統一內存訪問 的英文怎麼說

中文拼音 [tǒngnèicúnfǎngwèn]
統一內存訪問 英文
uma uniform memory access
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • : 名詞1. (內部; 里頭; 里邊) inner; inside; within 2. (妻子或妻子的親屬) one's wife or her relatives 3. (姓氏) a surname
  • : 動詞1 (存在; 生存) exist; live; survive 2 (儲存; 保存) store; keep 3 (蓄積; 聚集) accumulat...
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • 統一 : 1. (聯成整體) unify; unite; integrate 2. (一致的; 整體的) unified; unitary; centralized
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. Secondly, there are so many same objects managed in the storage manage system and a greate deal of memory is occupied, and in order to access the resources between processes entry management library is presented. thirdly, this paper also researches the ag ( atomic group ) function, then implements an method to deal with the disater recovery in san and ag make users easier to operate than a volume

    另外,針對儲管理系中要保諸多同類信息、佔用大的題,同時考慮到能夠實現進程間的數據,提出,設計並實現了entry管理庫,從而大大降低了的使用量。另外,本文還設計和實現了ag ( atomicgroup )功能,提供了種解決災難恢復的方案,同時相對于單個volume的操作,以組為單位操作,簡化了用戶的操作。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系可能受到的威脅,包括非授權、信息泄漏、拒絕服務和部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源權限、口令應用以及建立備份等;確定系管理員的權力和責任,包括物理安全、系配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;般性的安全防護措施:取控制、標識和認證、完整性控制、密碼技術、防火墻系、審計和恢復、操作系安全、數據庫系安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系安全防範工作給出個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. This scheme integrates universual data accesss technology of microsoft, which plays a more and more important role in three - lay c / s ( client / server ) and uses the technology of ado ( active data access ), adopts the asp script language in display the results and uses stored procedure of sql server in databases design. in the system of b / s, client realizes a high efficient access to the server database through displaying diversified active controls in browser and using ado to access the data source. the disposing of data accures under the database not in the font of this system. this kind of scheme cannot only bring the system a higher real time response, but also decrease data runoff of the networks, lower the possibility that web server becomes bottleneck of the system and make the system more transplantable

    當前的web數據庫技術正處于發展階段,針對這種情況,本文通過分析當前各種流行的web數據庫方案的優缺點,結合在三層次的c / s系中扮演越來越重要的角色的中間件技術,採用了microsoft公司所提出的致數據技術,利用ado控制項,結合當前的asp語言,底層數據庫採用了sqlserver7 . 0的儲過程技術,設計了種自己的web數據庫方案,即在browser / server系當中,客戶端通過顯示在瀏覽器中的各種activex控制項,通過了ado連接數據庫,數據的處理利用了儲在數據庫部執行,實現對後端數據庫的高效,並且這種方案在給系帶來較高的實時響應性能的同時,減少了網路數據流量,降低了web服務器成為系瓶頸的可能性,也增強了系的可移植性。
  4. The thesis analyzes the function and the performance of the directory service, integrating with the directory service demands of urp system platform of huxi branch campus of chongqing university. to make use of openldap to provide the unified memory for various information entities of the urp system, to enable the user inquire and locate resources by analyzing the content of information memory in directory, naming the directory object, expanding the pattern design and the directory structural design and so on, to offer effective access method and to realized transparently access of the information resources

    本文分析研究了目錄服務功用和性能,結合重慶大學虎溪校區urp系平臺的目錄服務需求,利用openldap為urp系中的各種信息實體提供了儲容器,通過對目錄中的信息容分析、目錄對象命名,擴展模式設計、目錄結構設計等,使用戶以簡單方法就可以快速查詢和定位資源,提供有效的手段,實現對信息資源的透明
  5. Further, to avoid serialization problems, the file system is not responsible for serializing this access - the paging file belongs to the vm system, and the vm system is responsible for serializing access to this file ( this eliminates some of the re - entrant locking problems that occur with general file access )

    步,為了避免串列化題,文件系不負責將串列化頁面調度文件屬于虛擬,而虛擬負責把對這個文件的串列化(這消除了出現在常規文件中的重入鎖定題) 。
  6. There are six big problems exist. first, the leaders or the chiefs of enterprises lack of the strategic views, pursue short - term interests excessively, a lot of mistaken ideas exist in training management ; second, system, mechanism and development strategy of management training remain to be perfected and further clarified ; the training is lack of systematical and standardization ; third, the content of courses is outmoded, the way lags behind, the style is blankness, especially lack ability of combination of theory and practice, lack of operating method and technology ; fourth, the system of training effectiveness feedbacks is imperfect, the system of training support is insufficient, which have hindered the transfer of training ; fifth, the individuals who under training have insufficient motivation, also have problems in after training loyalty, and to transfer the obtained knowledge into their work ; sixth, the government institutions do n ' t fulfill it ' s own responsibilities in constructing the system of management training. some training policies and managements even restrict the development of management training

    本論文根據作者的培訓實踐,並參考大量資料,通過觀察、、具體案例分析等闡述了國有企業管理培訓自改革開放( 1979年)以後的發展狀況及新形勢,完成的主要研究工作有:首先,指出了國有企業管理培訓在的六大題,、國有企業經營管理者缺乏戰略眼光,過分追求短期利益,在管理培訓觀念上在許多誤區;二、管理培訓的制度、機制及發展戰略有待進步完善和明確,培訓工作缺乏系化和規范化;三、教學容陳舊,方式落後,風格單,尤其缺少理論聯系實際能力,缺少操作的方法與技術;四、培訓效果反饋體系不健全,培訓支持系不足,阻礙了培訓成果的轉化;五、受訓者個人接受培訓動力不足,培訓后忠誠性不足,缺乏將培訓所獲知識轉化于工作中的動力;六、政府培訓主管部門對構建管理人員培訓體系的作為不足,某些培訓政策及管理制約了企業管理培訓的發展。
  7. Base on these, i do the further research on the entrance for teacher, employment, mobile and salary. the second part, i comment on the present policy for teacher, realize the main problem, analyze the reason, advance some suggestion, according to the framework which was constituted in the first part, analyzing and studying the document, statistics, typical material which was collected in investigation of document, questionnaire and interview

    第二部分,依據第部分所構建的高等師范院校教師政策容的框架,在對文獻調查、卷調查、調查所搜集的有關文獻資料、計數據和典型材料進行綜合分析和研究的基礎上,評述我國現行的高等師范院校教師政策,找出了在的主要題,對造成這些題的原因進行了分析,並結合實際情況提出了相應的政策建議。
  8. In order not to increase the costs of current system, we take advantage of memory compression the idea of memory compression is to hide the disk latencies by storing swapped out page frames in a compressed form, but still in physical memory. on a subsequent page fault, the page can be quickly decompressed and supplied to the application program

    壓縮技術的主要思想是將要換出的頁以壓縮的形式,放在預先分配的中;當系該頁引起缺頁錯時,系從預分配的區中找到壓縮過的該頁,將其解壓縮后即可以供系使用。
  9. In order to improve system performance, a general cache to preserve access control information is built upon split trees inside the secure kernel

    為提高系性能,可以在安全核中創建個以分裂樹為基礎的控制信息通用緩
  10. It becomes more difficult to manage, integrate and share the control system real - time data when we set up the industrial real - time database because of complicated affair between every department and isomeric character of the system. a three - level - structure model and the method to establish database is provided based on corba criterion with its character of being regardless of programming languages, hardware platform and network protocol. a universal real - time database faces multi - system is also set up by learning the distributed criterion, it can realize the request broker, and the application software can visit the database pellucidly ; thus the power station simulation model can be linked with the control system such as infi90, ovation and be made use of the control object, a closed simulation and control experiment system is set up

    在創建工控領域實時數據庫時,企業各部門間的復雜事務及部異構性給實時數據的管理、集成和共享帶來了定的困難,根據corba規范具有語言無關性、平臺無關性和網路協議無關性的特點提出基於分散式計算規范corba的三層體系結構模型及建立與維護實時數據庫的方法和途徑;通過corba規范建立面向多個分散控制系的通用實時數據庫,實現數據代理,使應用軟體可以透明地對實時數據庫進行取、管理;將infi90 、 ovation分散控制系與火電廠模擬機模型進行有效的互連,以全物理過程模擬數學模型為對象,構建了閉環控制模擬實驗研究系,實現數據的高效連通及管理;進而通過基於corba的實時數據庫構建個從火電廠模擬機對象到過程式控制制設備再到sis系的綜合自動化試驗平臺。
  11. Media asset management is a total solution to managing all kinds of media such as video and audio data, text files, figures and tables. it can satisfy the requirement of media asset owner to collect, keep, search, edit and issue various information and it can also provide a simple method of visiting the contents for the media asset user, in order to keep and use media asset high efficiently

    媒體資產管理系個對各種媒體及諸如視音頻資料、文本文件、圖表等媒體容進行管理的總體解決方案,它滿足媒體資產擁有者收集、保、查找、編輯、發布各種信息的需要,為媒體資產的使用者提供容的簡便方法,用以高效地保和利用媒體資產。
  12. Finally, system software exploiture is based on kingview 6. 5 and we used three - dimensional sculpt to simulate locale equipments and realized dynamic simulation, real - time display and memory, historic query, upon or under parameter alarm display, alarm query and historic report forms print, and we can realize internet management and view directly etc. according to industry ethernet setting, firewall ’ s install and high - speed transmission it can satisfy system ’ s security, credibility and real - time in coal mine which is new scada system of mine monitor and control warming system

    最後,利用「組態王」軟體進行系開發,生動的描繪現場設備並動態模擬設備工作,實現實時數據顯示與儲,歷史數據查詢列印,超限或低限報警,報警查詢,同時能實現網權限管理,局域網直接數據等。通過工業以太網路軟體設置和系防火墻的安裝以及高速傳輸質量能使系在實時性、安全性和可靠性等方面滿足煤礦實時監測系應用的要求,該系可以說是新代scada煤礦實時監測監控系
  13. Bbl back - side bus logic. logic for interface to the back - side bus for accesses to the internal unified level two processor cache

    後端總線邏輯。二級處理器緩的後端總線介面邏輯。
  14. The combination of the subtree - based storage model with the document - based to ensure the efficiency and integrality of the data retrieval for all sorts of heterogeneous and context mixed data to the fullest extent ; 2. dynamically branching and merging combined with the data mapping mechanism, supports the xml document efficiently and can improve the operation capability of the system to some extent ; 3. referring to the characteristic of xquery, it presents a new operation language for xml data, xqul, which supports the query operation as well as the update operation on xml ; 4

    本文提出了套較為通用的非結構化信息的nativexml文檔策略和實現方案作為對非結構化信息取機制研究的探索和嘗試,主要包括下列理論及技術: 1 .基於子樹和基於文檔的儲模式相結合,以最大程度保證底層各類形式異構和容混雜的數據取的有效性和完整性; 2 .動態分枝合成技術和數據映像機制的引入,實現對xml文檔的有效支持,並在定程度上提高系處理性能; 3 .結合xquery查詢語言特點,提出種新型xml數據操作語言xqul ,支持xml數據的查詢以及更新操作; 4 .三種索引(文檔索引、結構索引、值索引)的建立,為xml數據提供從站點到文檔,從文檔到元素的多級策略。
分享友人