目標棧 的英文怎麼說

中文拼音 [biāozhàn]
目標棧 英文
goal stack
  • : Ⅰ名詞1 (眼睛) eye 2 (大項中再分的小項) item 3 [生物學] (把同一綱的生物按彼此相似的特徵分為幾...
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : 名詞1 (養牲畜的柵欄) shed; pen 2 (棧道) a plank road built on sides of cliffs for army3 (棧...
  • 目標 : 1. (對象) target; objective 2. (目的) goal; aim; destination
  1. 4 bsd. based on the deep study on ipv6 protocol suit, this article summarizes the working that porting kame ipv6 protocol stack into vxworks, gives the details of relative technicals

    在對ipv6協議族進行深入分析研究的基礎上,本文總結了將一個以bsd系統為的ipv6協議kameipv6移植到嵌入式實時操作系統vxworks中所需進行的工作,給出了其中涉及的技術細節。
  2. This paper addresses how to introduce the corba techologies into the tmn, meanwhile, it also addresses the possible applicatioin of corba in tmn. finally, this paper also introduces the detail design of how to apply a corba middleware tao into alcatel ' s forth generatioin project, using corba as the network management interface between the qaf and nef, the functions in tmn. this paper especially pays attention to the detail design of the netowrk management ' s softweare framework, managed object class and notifciation management, try to find a more elegant design pattern in network management development

    隨著電信網路技術的不斷發展,各種新業務的日新月異,傳統的基於osi協議的電信管理網tmn在開放性,分散式,互操作性和實現的復雜程度上都日漸不能滿足需求,為了解決這樣的問題,國際電信聯盟itu - t將corba技術引入電信管理網中,本文就如何在tmn電信管理網中引入corba技術,引入后的實際設計問題,以及corba技術在tmn中可能的應用做了一定程度的探討,並結合alcatel4g網管子項介紹了如何將基於corba的中間件tao ,應用在網元層網管系統中,作為q介面適配層qaf和網元功能層nef的準管理介面。
  3. The destination address is pushed onto the stack

    地址推送到堆上。
  4. It displays the stack frame for the suspended threads for each target you are debugging

    它為調試中的每個顯示其暫掛線程的堆幀。
  5. The debug view displays the stack frame for the suspended threads for each target you are debugging

    Debug視圖顯示正在調試的每個的暫掛線程的堆框架。
  6. The eclipse debugger displays the stack frame for the suspended threads for each target you are debugging

    Eclipse調試器顯示您調試中各個的暫掛線程的堆幀。
  7. In the third chapter, the graft of tcp / ip in openbsd on psos + and the realization of the internet protocols including pppoe ppp smtp pop3 imap dns dhcp, embedded web server and how to estimate network state used by rtp / rtcp are introduced. in the fourth chapter, firstly h. 261, h. 263 h. 263 + standards and their differences are introduced

    在第三章中闡述了基於ip的網路通信協議的實現,主要是openbsd中的tcp ip協議在psos +上的移植和pppoe 、 ppp 、 smtp 、 imap 、 pop3 、 dns 、 dhcp協議、嵌入式web服務器的實現,然後介紹如何利用rtp rtcp來檢測網路有效帶寬,其中的網路有效帶寬就是在第六章提出的碼率控制演算法中確定幀率的依據之一。
  8. The article highlights the implementation of how to detect the route to an aimed intranet by traceroute, how to determine the operating system by the tcp / ip stacks fingerprints, how to find the users information of the common os, how to realize the port scan by multi - thread, how to find the vulnerabilities of a terminal, and how to control a remote system by the trojan horse

    文章還詳細介紹了如何利用traceroute和源路由的traceroute探測到達網路的路徑;如何利用常規方法和tcp ip協議指紋特徵來識別操作系統類型;如何探測常見操作系統的用戶信息;如何利用多線程實現埠掃描;如何發現系統中與用戶、服務相關的漏洞缺陷;如何利用木馬技術來實現遠程控制等。
  9. Then, it analyzed can and canopen application layer, including : real - time characteristics of can, the core of canopen - od, all kinds of communication objects, the allocation of cob - id and some device profiles. and xcanopen was brought forward for implementing of canopen in power line communication. then, on the reference design platform of freescale - agilent, xcanopen ’ s two standard software interfaces, bottom driver and function of communication and network management based on canopen were implemented

    本文詳細分析了低壓電力線通信數據機的結構與工作原理;分析了can協議及其可以保證數據實時可靠傳輸的實質,剖析了應用層協議canopen ,著重解釋了canopen的核心?對象字典od 、各類通訊對象、識符的分配,以及一些設備子協議( deviceprofiles ) ,並提出了在電力線通信上實現canopen的解決方案? xcanopen框架;在基於freescale - agilent電力線通信的參考設計平臺上實現了xcanopen的兩個準軟體介面,電力線通信底層驅動軟體的設計以及基於canopen協議的節點通信和網路管理功能,達到了使用canopen協議來實現電力線通信的準化模塊的的;最後,在canopen數據通信的實時調度上做了進一步的改進探索研究。
  10. Based on ericsson srtp / mikey library and the project ' s characterizes, the design of both modules has been finished ; the implementation section introduces how to port these protocols to ecos operating system and illustrates it using code walk through. after that i integrate both modules into voip protocol stack, including srtp module ' s integration into rtp module and mikey module ' s integration into sip module. at the end, the paper provides test methods and result analysis of srtp and mikey protocols

    本文中兩個協議模塊設計是在參考了ericssonsrtp / mikey庫的基礎上,根據項的具體情況作了相關的改進完成的;在協議的實現部分則講述了如何將改進后的協議源代碼移植到軟體平臺ecos操作系統之上,並給出了詳細的移植方案和使用示例,最後實現了這兩個協議模塊與voip協議的集成,包括將srtp協議模塊與rtp協議模塊集成以及將mikey協議模塊與sip協議模塊集成。
  11. The goal of this thesis is to give a scheme on the application of wireless sensor network system indoor. first of all, we have a deep research on the ‘ telos ’ node, secondly, we build up a stack system structure of wireless sensor network to monitor the temperature of the building intellectively, design and realize the network stack including physical layer, data link layer, network layer and application layer. finally, we debug the software in order to verify the network layer and the application layer

    本文以智能樓宇溫度監測應用為設計,以em2420射頻晶元和atme128l單片機為設計載體,在詳細研究telos節點方案基礎上,對面向設計的室內無線傳感器網路節點的物理層、數據鏈路層、網路層和應用層之間的網路協議進行了實現性設計,建立了立足設計的無線傳感器網路協議體系,並在avrstudio4 . 11調試環境下對網路層和應用層設計正確性進行了調試驗證。
  12. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  13. The method descriptor is a metadata token that indicates the method to call and the number, type, and order of the arguments that have been placed on the stack to be passed to that method as well as the calling convention to be used

    方法說明符是元數據記,它指示將調用的方法和將被傳遞到該方法的放到堆上的參數的數、類型和順序以及要使用的調用約定。
  14. Secondly, it can detect opened ports on the basis of results of the first port - scan, and get the information of service and version of these opened ports. thirdly, through many kinds of detecting ways, it can get the os - fingerprints of tcp / ip protocol stack of the destination computer, and guess the faraway operation system exactly. at last, taking cve ( common vulnerabilities and exposures ) as the standard, a more practical vulnerability database by combining the structures of two large - scale oversea vulnerability databases is designed

    設計開發的網路漏洞探測系統具有較強的綜合性能,能夠提供多種埠掃描技術,在第一次掃描結果的基礎上對開放的埠進行第二次探測,得到開放的埠的服務和版本信息,通過多種探測方法獲得主機的tcp / ip協議指紋信息、較準確的推測出遠程操作系統,並以cve ( commonvulnerabilitiesandexposures )為準,結合國外兩個大型漏洞數據庫的結構,設計了較實用的漏洞數據庫。
分享友人