file access method 中文意思是什麼

file access method 解釋
文件存取方式
  • file : n 1 紙夾,文件夾。2 釘成冊的文件,檔案,卷宗,案卷,合訂本。3 【計算機】外存貯器,存貯帶。4 行列...
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • method : n 1 方法,方式;順序。2 (思想、言談上的)條理,規律,秩序。3 【生物學】分類法。4 〈M 〉【戲劇】...
  1. The controlling system of laser marking for bearings is a improvement of traditional pc software controlling method. this system is implemented in visual c + +. in this system, we designed users interface, database, marking controlling, single file marking and et cetera modules, we save the marking record resort using mfc dao class to link access database

    本文介紹的軸承專用激光打標控制系統是對傳統微機軟體控制方式的改進,整個系統採用visualc + +實現,設計了用戶界面,數據庫、打標控制、單文件打標等模塊,並使用mfcdao類連接access數據庫保存打標記錄。
  2. Aimed at tdrms ' s specialty, a storage system design method based on sequential access media is proposed, then an algorithm used for speech data file query is proposed too

    針對電話錄音監控系統應用的特點,提出了一種基於順序存儲介質磁帶的電話語音數據存儲系統設計方法,並給出了在該系統下進行語音數據文件查詢的演算法。
  3. After strict formal analysis with ban logic, the result have proved that the authentication protocol is secure. the improved access control scheme is realized by the mode of single - key - lock - pair. under new access control scheme, user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees, and the possibility of overflow problem is significantly reduced by our new method

    作為對原雙向認證訪問控制方案的改進,改進后的雙向身份認證協議可以很好的抵抗中間人攻擊和重放攻擊,經過嚴密的ban邏輯形式分析和論證,結果表明該協議是安全的;改進后的訪問控制方案用單鑰-鎖對方案實現,除保持了一般單鑰-鎖對方案的良好動態特性外,在不需要訪問權限遞增假設下,實現了用戶對文件的多種訪問控制權限,並大大減小了溢出問題的發生可能
  4. This might, for example, include a relational database, an indexed sequential access method isam database, a microsoft excel spreadsheet, or a text file

    例如,這可能包括關系數據庫、索引順序訪問方法( isam )數據庫、 microsoft excel電子表格或文本文件。
  5. Method to retrieve the access control list entries for a file

    方法檢索文件的訪問控制列表( acl )項。
  6. The paper is about how to analyze web server ' s log file and the technology used and tries to improve it in the following aspects : ( l ) this paper presents a simple processing model on mining web log based on xml storage and the corresponding solutions used to clean and transform log data. ( 2 ) according to the advantages of xml and the self - structure feature of log data, the paper proposes the novel idea that stores log data in xml form, furthermore it discusses the method and implementation on how to store xml - compliant log data into the database by the medium - grained storage means. ( 3 ) this paper addresses an improved algorithm called ufapa for mining user frequent access path on the basis of the algorithm apriori

    本文研究了web日誌挖掘中的相關技術,在以下幾方面進行了改進: ( 1 )在web日誌挖掘模型的基礎上,對web日誌數據的清洗和轉換提出了相應的解決方法; ( 2 )結合xml的優勢和web日誌數據的半結構化特點,提出用xml存儲日誌數據並探討了xml形式的日誌數據如何以中粒度方法實現在數據庫中存儲的方案; ( 3 )結合用戶訪問路徑的特點以apriori演算法為基礎提出了一種改進的挖掘頻繁訪問路徑的ufapa演算法,介紹了演算法思想及演算法描述。
  7. Isam 是 indexed sequential access method 的 縮寫 。 isam drivers are used to update file formats other than its own

    索引順序訪問方法)它是一種索引機制,用於高效訪問文件中的數據行。
  8. We first put forward the file system of hierarchy structure through an object - oriented programming approach. to deal with great amount of data from geographic information and the need of fast access, we design a kind of professional embedded gis data structure to combine the quad tree storage format and the deploying mode of the file system. this method can implement the fast access for geographic information data

    通過面向對象的程序設計方法提出層次體系架構的文件系統;並針對地理信息數據量大的特點和快速空間存儲的需求,提出了一種將四叉樹存儲格式與文件系統的調度方式相結合的嵌入式gis專用數據結構,實現了地理信息的快速存取。
  9. Method to retrieve the access control list entries for the current file

    方法檢索當前文件的訪問控制列表( acl )項。
分享友人