進棧過程 的英文怎麼說

中文拼音 [jìnzhànguòchéng]
進棧過程 英文
push procedure
  • : 進構詞成分。
  • : 名詞1 (養牲畜的柵欄) shed; pen 2 (棧道) a plank road built on sides of cliffs for army3 (棧...
  • : 過Ⅰ動詞[口語] (超越) go beyond the limit; undue; excessiveⅡ名詞(姓氏) a surname
  • : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
  • 過程 : process; procedure; transversion; plication; course
  1. This paper studied landlords ' writs in suchou from late ting dynasty to 1930s in the academic institutions of japan and america and reached the conclusion that the landlord system was still popular in the early 1920s with the land bursary system as the main contributing factor

    摘要作者通研究日本及美國學術機構所藏晚清到1930年代蘇州地區的地主文書,包括佃戶名冊、租簿、賦役書、收租者的信函以及地主租收租序的文書,而認為:中國的地主制度至少在1920年代初期仍然具有相當強的生命力,而維持其生命力的一個極重要因素便是「租」制度。
  2. In gt4, it s still at the process level - but we ve done a lot of work recently moving down the stack to allow more operating execution management - the ability to spin up whole stacks as necessary, from the os on up via virtual machines, for workload management

    在gt4中,這個依然在行之中但是我們最近已經開展了大量的工作,允許行更多操作執行的管理可以根據需要為任務負載管理鎖定整個堆,從os到上層(通虛擬機) 。
  3. Also, by examining the nsd file, you can find any core files generated in a domino data directory, and can do a base - level analysis to trace the final stack of calls that were made by the process that died and left behind the core

    此外,通檢查nsd文件,可以找到domino data目錄中生成的任何核心文件,並行基本的分析,以跟蹤死去並遺留下核心文件的所做調用的最終堆
  4. Firstly, this paper makes a detailed study on the field control bus system ( pcs ), including the characters of pcs by comparing fcs and dcs, model networking of pcs and several popular field bus, then put forward a question for discussion combining embeded internet technology and field bus and measure and control networking model based embeded internet technology is constructed. secondly, it studies embeded system including the core of hardware ? mbeded microprocessor and real time operation system. thirdly, the method of realizing embeded internet is discussed for emphasis, and difficulty of ehernet application in industry measure & control system is analysed. an instance of measure & control networking system based embedded ip is given. finally, the author designed a networked remote video surveillance system based embedded web server, c / os - ii is sacled and ported into the embedded microprocessor at89c51. based on the c / os - ii rtos, tcp / ip protocol suite and application program is designed in detail. the system w orks well that improves that the embedded internet technology will be widely used in modern measure & control networking system and has extend values

    本文首先分析了現場總線系統( fcs )與傳統集散控制系統( dcs )相比具有的特點、 fcs的網路體系結構,介紹了幾種流行的現場總線,提出了將嵌入式internet技術結合現場總線構建現代測控網路的課題;在此基礎上,構建了基於嵌入式internet技術的測控網路結構模型;深入研究了嵌入式系統的核心硬體?嵌入式微處理器,通對比普通操作系統,描述了嵌入式實時操作系統的特點;重點研究了實現嵌入式internet的四種實現方法,並分析了以太網在工業測控系統中應用的難點,給出了一個基於嵌入式ip的網路測控系統實例;最後,研究與設計了一個基於嵌入式web服務器的遠網路視頻監控系統,該嵌入式web服務器利用目前成熟的嵌入式實時操作系統c / os - ,通對c / os -行適當的裁剪、修改與移植,在at89c51嵌入式微處理器上實現了tcp / ip協議及應用序,系統的成功運行證明了本文研究成果的有效性,也表明嵌入式internet技術在現代測控網路系統中具有廣闊的應用前景和推廣價值。
  5. Deadlock prevention and surprise dismount handling during this process require heroic efforts, including a mechanism whereby a file system driver can stash a pointer to an automatic variable ( that is, one allocated on the call / return stack ) to be used in deeper layers of recursion within the same thread

    在這個請求宏大結果的時候, (行)死鎖預防和意外卸下處理,包括一個機制,憑借這個機制文件系統驅動可以中斷在相同線中用於深層遞歸的自動變量的指示器(就是說,在調用/返回堆上分配一個) 。
  6. Chapter 3 focused on those key technologies used in hse, such as time synchronization, communication flow control, virtual address management, etc. using finite state machine model, setup and release processes of virtual communication channels provided by hse were particularly studied

    第三章結合hse通信模型,對hse通信的時鐘同步、流量控制、虛擬標識管理等關鍵技術行了深入的研究。通有限狀態機模型,分析了hse通信連接的建立和關閉
  7. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫中,我主要行了如下一些工作: 1深入分析了由tcp ip協議本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制行了實現,並為它編寫測試代碼評估其性能。
  8. Secondly, uses uml to build a general and useful model for h. 323 stack, and divides the stack into several modules under the principle of ooa, and realizes the stack programming with oop language on the base of a cross - platform classes - pwlib. subsequently, fluctuation in video transmission is deeply analyzed and a useful solution is presented. finally, a simulation terminal software is developed on the base of h. 323 stack, then the stack is tested with unit testing and systemic testing

    本文首先對h . 323標準行了概括性的介紹,包括它所定義的實體、協議、通信;用uml和面向對象的思想對h . 323協議行建模;實現了h . 323協議的模塊化劃分,並用跨平臺的pwlib類庫實現了h . 323協議;隨后對會議電視中視頻通信數據網路抖動的消除方法做了深入的研究,並在此基礎上給出了一種有效的解決方案;最後,基於h . 323協議,開發了h . 323模擬終端,並用單元測試、系統測試的方法對協議行了嚴格的測試。
  9. Secondly, it can detect opened ports on the basis of results of the first port - scan, and get the information of service and version of these opened ports. thirdly, through many kinds of detecting ways, it can get the os - fingerprints of tcp / ip protocol stack of the destination computer, and guess the faraway operation system exactly. at last, taking cve ( common vulnerabilities and exposures ) as the standard, a more practical vulnerability database by combining the structures of two large - scale oversea vulnerability databases is designed

    設計開發的網路漏洞探測系統具有較強的綜合性能,能夠提供多種埠掃描技術,在第一次掃描結果的基礎上對開放的埠行第二次探測,得到開放的埠的服務和版本信息,通多種探測方法獲得目標主機的tcp / ip協議指紋信息、較準確的推測出遠操作系統,並以cve ( commonvulnerabilitiesandexposures )為標準,結合國外兩個大型漏洞數據庫的結構,設計了較實用的漏洞數據庫。
分享友人