組全代碼 的英文怎麼說

中文拼音 [quándài]
組全代碼 英文
associative code
  • : Ⅰ名詞1 (由不多的人員組成的單位) group 2 (姓氏) a surname Ⅱ動詞(組織) organize; form Ⅲ量詞(...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  1. Any writing off, restrction, the code will be return after the registration of writing off

    織機構依法注銷、撤消時,應向原發證機關辦理注銷登記,並交回證。
  2. These components are affected because under default security policy mobile code receives partial trust

    因為在默認安策略下移動接收部分信任,所以這些件將受到影響。
  3. This thesis presents a new solution called the smart platform, which better tackles the problems by : 1 ) a runtime environment discovery mechanism which allows a new device to automatically find and join the runtime environment ; 2 ) the loose coupled publish - subscribe inter - module coordination model, which caters for the spontaneous interaction between modules ; 3 ) a global - local two - layer runtime environment structure. the transient failure of the wireless network can be recovered at the local environment layer. the asynchronous nature of the interactions in the < wp = 8 > publish - subscribe model also prevents modules from blocking on the transient network failure ; 4 ) distinguishing two classes of communications with different qos requirements, the message - oriented and the stream - oriented

    本文提出並實現了smartplatform ,其特點是: 1 )運行環境發現機制,使外來計算設備可以自動加入軟體平臺的運行環境; 2 )松耦合的發布/訂閱式模塊間協調機制,模塊間關聯可以自發織; 3 )局部局的兩層運行環境織策略,無線網頻發的暫時故障可以在計算設備的局部運行環境層次被屏蔽掉;同時發布/訂閱模型的異步性也使得模塊不會因網路故障而阻塞; 4 )區分智能空間中的兩類不同的通信需求面向消息的和面向流的,並分別為它們提供了優化的通信層支持; 5 )基於多agent抽象模型,為整合不同應用領域的模塊和遺留提供了有力工具。
  4. Independent software vendors isvs can enforce a set of security demands from within their own code without requiring changes to security policy on the device

    獨立軟體開發商( isv )可以從自己的內強制執行一要求,而不需要更改設備的安策略。
  5. Declaring the security roles references in the code allows the application assembler to link the names of the security roles used in the code to the security roles defined for an assembled application through the security - role elements

    聲明中的安性角色引用允許應用程序的裝人員把中所用安性角色的名稱通過具有安性角色的元素鏈接到已經完成裝的應用程序中定義的安性角色。
  6. Based on the evidence, the common language runtime security manager maps the assembly to a code group based on security policy

    根據證據,公共語言運行庫安管理器基於安策略將程序集映射到
  7. Sca lets you apply qos qualifiers such as transactions, security, and reliable asynchronous invocation to components without requiring programming or changes to the services implementation code

    使用sca ,您無需編程或更改服務實現就可以對件應用qos限定符例如事務安性和可靠的異步調用。
  8. Rules of coding for the representation of organization

    織機構編制規則
  9. Advice of codes pre - assigned to nationwide organizations ( the 1st leaf of the original )

    織機構預賦通知單》 (第1聯、原件) 。
  10. A security policy level comprises a hierarchy of code groups

    策略級別由層次結構成。
  11. Frequently asked questions about microsoft access security for microsoft access versions 2. 0 through 2000

    用於clr集成的安模型將基於用戶的sql server安模型與屬于訪問安模型的clr安模型合在一起。
  12. A world - ready component can be easily localized into different languages for different markets around the world without changing the component s source code

    不用更改球通用件的源就可以將它輕松地本地化為世界各個市場的各種語言。
  13. Security policy is established by the enterprise and the computer s administrator as well as by user policy settings, and determines the set of permissions that is granted to all managed code when executed

    策略是由企業和計算機的管理員以及用戶策略設置建立的,它在執行時確定向所有託管授予的權限
  14. As a result, c2000 compiler can generate a compactly structured intermediate code effectively, which can be executed by c2000 virtual machine efficiently, safely, and stably. thus the problem put forwarded at the beginning of this paper is solved, and the requirement of monitoring configuration software in the support of programming interface is satisfied well

    實際應用表明, c2000編譯器能夠生成結構緊湊的中間,其虛擬機對中間解釋執行時,效率高,運行穩定、可靠、安,解決了一般態軟體中在對用戶編程介面支持方面的問題,很好地滿足了監控態軟體的需求。
  15. In an unsafe code block, it is now possible to declare fixed - size structures with embedded arrays

    在不安塊中,現在可以聲明包含嵌入數的固定大小結構。
  16. Enterprise information system framework provides a series of reusable groupware, such as persistence layer which introduces dynamic value object 、 value list hander and command pattern, it encapsulates the detail of accessing database and affords the interface of different persistence layer framework ; basing on asynchronous javascript and xml ( ajax for short ), we develops the client validity check engine 、 dynamic cascading menu and common 、 dynamic tree structure groupware, as well as a set of tag library which include query 、 pagination 、 cache an so on. they reduce the code redundancy and predigests the development of interface layer enormously ; the security subsystem which is based on secure socket layer ( ssl for short ) and role - based access control ( rbac for short ) ensures the data security transmission and privilege control. furthermore, the model of enterprise application integration ( eai for short ) which based on web services, it supply some helpful explore for the sake of system integration and data communion for the future

    企業信息系統框架提供了一系列可復用件,例如採用動態vo 、值列表處理器以及命令模式的持久層件,封裝了數據庫訪問細節,並為不同的持久層框架提供調用介面;基於ajax ( asynchronousjavascriptandxml )技術的客戶端校驗引擎、動態級聯菜單以及通用動態樹型結構件,一系列查詢、分頁、緩存等標簽庫則減少了表示層的冗餘,簡化了表示層開發;基於ssl登錄以及基於角色的訪問控制的安子系統則初步實現了數據安傳輸和權限控制;此外基於web服務的企業應用集成模型為今後系統集成、數據共享提供了有益探索。
  17. While ocx and vbx had proprietary definitions and components licensed for fee have always dominated that field, web services are based entirely on public standards, and many of the toolkits for this technology are open - sourced

    雖然ocx和vbx擁有所有權定義,並且授權收費的件總是統制著那個領域,然而由於web服務是完基於公共標準的,因此該技術的許多工具包都是開放源的。
  18. Each security policy level has a set of permission sets that can be associated with code groups on that level

    每一安策略級別都有一權限集,它們可以與該級別的關聯。
  19. In some cases, unsafe code may increase an application s performance by removing array bounds checks

    在某些情況下,通過移除數界限檢查,不安可提高應用程序的性能。
  20. The following command lists the code groups in the user security policy configuration file located in

    的用戶安策略配置文件中的
分享友人