訪問節點 的英文怎麼說

中文拼音 [fǎngwènjiédiǎn]
訪問節點 英文
an acce node
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 節構詞成分。
  • : Ⅰ名詞1 (液體的小滴) drop (of liquid) 2 (細小的痕跡) spot; dot; speck 3 (漢字的筆畫「、」)...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 節點 : [電學] panel point; hybrid; packing; node; nodal points; joint of framework; pitch point; point pitch
  1. This represents a nonuniform memory access numa node

    它代表非一致性內存( numa )
  2. Attribute expands access to a site - map node beyond the level of access that url authorization and file authorization grant. the following code example sets the

    屬性擴展了對站地圖,使其超出了url授權和文件授權所準許的級別。
  3. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  4. Source control this node provides access to the team project source control management hierarchy

    源代碼管理通過此,可團隊項目的源代碼管理層次結構。
  5. Method, it won t take the results of visiting the subnodes

    方法不同,它不接受的結果。
  6. Controls whether or not the nodes within the hierarchical collection of labeled items are accessible

    控制標記項的分層集合內的是否可
  7. In order to save the energy and based on the protocol of ieee 802. 15. 4, we add a timer to maintain the physical and mac layer automatically. our mac protocol can sleep and listen circularly to satisfy the goal of energy saving. in the consideration of the design the software of layers of network and application, we bring forward an idea to fulfill the function of routing and data fusion

    在設計過程中,本文首先基於ieee802 . 15 . 4標準,對物理層和mac層需要符合的標準的ieee802 . 15 . 4協議增加了定時器的自動維護工作,從而形成了我們自己的物理層、 mac層協議,解決了的媒體和定時休眠、監聽控制,達到了能的目的;本文在網路層和應用層協議設計中,提出了路由表維護和數據融合的思想,並進行了設計的實現。
  8. One of the most important events in the history of the development of tv technologies is the implementation of digital compression technology, which leads tv industry into a new rapidly developing stage. with satellite, cable and terrestrial transmission channels, dvb, of which the digital compression is the core technology, has such features as two - way channels, interactive functions, etc. in dvb system, the information of video, audio and text is digitalized and integrated to form a new kind of tv program. furthermore, through online digital information broadcasting, people can browse information of other programs while watching several programs just as they have done on the internet

    電視技術發展史上最重要的里程碑是數字壓縮技術的廣泛應用,它將電視事業帶入一個新的高速發展時期,以數字壓縮為核心技術的數字電視廣播通過衛星有線和地面傳輸具有多功能雙向傳輸交互性等特,不僅將圖像聲音和文字等信息數字化,而且將有關信息相互鏈接並有機地結合在一起形成了新的目形態,特別是其採用了數字信息在線廣播方式,觀眾在收看到多套目的同時還可以像網際網路那樣瀏覽其它目信息。
  9. With the constant development of the enterprise information system, more and more users need a lot of different data which construct the database visiting and deal with different network nodes at the same time, hope shielding no. each different to construct characteristic, they know physics database the distributions of systems, know physics the structures of databases form, oneself need n ' t go and carry on data change and gather with the result, only need to inquire about and can receive a result of synthesizing through simple and convenient the overall situation

    隨著企業信息系統的不斷發展,越來越多的用戶需要同時和處理不同網路的多個異構數據庫的數據,希望屏蔽各個層次的異構特性,他們不必知道各個物理數據庫系統的分佈,也不必知道各個物理數據庫的結構組成,不必自己去進行數據轉換和結果匯總,只需通過簡便的全局查詢便可得到一個綜合結果。
  10. The everything - is - a - node abstraction loses some value because of the number of node types that exist, and because of the lack of uniformity present in their access methods

    由於存在的類型數量及其方法缺乏一致性, 「一切都是」的抽象喪失了一些意義。
  11. In the paper, the engendering and development, business flow and function of logistics distribution are analyzed, that logistics distribution is important link and assurance of realizing e - commerce are analyzed, the problems existed in e - commerce logistics distribution in china is put forward by the actuality of e - commerce logistics distribution in china, and the above study establish the basement of later study. logistics distribution ' s demand to e - commerce, the feature of e - commerce logistics distribution, the way of reducing cost of e - commerce logistics distribution, actuality of the mode of e - commerce logistics distribution in china are analyzed, and the mode of e - commerce logistics distribution in china is put forward ; by selectively studying the theory and method of logistics distribution and studying the principle and method of dividing the group of places, the model logistics distribution allowing visiting repeated of multiple places is established, the model is used to solve rational distribution sequence to reach lest cost to allowing visiting repeatedly, and an actual example is taken. the model logistics distribution in emergency has been established on the base of studying the necessity of logistics distribution in emergency in logistics distribution center

    本文分析了物流配送的產生和發展、物流配送的業務流程和功能及物流配送是實現電子商務的重要環和保證,並結合我國電子商務物流配送現狀,指出了我國電子商務物流配送存在的題,為進一步研究奠定了基礎;分析了電子商務對物流配送的要求、電子商務物流配送的特徵和降低物流配送成本的途徑,並結合我國電子商務物流配送模式實際,提出了我國電子商務物流配送模式構想;通過對電子商務物流配送理論方法選擇研究,在站群的劃分原則和方法的基礎上,建立了多站可以重復的物流配送模型,運用該模型,可以求解合理的配送次序,使可以重復時配送費用最少,並列舉了實例;通過研究緊急情況下物流配送的必要性,建立了緊急情況下的物流配送模型,運用該模型,可以解決配送中心在缺貨的情況下,選擇合理的供貨及運輸方式的題,使供貨時間最短、供貨費用最少,並列舉了實例、編制了相應的軟體。
  12. Based on the analysis of above drawbacks, this paper proposes frequent access pattern tree algorithm ( fapt ). this algorithm includes two steps : access pattern tree method, through the pattern matching method it saves user ' s visit sequences with tree ; pruning method, it uses frequent degree to prune access pattern tree which is under the frequent degree

    在分析以上不足的基礎上,提出了頻繁模式樹( fapt )演算法,該演算法包括以下兩個步驟:模式樹的生成,通過模式匹配的方法將用戶序列以樹形結構來存儲;修剪的策略,利用頻繁度對模式樹進行修剪,修剪掉其中低於頻繁度的
  13. An ejb client will also need access to the orb listener port for the node agent

    Ejb客戶機還需要訪問節點代理( node agent )的orb監聽器埠:
  14. Each line in the image represents a node, the number of times a search bot visited the node determines the length of the line

    圖像中的每根線代表一個,爬蟲訪問節點的次數決定了線的長度。
  15. However, if a worker running on node n1 needs to access a database page that is already in node n2 s memory, it accesses the non - local memory

    但是,如果n1上運行的工作線程需要訪問節點n2內存中的數據庫頁,則表示它要非本地內存。
  16. We can get information of related websites and hot - spots by mining network log files and apply mined knowledge on instructing the operation of chord network to improve network performance

    通過對網路日誌的挖掘,獲取關聯網路信息和過熱信息等,並利用挖掘出來的知識指導chord網路的運行,從而改進網路性能。
  17. Node medium access control sublayer

    媒體控制子層
  18. Second, i analysed the survey questionnaires at the visual angle of instructional management and the management of moral education, management of school social work, management of educational research in the level of management of educational routine

    而所有的關題,我都配置了座談的方法,以期對題的深層原因及其對策有所把握,謂之「面與結合」的方法。
  19. Examples of installation scenarios involving the use of separate computers include a production report environment that deploys report servers on cluster nodes, a development organization that has multiple report designer clients connected to a single report server instance, or a workgroup report server that uses for its internal data storage a remote sql server instance available to all employee groups in the organization

    涉及使用不同計算機的安裝方案的示例包括:在群集上部署報表服務器的生產報表環境,有多個報表設計器客戶端連接到單個報表服務器實例的開發機構,或使用可由機構中所有雇員組的遠程sql server實例來存儲其內部數據的工作組報表服務器。
  20. 2. turn off the cluster - disk unit ( the unit containing the disks that are accessed by cluster nodes )

    2 .關閉群集磁盤單元(該單元含有群集的磁盤) 。
分享友人