虛址 的英文怎麼說

中文拼音 [zhǐ]
虛址 英文
virtual addressing
  • : Ⅰ名詞1 (空虛) void; emptiness 2 (政治思想等方面的道理) guiding principles; theory 3 (二十八...
  • : 名詞(建築物的位置; 地基) location; site; ground; foundation
  1. Whereas those intent on fraud will use false addresses, vacant lots, or temporary box numbers, unintentional skippers can be traced, billed, and subsequently collected from if an accurate address is on file

    雖然那些故意欺騙者會使用假住、空白地,或臨時郵箱號碼,對于非故意的跑單者,一旦檔案中有確切地,就可以進行追查、郵寄賬單,並可隨后前去收款。
  2. Further investigation showed that the information contained in the insurance application forms were false, such as false working address, home address and stated salary

    其後調查顯示,該批保單申請表上載有假的資料,例如假工作地、住及薪金。
  3. Finaiiy, the paper also has introduced the virtua1 worid of windows rs ; j { ? # - - lase / and how to map the 1ogica1 address to physica1 address in protected mode and the interrupt mechanism of protected mode, then the paper has i11ustrated that it is necessary to write virtua1 device driver ( vxd ) in order to access hardware device from the third leve1

    最後,在介紹了windows的擬世界,和在保護模式下如何將邏輯地映射成物理地,以及保護模式下的中斷機制的基礎上,闡明了在保護模式下應用程序對硬體設備操作驅動程序的必需的中間橋梁作用。
  4. An attacking node can personate other nodes through replaying their binding messages, changing the address field to provide wrong return address, and achieving dos ( denial of service ) attack by replaying binding messages

    攻擊節點可以通過重放節點綁定信息的形式來冒充此節點;通過修改綁定消息中的地部分來提供假地;還可以通過大量重放監聽到的綁定消息進行拒絕服務攻擊。
  5. To associate an absolute address, virtual address or device identifier with a symbolic address or label in a computer program

    在計算機程序中,將絕對地擬地或設備標識符與符號地或標號聯系起來。
  6. The assigning of a value or referent to an identifier ; for example, the assigning of a value to a parameter or the assigning of an absolute address, virtual address, or device identifier to a symbolic address or label in a computer program

    把一個值或指定的對象賦給某一標識符,例如,把一個值賦給一個參數或把一絕對地擬地或設備標識符分配給計算機程序中的符號地或標號。
  7. Because the location and the agent lose their basic function, ec with the characteristics of non - document greatly challenges the existing tax law institutions, which mainly regulate the dealing of the tangible merchandise and establish the tax jurisdiction on the basis of territoriality

    電子商務由於其無化、非書面化、非中介化、擬化等特點給針對有形商品制定的、並以屬地原則為基礎進行管轄,通過常設機構、居住地等概念把納稅義務同納稅人聯系起來而建立的現行稅收法律制度帶來了巨大的沖擊。
  8. Reads data from the specified virtual memory address

    從指定的擬內存地讀取數據。
  9. Security, too, is a key issue for switching the traditional private nforork to vpn. security of mpls wn architectur is analyzed thorouguy in this thesis, including septheion of address space and route, hiding of the mpls core smicture, resistance of attacks, impossibi1ity of 1abe1 spoofing

    安全性是擬專用網能否取代傳統專用網的關鍵,本文對mplsvpn體系結構的安全性進行了深入分析,包括地空間和路由的隔離、隱藏mpls核心結構、抵抗攻擊、抵抗標記欺騙等,從而得出mplsvpn與atm framerelay具有相同安全級別的結論。
  10. For installing from an ls - 120 drive atapi version with a set of floppies, you need to specify the virtual location for the floppy device

    要想在ls - 120驅動器atapi版本使用這些軟盤,您需指定這些軟盤設備的擬地
  11. Abstract : the continually increase in digitized information resour ces such as disc publications and on - line databases, which put forward new task s for the collection construction of library, requires that the libraries of coll eges and universities shoud reestablish the new purchase criteria for the collec tion of library and incerase the devoted proportion of the digitized information resources. directed by the new purchase criteria, the libraries should optimize t heir local collection and take full advantage of the virtual collection in compu ter network and collect and manage more efficiently the importand collection re sources in network era, network addresses and digitized publications

    文摘:光盤出版物、聯機數據庫等數字化信息資源的不斷增長,給圖書館的館藏建設提出了新的任務.這就要求高校圖書館必須重新制定館藏采購標準,適當加大數字化信息資源的投入比例,並在新的采購標準指導下,不斷優化本地館藏,充分利用計算機網路上的擬館藏,同時做好網路時代圖書館的重要館藏資源? ?網及數字化出版物的收集與管理工作
  12. Adopting the method of top - down, the virtual memory is divided into memory mange related unit ( segment unit and page unit ) and protection mode related unit ( protection test unit, debug test unit and exception detect unit ). data buses and control bused are designed separately for all of the units. vhdl codes are written and simulated

    Amex86的擬存儲器採用自頂向下的設計方法,把擬存儲器劃分為地管理相關單元(又包括分段單元和分頁單元) 、保護模式相關單元(又包括保護測試單元、調試異常單元利異常檢測單元等) ,分別確立其數據通路和控制通路,完成了vhdl的編碼和模擬工作,通過測試程序模擬驗證了其功能的正確性並測定了基本性能。
  13. Code instructions address data using the virtual address ; the memory management unit ( mmu ) is responsible for the translation of the virtual address to the physical ram address

    代碼指令使用了擬的地;內存管理單元( mmu )負責把轉換成實際的物理ram地
  14. The paper elaborates risc technology characteristic and 5 - stage pipeline architecture and function of the 64 - bit risc cpu, and dwells on 64 - bit vega cpu characteristic, and details the eda technology and the main flow of asic design, and elaborates the operation and exception process of the vega cpu and virtual instruction address " architecture and generation, and details cache architecture and mmu. the master dissertation dwells on virtual address translating into physical address, instruction cache finding address and instruction fetching, too

    詳細的闡述了64位vegacpu的特點,闡述了eda技術和asic設計的主要流程,闡述了vegacpu流水線結構、流水線操作、流水線暫停和異常處理,擬指令地的結構和產生, mmu結構,包括指令tlb結構和擬指令地向物理指令地的生成流程, cache結構,尋原理和指令的寫策略,指令高速緩存的尋原理和結構,以及指令的獲取流程。
  15. When this method returns, this parameter contains the disk address of the virtual root directory

    此方法返回時,此參數包含擬根目錄的磁盤地
  16. Memory management unit, translates virtual to physical addresses and provides access permission control

    內存管理單位,把轉化為物理地並且提供訪問許可控制。
  17. The paintings described foundation circumstances which mostly demonstrated the clear feng shui pattern ; in each kind of foundation circumstances, the architectures base construction pattern, complied with the nature. the management system in courtyard circumstances and indoor circumstances were already mature, and its factors were quite complete. by using the technique of seeing small from big view, the paintings built pot which contained the wide world

    所描繪的建築基環境大多顯示出清晰的風水格局;而在各種基環境中,建築的布局、立基又通過各種營構模式,順應自然,因形就勢,值景而造,庭園環境和室內環境的經營體系已經成熟,經營要素相當完備,運用以大觀小的手法,營造出萬物皆備的壺中天地;加之建築本體敞、開放的形態特徵,善於借納自然風景,使整個建築及其環境達到了物我一體的深邃意境。
  18. In this thesis, first, we present the theory of sess system, the generation of the sess spreading code and its characteristics and the acquisition theory of conventional spread spectrum communication system. an efficient acquisition scheme based on periodically transmitting the synchronization head, which is composed of binary chaotic codes, using the matched filter and automatic decision threshold - level control based on a so - called constant false alarm criterion for sess system is present. the acquisition model of sess system is built and simulated in the awgn channel, the raleigh fading channel and imulti - address interfere condition

    本文首先概述了自編碼擴頻通信的原理、自編碼擴頻序列的產生方法及其特性和擴頻通信系統編碼同步的理論,然後針對自編碼擴頻通信系統提出了擴頻序列捕獲方案:周期性地加入混沌序列同步碼,並採用恆警率匹配濾波器捕獲法;在加性白高斯噪聲通道、瑞利衰落通道和多干擾情況下進行了模擬,分析了各種捕獲性能:在選擇性能最優的混沌序列、適當的序列長度、警概率及門限值的情況下,可以獲得較短的捕獲時間和較大的捕獲概率。
  19. The " virtual heritage explorer " project provides 360 - degree cubical panorama for about 60 historic buildings and sites. you can explore the real - like monuments through this website,

    古物古跡辦事處推出擬文物探索計劃,為大約60處歷史建築物及遺提供360度立體全景影象。
  20. Virtual schools seek to raise awareness and build credibility, and also to address issues related to perceptions of their competition with other education methods

    擬學校選擇提高知名度和建立可信度,也用其它教育方法去聯系他們競爭的地的問題。
分享友人