訪問等級 的英文怎麼說

中文拼音 [fǎngwènděng]
訪問等級 英文
access level
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ量詞1 (等級) class; grade; rank 2 (種; 類) kind; sort; type Ⅱ形容詞(程度或數量上相同) equa...
  • : Ⅰ名詞1 (等級) level; rank; grade 2 (年級) any of the yearly divisions of a school course; gra...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 等級 : 1 (按質量、程度、地位等的差異而作出的區別) grade; rank 2 (在社會地位和法律地位上不平等的社會集...
  1. It implements web crawling through distributed technology, and builds index database through accidence analyzing chinese characters separating unuseful words deleting etyma extracting index words selecting and lexicon. the level system uses new model of web accessing and level computation to build web level system so that the requirement for computer resources is greatly reduced

    該搜索引擎使用分散式技術實現網頁獲取模塊;通過詞法分析、中文分詞、無用詞匯刪除、詞干提取、索引詞條選擇和詞典技術建立索引數據庫;該搜索引擎的別系統使用了新的網路模型和別計算模型,大大降低了搜索引擎對于計算機資源的要求。
  2. This paper, based on documentation and questionnaire, makes a systematic analysis of the development of our country ' s female triple jump, pole vault and hammer throw

    摘要為了使昔日輝煌的我國女子新興田賽項目重振雄風,運用文獻資料和調查方法,對我國女子三跳遠、撐桿跳高和鏈球運動開展的現狀進行了較為系統的分析。
  3. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性題,尤其是用戶控制的題;接著介紹了幾種浙江大學博士學位論文典型的控制方法,包括強制控制、任意控制、基於角色的控制、基於任務的控制,以及基於公司關系的控制、基於企業聯盟的控制;在前面描述的典型控制模型基礎上,給出了一個網路化製造系統的綜合控制模型,包括網路化製造系統的用戶和資源層次關系圖、控制參考模型和控制過程模型,並定義了各個模型中的相關元素和關系,給出了各約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的控制描述語言。
  4. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主控制、基於bell - lapadula模型多安全規則的強制控制以及基於biba模型的強制控制多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。
  5. Taking managers in enterpri ; e as participants, this research has collected data via interviews, open questions, importance hierai : hical evaluation as well as close questionnaires of the behavior types and of hierarchica evaluativn. forecast analyses and item modification of the questionnaires have been conducted from vari < us angles in terms of factors analyses, test factors analyses, relationship analyses, diligence cst and item analyses to secure a high reliability and validity. then the law of inner factors and he functions on management performa

    本項研究以企業管理者為被試,綜合運用談法、開放性卷法、重要性評定法和封閉式卷法收集資料,編制了典型管理溝通情境下行為反應類目迫選卷和評定卷,並採用探索性因素分析、驗證性因素分析、相關分析、差異檢驗、項目分析多種統計方法,從多角度對卷進行了預測、項目修改,使正式卷取得較好的信度和效度。
  6. These policies govern who has access to this pool based on business priorities business cycle, new product introduction, marketing campaigns, sudden announcements from a competitor, etc.

    這些策略根據業務優先(業務周期、新產品介紹、銷售活動、競爭者的突發事件)控制可以這個資源池的用戶。
  7. The authorization token passed to the forum factory determines with what permissions the rest of the objects in the system will be accessed ; because the administration authorization token is used, all jive objects will be accessed with full permission

    傳遞給論壇工廠的授權令牌決定所創建的對象在系統中的訪問等級;由於利用了管理員授權令牌,因此可以完全所有的jive對象。
  8. As part of standard user - level protections in more advanced operating systems, processes can t directly access devices attached to the computer, such as any hard drives, video cards, and the like, at least without special permission

    作為更高操作系統中的標準用戶保護的一部分,進程至少在沒有特殊許可權的情況下不能直接連接到計算機上的設備,例如,任何硬盤驅動器、顯卡
  9. Pyrex itself gives you access to all the c - level constructs that are most important for speed, while saving you from all the c gotchas of memory allocation and deallocation, pointer arithmetic, prototypes, and so on

    Pyrex本身可以讓您那些對速度至關重要的c代碼,而節省了編寫內存分配、回收、指針運算、函數原型的工作。
  10. To achieve this high degree of shared access, both sites will replicate critical data on local servers

    為了達到這種高的共享,兩個站點需要在本地服務器上對關鍵數據進行復制。
  11. Enterprise information system framework provides a series of reusable groupware, such as persistence layer which introduces dynamic value object 、 value list hander and command pattern, it encapsulates the detail of accessing database and affords the interface of different persistence layer framework ; basing on asynchronous javascript and xml ( ajax for short ), we develops the client validity check engine 、 dynamic cascading menu and common 、 dynamic tree structure groupware, as well as a set of tag library which include query 、 pagination 、 cache an so on. they reduce the code redundancy and predigests the development of interface layer enormously ; the security subsystem which is based on secure socket layer ( ssl for short ) and role - based access control ( rbac for short ) ensures the data security transmission and privilege control. furthermore, the model of enterprise application integration ( eai for short ) which based on web services, it supply some helpful explore for the sake of system integration and data communion for the future

    企業信息系統框架提供了一系列可復用組件,例如採用動態vo 、值列表處理器以及命令模式的持久層組件,封裝了數據庫細節,並為不同的持久層框架提供調用介面;基於ajax ( asynchronousjavascriptandxml )技術的客戶端校驗引擎、動態聯菜單以及通用動態樹型結構組件,一系列查詢、分頁、緩存標簽庫則減少了表示層的代碼冗餘,簡化了表示層開發;基於ssl登錄以及基於角色的控制的安全子系統則初步實現了數據安全傳輸和權限控制;此外基於web服務的企業應用集成模型為今後系統集成、數據共享提供了有益探索。
  12. Websphere information integrator can be used to extend the db2 sql api with transparent access to non - ibm relational databases such as oracle or sql server and materialize non - relational data sources like xml streams, message queues, vsam, ims, and so on as relational tables - thereby truly creating a corporate - wide common data model

    之類的產品來擴展db2 sql api ,使其可以透明地非ibm關系數據庫(例如oracle或sql server ) ,通過該產品還可以將非關系數據源(例如xml流、消息隊列、 vsam 、 ims)物化為關系表從而真正創建一個公司的公共數據模型。
  13. Web service based distributed file service system, which is based on web, xml, and soap and built on hierarchical cache management, distributed mass - storage data management, access control, has a good extensibility, flexibility, reliability and security on the management system of enterprise ' s mass file date

    基於webservice構架的分散式文件服務系統基於web 、 xml和soap技術、以及層次式緩存管理、分散式海量數據管理、控制多項技術,系統實現了企業海量文件數據管理系統對可擴展、柔性、全分佈、可靠、安全幾方面需求的支持。
  14. To satisfy the demand and interests of the readers, the editor of the newspaper has designated special editorial section to feature the latest news of the international renowned sports stars and olympic gold medal winners, including yao ming, liu xiang, yin wei na, tian liang, guo jing jing, etc. the special editorial pages will feature interviews and reports on their lifestyle, thinking, training process and latest achievements, etc. each national star will be featured several times each year

    該報的編輯為應廣大讀者的要求與興趣,獨辟專板欄目報導全國最頂的體壇巨星,包括姚明劉翔刑慧娜田亮郭晶晶全部享有國際名望之體壇名將與所有奧運金牌得主之近況。該專板欄目將及報導66位體壇名將和中國體壇的明日之星之種種生活感想受訓過程和最新突破成績,每位體壇巨星每年將有幾次專欄專報導。
  15. To sum up, there are several innovative researches in this paper as follows : 1. this paper researches on the standard of security operating system. with the features of the embedded system such as resource limit, security safeguard functions of embedded operating sysmtem are defined in terms of b1 level

    文中著重對以下幾個方面進行探索和創新: 1 ) 、研究安全操作系統的安全標準並結合嵌入式系統資源有限特徵,界定了b1安全嵌入式操作系統應提供的安全保障功能; 2 ) 、研究了嵌入式網路安全的重要性及其保護措施,識別出了嵌入式操作系統層面最後一道網路安全門檻,在socket層實現了強制控制。
  16. Abstract : the main points about development of application programs based on visa for vxibus are presented, including addressing an instrument, accessing a message - based device and a register - based device, handling events and errors. some practical programs are presented

    文摘:介紹了利用visa庫進行vxi總線編程的幾個要點,包括儀器的尋址、消息器件的、寄存器器件的、異步事件處理和出錯處理,並給出了示常式序。
  17. Then we propose an xml data access control system which uses extended xpath and user or user group information to define the access object. we describe the architecture, the subject, object, access rules and the different levels of the rules. and we also illustrate the access control process with an example

    在基於xml的數據控制方面,本文提出了一個利用用戶、用戶組數據和擴展后的xpath進行對象描述的xml數據控制方案,對該方案的架構,控制的主體、對象、授權規則和規則進行了詳細的介紹,並給出了應用示例。
  18. In the chapter of component based database access agent, the component criterion for the agent is selected and the component frame of the agent is designed based on the discussion for the component development technology. in the chapter of the platform of network communication, its operational principle is discussed at first, then the program structure of the platform and the key technology of encrypted network transmission is focused. in the chapter of the design and implementation of the server of the agent, the operational principle is researched, the program structure is designed, and the key technologies of database flux control, data buffer, and database security are studied

    基於組件的數據庫代理設計介紹了組件開發技術、數據庫代理的組件標準選擇及數據庫代理的組件框架設計;網路通信平臺設計和實現研究了網路通信平臺的工作原理、實現過程中使用的基本技術,論述了網路加密傳輸關鍵技術,設計了網路通信平臺的程序結構;代理服務端設計和實現研究了代理服務端的工作原理,論述了數據庫流量控制和優先調度、數據緩沖及安全數據庫支持關鍵技術,設計了代理服務端的程序結構;代理客戶端設計和實現研究了代理客戶端的工作原理,設計了代理客戶端的程序結構和組件介面。
  19. The first phase construction of group networking security determined the organizing framework of security management, established integrated security strategy and networking security management system, and solved the problem of uniform defense and concentrated control for the w hole network virus, the security problem of transmission of the ddn special line, and the problem of accessing control of the important networks and networking servers by combining with corresponding security technique, anti - virus technique, firewall technique, invasion detected technique, and risk evaluation technique, etc, and implemented the security defenses for the weakest level ( transmission security of inter - region mainline network ) and kernel level ( multi - lans in first class secret units ) in the system

    集團網路安全一期建設確定了安全管理組織機構、制定了整體安全策略和網路安全管理制度,並結合相應安全技術防病毒技術、防火墻技術、入侵檢測技術、風險評估技術,解決了全網病毒的統一防範集中控管題、 ddn專線上的傳輸安全題、重要網路及網路服務器的控制。實現了系統的最薄弱層(跨地域主幹網路傳輸安全) 、核心層(多個一保密單位局域網)的安全防範。
  20. Third, based on the thorough research of the multilevel security models, integrity models and role - based access control models ( rbac ), a modified blp model ( mblp ) is designed and applied in a secure operating system developed independently. then, a well - integrated model of blp model, clark - wilson model, dte model and rbac models is proposed, leading to a prominent dynamic authorization access control model ( daacm ), which supports diverse security policies, including confidentiality, integrity and authorization

    第三,在深入研究多安全模型、完整性模型、基於角色的授權模型基礎上,首先提出了一個修改blp模型( mblp )的方案,並在一個自主開發的安全操作系統中得到了應用;然後通過將blp模型、 clark - wilson模型、 dte模型、 rbac模型有機地集成應用,提升出一個支持機密性、完整性和授權多安全策略的,可實現動態授權的控制模型( daacm ) 。
分享友人