user access 中文意思是什麼

user access 解釋
用戶接入
  • user : n. 1. 使用者,用戶。2. 吸毒成癮者。n. 【法律】(財產等的)使用(權),行使(權),享受(權),享有(權)。
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  1. Security management of corporation lan user access

    企業內部網用戶接入的安全管理
  2. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網路化製造系統的綜合訪問控制模型,包括網路化製造系統的用戶和資源層次關系圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。
  3. Remove the specified directory ( user access privileges permitting ) from the server

    從服務器上刪除指定的目錄,當然了,需要一定的用戶訪問權限。
  4. Create a new directory on the server ( user access privileges permitting ) with the specified name

    在服務器上建立指定名稱的目錄(當然要以用戶訪問權限來決定) 。
  5. Internet security - controls user access to sites or internet, can give different access privileges

    因特網安全-控制訪問站點或網路的用戶,可授予不同的訪問權限。
  6. Through the analysis of the user access characteristics in the net, the " file burst access, fba " and the " server tide access, sta " characteristics are discovered. based on these two characteristics and some existing technology, a file - oriented distributed system " dftp " model is built to solve the problems in the lans. this system is built upon the application level, it is transparent to the end users

    本文重點分析了目前在這類網路中文件下載服務存在的一些問題,並對其自身特點和用戶對文件的訪問特點進行統計分析,提出了「文件的爆發訪問( fileburstaccess , fba ) 」和「服務器的潮汐訪問( servertideaccess , sta ) 」這兩個網路中用戶的基本訪問特點。
  7. This paper proposed a new proxy caching algorithm based on the distribution of user access preference in streaming media

    文章從實際用戶日誌文件的分析出發,利用發現的用戶瀏覽流媒體對象時的行為分佈模型,提出了一種新的視頻流媒體緩存演算法。
  8. First, the user access flow of inrp protocol is discussed. second, the frame architecture of inrp is introduced. third, packet process is the kernel process of inrp and the tag which differs from dns protocol, the dissertation has a deeply discussion here

    我們首先概述了inrp的訪問流程,和dns的主要區別,概述了基於名字路由技術的inrp協議的幾個主要功能模塊,然後對其中幾個主要模塊進行了較深入的研究。
  9. This download updates the. net framework 1. 1 service pack 1 to work correctly with user access control turned on and prevents the user from getting a securityexception with exception message text hook cannot be created

    Net framework 1 . 1 service pack 1 ,可與啟用的使用者存取控制user access control一起正確運作,並防止使用者遇到錯誤訊息為無法建立攔截程序的安全性例外狀況securityexception 。
  10. This system makes people fell convenient in looking for data, try my best to our environment protection. the following problems and related solutions are given in this paper : data structure suitable for web computing multi - user access and concurrent control mechanism in webgis network protocol and intelligent information agent of spatial information spatial information security in web computing environment web integration strategy of spatial information based on metadata architecture of webgis at last, the development trend of webgis is discussed

    通過論文工作提出了以下幾個問題並給出了相應的解決方案適合web計算的數據模型webgis中的多用戶訪問與並發控制機制空間信息的網路計算策略與實施方案及關鍵演算法空間信息的網路傳輸協議與智能空間信息代理web計算環境下的空間信息安全性問題基於metadata的空間信息web集成方案與智能空間搜索引擎webgis體系結構最後,論文對webgis發展趨勢進行了探討。
  11. When user access has been put into the content of the cdn website, the request for field name analysis will be finally processed by the redirected dns

    當用戶訪問加入cdn服務的網站時,域名解析請求將最終由重定向dns負責處理。
  12. User access network management interface specification. v5 management and general part

    用戶接入網網路管理介面規范. v5管理與通用部分
  13. When a web user access our website, the user is deemed to have read, completely understood and agreed to all the contents set forth in our memorandum of agreement

    當使用者使用本飯店網站資料時,即表示已閱讀、了解並同意接受本約定書之所有內容。
  14. All present user access pattern mining tools have some shortcomings, such as slow mining speed, unsuitable anonymous users, complicated usage, inefficiency, low mobility, much mining limitation and so on

    現有的用戶訪問模式挖掘工具都存在一些缺點,如:挖掘速度慢、不適用匿名用戶、使用復雜、效率低、靈活性差、挖掘局限性大等。
  15. Introduces multi - user access, slot alignment and power control, contention resolution. presents the multi - user access method based on cdma employed in the backward link. then we give a brief compare to the m - serial, gold - serial and walsh - serial

    介紹了多址接入技術,討論了接入模式、時隙同步和功率控制、沖突解決的辦法,提出了基於cdma的反向鏈路多用戶接入技術。
  16. Recognition of the underlying relationship between user access and the collective knowledge structures that are the basis for knowledge production indicates the dynamic role of classification in supporting coherence and articulation across heterogeneous contexts

    指認出使用者取用與集體知識結構間的底層關系,是發現有助於凝聚與接合異質脈絡的分類法在知識生產中扮演的動態角色的基礎。
  17. Proximity access enables broadband users to access a nearby cache when they want to access the cache content of a specific stream media service or that deployed by the cdn to a remote node. that is to say, it directs user access to a relatively near cache that operates normally so that the user can be served directly by an edge cache. this allows the saving of bandwidth and alleviation of pressure on the core server as well as the acceleration of the access to medium and high speed stream media

    實現寬帶用戶在訪問特定的一些流媒體服務或者是已經被cdn部署到邊緣節點上的cache內容時,能夠就近訪問cache ,也就是能把用戶的訪問定向到離用戶比較近而且運轉正常的cache上去,由邊緣的cache直接為用戶提供服務,從而做到節省帶寬和減輕對核心服務器的壓力,以及加速對中、高速流媒體的訪問。
  18. The web - managing center for ctc domestic web - managing system includes user access subsystem, core handling subsystem, data controlling subsystem, web subsystem and net management subsystem, satellite interface subsystem and others

    神州天鴻民用網管系統包括陸地用戶接入子系統、核心業務處理子系統、數據管理子系統、 web子系統、系統及網路管理子系統、衛星介面子系統等部分。
  19. We expatiate such primary question as the goal, rules to design adaptive web site and collection of sourse of data for mining. we describe the algorithm and processes of user access pattern, and presents a data preprocessing model

    給出了系統體系結構,闡述了系統實現的目標、設計所遵循的原則和源數據的收集等主要問題描述了系統挖掘用戶訪問模式的過程和演算法。
  20. The dl does not support fine - grained, per user access control

    Dl不支持細粒度的用戶訪問控制。
分享友人