虛地址 的英文怎麼說

中文拼音 [dezhǐ]
虛地址 英文
virtual address
  • : Ⅰ名詞1 (空虛) void; emptiness 2 (政治思想等方面的道理) guiding principles; theory 3 (二十八...
  • : 名詞(建築物的位置; 地基) location; site; ground; foundation
  1. Whereas those intent on fraud will use false addresses, vacant lots, or temporary box numbers, unintentional skippers can be traced, billed, and subsequently collected from if an accurate address is on file

    雖然那些故意欺騙者會使用假住、空白,或臨時郵箱號碼,對于非故意的跑單者,一旦檔案中有確切,就可以進行追查、郵寄賬單,並可隨后前去收款。
  2. Further investigation showed that the information contained in the insurance application forms were false, such as false working address, home address and stated salary

    其後調查顯示,該批保單申請表上載有假的資料,例如假工作、住及薪金。
  3. Finaiiy, the paper also has introduced the virtua1 worid of windows rs ; j { ? # - - lase / and how to map the 1ogica1 address to physica1 address in protected mode and the interrupt mechanism of protected mode, then the paper has i11ustrated that it is necessary to write virtua1 device driver ( vxd ) in order to access hardware device from the third leve1

    最後,在介紹了windows的擬世界,和在保護模式下如何將邏輯映射成物理,以及保護模式下的中斷機制的基礎上,闡明了在保護模式下應用程序對硬體設備操作驅動程序的必需的中間橋梁作用。
  4. An attacking node can personate other nodes through replaying their binding messages, changing the address field to provide wrong return address, and achieving dos ( denial of service ) attack by replaying binding messages

    攻擊節點可以通過重放節點綁定信息的形式來冒充此節點;通過修改綁定消息中的部分來提供;還可以通過大量重放監聽到的綁定消息進行拒絕服務攻擊。
  5. To associate an absolute address, virtual address or device identifier with a symbolic address or label in a computer program

    在計算機程序中,將絕對或設備標識符與符號或標號聯系起來。
  6. The assigning of a value or referent to an identifier ; for example, the assigning of a value to a parameter or the assigning of an absolute address, virtual address, or device identifier to a symbolic address or label in a computer program

    把一個值或指定的對象賦給某一標識符,例如,把一個值賦給一個參數或把一絕對或設備標識符分配給計算機程序中的符號或標號。
  7. Reads data from the specified virtual memory address

    從指定的擬內存讀取數據。
  8. Security, too, is a key issue for switching the traditional private nforork to vpn. security of mpls wn architectur is analyzed thorouguy in this thesis, including septheion of address space and route, hiding of the mpls core smicture, resistance of attacks, impossibi1ity of 1abe1 spoofing

    安全性是擬專用網能否取代傳統專用網的關鍵,本文對mplsvpn體系結構的安全性進行了深入分析,包括空間和路由的隔離、隱藏mpls核心結構、抵抗攻擊、抵抗標記欺騙等,從而得出mplsvpn與atm framerelay具有相同安全級別的結論。
  9. For installing from an ls - 120 drive atapi version with a set of floppies, you need to specify the virtual location for the floppy device

    要想在ls - 120驅動器atapi版本使用這些軟盤,您需指定這些軟盤設備的
  10. Code instructions address data using the virtual address ; the memory management unit ( mmu ) is responsible for the translation of the virtual address to the physical ram address

    代碼指令使用了擬的;內存管理單元( mmu )負責把虛地址轉換成實際的物理ram
  11. Memory management unit, translates virtual to physical addresses and provides access permission control

    內存管理單位,把虛地址轉化為物理並且提供訪問許可控制。
  12. The cpu control unit transforms a linear address into a physical address automatically

    Cpu會自動把一個虛地址映射成一個物理
  13. Memory map, virtual addresses

    虛地址記憶映像
  14. In the following virtual memory management subsystem design, after analyzing the hardware - software dividing line and cooperation in detail, four key issues of virtual memory manage subsystem design are discussed : the classification of processor operating mode, the partition of virtual space, the access controlling and the design of control coprocessor ( ccop ). a virtual manage subsystem prototype is then presented

    存管理子系統設計的討論中,詳細分析了存管理中軟硬體的分工協作,深入研究並解決了存管理子系統設計的四個核心問題:處理器工作模式分類、虛地址空間劃分、訪問控制和控制協處理器設計,並在此基礎上給出了一個存管理子系統原型。
  15. Virtual address, effective

    有效虛地址
  16. Address, effective virtual

    有效虛地址
  17. Effective virtual address

    有效虛地址
  18. Hence, for all such shared objects, vee - table and virtual functions should have the same virtual addresses in all processes

    因此,對于所有這種共享對象來說,所有進程中的vee - table和函數都應該具有相同的虛地址
  19. Helpfully, a calculation from a linear address to a physical one is quite simple and this will be shown several times in the following chapters

    不過還好把一個虛地址映射成一個物理的過程還算是相當簡單的,在下面的章節里我們會多次展示這些技巧。
  20. In the memory access subsystem design, on the basis of deeply discussing three kernel problems encountered in cache design, this paper presents a li cache model with virtual index and physical tag, using a hardware - based method to solve the synonym problem, and adopting l2 cache " s initiative requesting for the li cache " s snoop service to keep the consistency between li cache and l2 cache, then takes li data cache as an example to illustrate the li cache implementation

    在訪存子系統的設計中,深入研究並解決了cache設計中的三個核心問題:採用虛地址索引、實tag ,用硬體方式解決synonym問題,以l2cache向l1cache主動請求snoop服務的方式實現兩級cache間的一致性。在此基礎上,給出了一個l1d - cache原型。
分享友人