的消息轉發機制,實現了基於http請求/響應模型的傳輸適配器;在服務適配方面,討論了兩種服務的封裝機制:運行時封裝機制與工廠方法封裝機制,結合這兩種機制並對服務適配器做了實現。
  8. In the process, by interviews and observations and writing research diary, we talk and review repeatedly the questions before and in the process of developing curriculum with teachers there

    在這一過程中,我們通過談、觀察、撰寫研究等,與教師就校本課程開發前、中所遇到的一系列題進行不斷探討與反思。
  9. 2. a data preprocessing method has been used

    提出了一種對web訪問日誌進行預處理的方法。
  10. Studies on web usage data mining

    用戶訪問日誌數據挖掘研究
  11. The web usage mining mines web log records to discover users access patterns of web pages

    Web挖掘是通過分析web訪問日誌來發現用戶web頁面的模式。
  12. For the backup jobs and copy jobs to succeed, they must have access to the log shipping backup folder

    若要使備份作業和復製作業成功,它們必須都能訪問日誌傳送備份文件夾。
  13. Overflowlogpath - specify the location of the logs during a rollforward operation to allow access logs in multiple locations

    Overflowlogpath指定前滾操作中的位置,以便在多個位置訪問日誌
  14. For example, for purposes of this article i created an xml representation of an approximately 1 megabyte apache access logfile

    例如,出於本文目的我創建了一個大約一兆位元組的apache訪問日誌文件的xml表示。
  15. If the log shipping backup location is accessible to the new principal primary server, its backup jobs begin to ship log backups to that location

    如果新的主體/主服務器可以訪問日誌傳送備份位置,則其備份作業將開始向該位置傳送備份。
  16. We can get information of related websites and hot - spots by mining network log files and apply mined knowledge on instructing the operation of chord network to improve network performance

    通過對網路訪問日誌的挖掘,獲取關聯網路節點信息和過熱節點信息等,並利用挖掘出來的知識指導chord網路的運行,從而改進網路性能。
  17. The raw weblog data need to be cleaned, condensed and transformed in order to retrieve and analyze significant and useful information. then the web log records are organized into some transactions or sessions in a database

    通過預處理web訪問日誌,刪除對于web挖掘沒有價值的數據,識別出用戶會話事務,形成用戶會話的數據庫。
  18. 6. make some amendments to the daily logfile system : write the daily logging data to the memory using cache technology, mitigating the problem of dom insufficient space ; avoid logfile overflow by using daily log queue technology ; cope with repulsion problem of data logging and data sending

    6 .對系統做了如下改進:使用cache技術,把數據、寫在內存中,緩解了dom空間不足的題;使用隊列技術避免溢出;實現了發送程序互斥的訪問日誌數據。
  19. 3. base on the theory of embedded database and the requirement of security services, an embedded database is analyzed and realized, which can provide authentication services, access control services and nonrepudiation services

    基於嵌入式數據庫和eiscp對安全服務的需求,設計並實現了包含用戶信息表和訪問日誌表的數據庫,提供身份認證、控制和抗抵賴服務。
  20. Li this part, the thesis first profiles semantic features of each document by employing chinese information processing technology in order to change documents into the form which can be operated with the help of mathematical methods. second, the thesis profiles each user ' s information needs by three ways : 1 ) accepting the information provided by the user himself ; 2 ) watching the user ' s retrieval action ; and 3 ) analyzing web server log. in this module, users are also classified into different categories according to their information needs

    在用戶建模中,系統從三方面獲取用戶信息需求特徵,第一,用戶主動地向系統提供需求信息;第二,系統檢測用戶檢索行為,從用戶檢索詞分析其需求;第三,系統通過分析web訪問日誌,得到用戶的興趣所在及興趣的變化狀況,並進一步利用對用戶文檔內容的分析來追蹤其興趣變化,將用戶興趣同樣表示為興趣特徵向量,聚類相似用戶。
分享友人