棧方式 的英文怎麼說

中文拼音 [zhànfāngshì]
棧方式 英文
stack mode
  • : 名詞1 (養牲畜的柵欄) shed; pen 2 (棧道) a plank road built on sides of cliffs for army3 (棧...
  • : Ⅰ名詞1 (方形; 方體) square 2 [數學] (乘方) involution; power 3 (方向) direction 4 (方面) ...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • 方式 : way; fashion; pattern
  1. For the short of the hardware resources such as ram, the embedded system could not support the full of tcp / ip protocol and it must expurgate the tcp / ip protocol according to different network application

    因此,必須針對不同的網路應用對協議進行刪減,保留其基本功能,以滿足網路應用的需要。嵌入tcp / ip的實現有硬體固化和軟體兩種
  2. We discuss the formation of the unidirectional links and their influence on the manet routing protocols such as dsr, dsdv, aodv. solutions are given to overcom e the problems, we analyze some of they and point out their limitations. in the third part, we show a new on - demand routing strategy supported unidirectional links, it use the two circuits route search algorithms to establish the route from the source node to the destination and backward with directions ; it transfer the route error messages from the backward positions to the forward positions one by one ; it apply the packet encapsulation technique to forward the packets through the unidirectional links and introduced the circuit path to transmit information from the forward node to the backward node

    接著,指出在移動自組網環境中,單向鏈路的普遍存在,分析了它的產生原因、它對目前協議的影響;然後,我們給出了一種按需路由的自組網單向鏈路路由演算法,它只有在需要路徑的時候才維護路由,使用二循環路由尋徑演算法以建立節點間的路徑,使用逐跳逆向傳遞的報告路由終斷,使用封裝廣播的沿單向鏈路正向傳輸,使用報文封裝支持單向鏈路下游節點向上游節點傳遞信息。
  3. This thesis has introduced the development of the traditional wireless sensor network and current situation at first, then analyzed the principle an framework of the wireless sensor network, and the challenge to the traditional wireless sensor network technology for environmental monitoring, put forward the novel environmental monitoring system based on wireless sensor network technology, have recommended a kind of brand - new wireless node design plan of framework of wireless sensor network and node hardware to be designed and realized, then based on ieee 802. 15. 4 standard, this thesis analysed the design faces the wireless communication protocol stack used in environmental monitoring, have introduced the realize of physics layer, data chain layer, network layer, application layer. have solved the wireless sensor network data sampling, systematic energy - conservation optimize, this thesis summarized the preceding work finally, have looked forward to the development, application and commoditization in the future

    本文首先介紹了傳統無線傳感器網路的發展概況及現狀,然後分析了無線傳感器網路的原理與架構及其在環境監測對傳統無線傳感器網路技術的挑戰,接著本文提出了新穎的基於無線傳感器網路技術的環境監測系統架構設計,介紹了一種針對大氣環境監測的全新的無線傳感器網路節點的構架設計案以及節點的硬體設計和實現,然後本文以ieee802 . 15 . 4標準為基礎分析設計了面向環境監測應用的無線通信網路協議,從工程角度介紹了物理層、數據鏈路層、網路層、應用層的設計實現,解決了無線傳感器網路節點的數據採集、節點互聯以及系統節能優化等問題,最後本文總結了前面的工作,展望了基於無線傳感器網路技術的環境監測系統在未來的發展向和應用等幾個面的發展遠景。
  4. This is the best way to preserve the exception call stack

    這是保留異常調用堆的最佳
  5. The combination of proxy mode and redirected mode is adopted in the commercial sip server system based on the sip stack

    基於這個sip協議實現了具有商用價值的sip服務器系統,採用了代理服務器模和重定向模相結合的
  6. Referring to some commonly used methods of implementation, this thesis adopts a method, which is inserting the ipsec processing module into linux protocol stack. esp of tunnel mode is implemented, and this implementation can be applied to security gateway

    參照常用的ipsec協議的實現,本論文採用了一種在linux網路協議插入ipsec處理模塊的,並對通道模下的esp協議作了實現。
  7. Firstly, h. 323 protocol ? he recommendation that describes how to provide multimedia communication services over packet - based networks is introducesd in this article. the structure of protocol stack and the components of the h. 323 system are mainly discussed

    323協議,包括協議的功能特點、協議結構以及協議描述的通信控制過程,從組成結構和工作上研究了遵循h
  8. Stacksize ( cchar ) counts the number of device objects starting from this one and descending all the way to the pdo

    大小( cchar )計算從這個開始的設備對象數,並且降序所有pdo
  9. The thesis is mainly concerns about : ( 1 ) this paper discusses the protocol stack of voice over ip. the function, address format, the mode of call request and response, sip module and correlative protocol are introduced

    本文的內容主要包括: ( 1 )從ip電話的協議出發,介紹了sip的功能特點、地址格、呼叫及響應、 sip組件以及相關協議。
  10. After analysing the codes of tcp / ip protocol stack under rtlinux, a new protocol is added into the stack, in which the network nodes are divided into two parts : a master node and a number of controlled nodes. each controlled node can transmit its data by ethernet only when the master send it a request in a fixed timeslot of a communication cycle

    本文在對rtlinux平臺的tcp / ip協議的原碼進行研究分析后,在其原有的協議中加入了一種新的協議rcp ( real - timecontrolprotocol ) , rcp協議採用主/從模,在固定的傳輸周期中使用分時槽的對數據傳輸進行限制。
  11. The experience of a private onsen in luxurious settings will offer you a glimpse of the historic lifestyles of the daimyo lords of the regions and it s entourage travelling the countryside, from ryokan to ryokan, in earlier days of japan

    這私人獨立的豪華溫泉設施將讓您有機會品嘗早期日本歷史諸侯地君主和他們的隨從在鄉區旅遊時從一個客到另一個客的生活
  12. It illustrates the construction & function of hardware, the driving method of ethernet interface chip, and analyzes the construction of embedded tcp / ip protocol, the content of each protocol, and each function module and programming details with flow chartsat the same time, a kind of graphical programming language lab view is introduced it makes network virtual devices and remote control possible

    接著詳細介紹了本案中瘦服務器的硬體構成、以太網介面晶元的驅動,著重分析和闡述了嵌入tcp ip協議的構成、每個協議的內容、實現這些協議的各個程序模塊以及其中關鍵的編程細節等,並配有相關的程序流程圖加以詳細說明。
  13. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議本身帶來的安全問題、當前主要的網路攻擊法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  14. This paper mostly expatiates tcp / ip protocol stack system as well as the data _ transmission manner on the network. it introduces program principle of socket of exploitation entironment of windows sockets network communications program : software entironment is operating system of windows 98 either windows nt because they all sustain windows sockets api

    本文主要講述了tcp ip協議堆的體系以及它在網路上傳送數據的,介紹socket (套接字)的編程原理, windowssockets網路通信程序的開發環境:軟體環境即為所採用的操作系統,可以是windows98 ,也可以是windowsnt ,因為它們都支持windowssocketsapi 。
  15. In the " something went horribly wrong " category, the motivation is simply to recognize the fact that no caller is going to effectively handle this exception, so it might as well get propagated all the way up the stack with the minimum of impact on the intervening code and minimize the chance of exception swallowing

    在「發生某種可怕錯誤」的類別中,其動機是簡單地認識到沒有調用者能夠有效地處理該異常,因此它也可能以各種沿著向上擴散而對于中間代碼的影響保持最小(並且最小化異常淹沒的可能性) 。
  16. Perhaps it s inevitable as you move up the processing stack that different groups of companies will want to solve these types of problems in their own way - leading to more choices like these look at ws - rf verses ws - transfer as another example

    可能這是不可避免的,因為您要提升處理堆,公司的不同組織將希望通過他們自己的來解決這類問題- -導致像這些這樣的更多選擇(考慮ws - rf verses ws - transfer作為另一個實例) 。
  17. The way the msil instruction pushes operand onto the stack

    Msil指令將操作數推到堆上的
  18. How the microsoft intermediate language msil instruction pushes operand onto the stack

    Microsoft中間語言( msil )指令將操作數推到堆上的
  19. The rpc binding style uses the names of the method and its parameters to generate structures that represent a method s call stack, so it makes the web services look like a single logical component with encapsulated objects, all handled in the soap rpc stack

    Rpc綁定採用法名稱和參數來產生代表法調用堆的結構,因此,它使web服務看起來像一個帶有封裝對象的單一的邏輯組件,所有操作都在soap rpc堆中處理。
  20. It is extremely difficult to programmatically handle a stack overflow

    以編程處理堆溢出極為困難。
分享友人