虛址 的英文怎麼說
中文拼音 [xūzhǐ]
虛址
英文
virtual addressing-
Whereas those intent on fraud will use false addresses, vacant lots, or temporary box numbers, unintentional skippers can be traced, billed, and subsequently collected from if an accurate address is on file
雖然那些故意欺騙者會使用虛假住址、空白地址,或臨時郵箱號碼,對于非故意的跑單者,一旦檔案中有確切地址,就可以進行追查、郵寄賬單,並可隨后前去收款。Further investigation showed that the information contained in the insurance application forms were false, such as false working address, home address and stated salary
其後調查顯示,該批保單申請表上載有虛假的資料,例如假工作地址、住址及薪金。Finaiiy, the paper also has introduced the virtua1 worid of windows rs ; j { ? # - - lase / and how to map the 1ogica1 address to physica1 address in protected mode and the interrupt mechanism of protected mode, then the paper has i11ustrated that it is necessary to write virtua1 device driver ( vxd ) in order to access hardware device from the third leve1
最後,在介紹了windows的虛擬世界,和在保護模式下如何將邏輯地址映射成物理地址,以及保護模式下的中斷機制的基礎上,闡明了在保護模式下應用程序對硬體設備操作驅動程序的必需的中間橋梁作用。An attacking node can personate other nodes through replaying their binding messages, changing the address field to provide wrong return address, and achieving dos ( denial of service ) attack by replaying binding messages
攻擊節點可以通過重放節點綁定信息的形式來冒充此節點;通過修改綁定消息中的地址部分來提供虛假地址;還可以通過大量重放監聽到的綁定消息進行拒絕服務攻擊。To associate an absolute address, virtual address or device identifier with a symbolic address or label in a computer program
在計算機程序中,將絕對地址、虛擬地址或設備標識符與符號地址或標號聯系起來。The assigning of a value or referent to an identifier ; for example, the assigning of a value to a parameter or the assigning of an absolute address, virtual address, or device identifier to a symbolic address or label in a computer program
把一個值或指定的對象賦給某一標識符,例如,把一個值賦給一個參數或把一絕對地址、虛擬地址或設備標識符分配給計算機程序中的符號地址或標號。Because the location and the agent lose their basic function, ec with the characteristics of non - document greatly challenges the existing tax law institutions, which mainly regulate the dealing of the tangible merchandise and establish the tax jurisdiction on the basis of territoriality
電子商務由於其無址化、非書面化、非中介化、虛擬化等特點給針對有形商品制定的、並以屬地原則為基礎進行管轄,通過常設機構、居住地等概念把納稅義務同納稅人聯系起來而建立的現行稅收法律制度帶來了巨大的沖擊。Reads data from the specified virtual memory address
從指定的虛擬內存地址讀取數據。Security, too, is a key issue for switching the traditional private nforork to vpn. security of mpls wn architectur is analyzed thorouguy in this thesis, including septheion of address space and route, hiding of the mpls core smicture, resistance of attacks, impossibi1ity of 1abe1 spoofing
安全性是虛擬專用網能否取代傳統專用網的關鍵,本文對mplsvpn體系結構的安全性進行了深入分析,包括地址空間和路由的隔離、隱藏mpls核心結構、抵抗攻擊、抵抗標記欺騙等,從而得出mplsvpn與atm framerelay具有相同安全級別的結論。For installing from an ls - 120 drive atapi version with a set of floppies, you need to specify the virtual location for the floppy device
要想在ls - 120驅動器atapi版本使用這些軟盤,您需指定這些軟盤設備的虛擬地址。Abstract : the continually increase in digitized information resour ces such as disc publications and on - line databases, which put forward new task s for the collection construction of library, requires that the libraries of coll eges and universities shoud reestablish the new purchase criteria for the collec tion of library and incerase the devoted proportion of the digitized information resources. directed by the new purchase criteria, the libraries should optimize t heir local collection and take full advantage of the virtual collection in compu ter network and collect and manage more efficiently the importand collection re sources in network era, network addresses and digitized publications
文摘:光盤出版物、聯機數據庫等數字化信息資源的不斷增長,給圖書館的館藏建設提出了新的任務.這就要求高校圖書館必須重新制定館藏采購標準,適當加大數字化信息資源的投入比例,並在新的采購標準指導下,不斷優化本地館藏,充分利用計算機網路上的虛擬館藏,同時做好網路時代圖書館的重要館藏資源? ?網址及數字化出版物的收集與管理工作Adopting the method of top - down, the virtual memory is divided into memory mange related unit ( segment unit and page unit ) and protection mode related unit ( protection test unit, debug test unit and exception detect unit ). data buses and control bused are designed separately for all of the units. vhdl codes are written and simulated
Amex86的虛擬存儲器採用自頂向下的設計方法,把虛擬存儲器劃分為地址管理相關單元(又包括分段單元和分頁單元) 、保護模式相關單元(又包括保護測試單元、調試異常單元利異常檢測單元等) ,分別確立其數據通路和控制通路,完成了vhdl的編碼和模擬工作,通過測試程序模擬驗證了其功能的正確性並測定了基本性能。Code instructions address data using the virtual address ; the memory management unit ( mmu ) is responsible for the translation of the virtual address to the physical ram address
代碼指令使用了虛擬的地址;內存管理單元( mmu )負責把虛地址轉換成實際的物理ram地址。The paper elaborates risc technology characteristic and 5 - stage pipeline architecture and function of the 64 - bit risc cpu, and dwells on 64 - bit vega cpu characteristic, and details the eda technology and the main flow of asic design, and elaborates the operation and exception process of the vega cpu and virtual instruction address " architecture and generation, and details cache architecture and mmu. the master dissertation dwells on virtual address translating into physical address, instruction cache finding address and instruction fetching, too
詳細的闡述了64位vegacpu的特點,闡述了eda技術和asic設計的主要流程,闡述了vegacpu流水線結構、流水線操作、流水線暫停和異常處理,虛擬指令地址的結構和產生, mmu結構,包括指令tlb結構和虛擬指令地址向物理指令地址的生成流程, cache結構,尋址原理和指令的寫策略,指令高速緩存的尋址原理和結構,以及指令的獲取流程。When this method returns, this parameter contains the disk address of the virtual root directory
此方法返回時,此參數包含虛擬根目錄的磁盤地址。Memory management unit, translates virtual to physical addresses and provides access permission control
內存管理單位,把虛地址轉化為物理地址並且提供訪問許可控制。The paintings described foundation circumstances which mostly demonstrated the clear feng shui pattern ; in each kind of foundation circumstances, the architectures base construction pattern, complied with the nature. the management system in courtyard circumstances and indoor circumstances were already mature, and its factors were quite complete. by using the technique of seeing small from big view, the paintings built pot which contained the wide world
所描繪的建築基址環境大多顯示出清晰的風水格局;而在各種基址環境中,建築的布局、立基又通過各種營構模式,順應自然,因形就勢,值景而造,庭園環境和室內環境的經營體系已經成熟,經營要素相當完備,運用以大觀小的手法,營造出萬物皆備的壺中天地;加之建築本體虛敞、開放的形態特徵,善於借納自然風景,使整個建築及其環境達到了物我一體的深邃意境。In this thesis, first, we present the theory of sess system, the generation of the sess spreading code and its characteristics and the acquisition theory of conventional spread spectrum communication system. an efficient acquisition scheme based on periodically transmitting the synchronization head, which is composed of binary chaotic codes, using the matched filter and automatic decision threshold - level control based on a so - called constant false alarm criterion for sess system is present. the acquisition model of sess system is built and simulated in the awgn channel, the raleigh fading channel and imulti - address interfere condition
本文首先概述了自編碼擴頻通信的原理、自編碼擴頻序列的產生方法及其特性和擴頻通信系統編碼同步的理論,然後針對自編碼擴頻通信系統提出了擴頻序列捕獲方案:周期性地加入混沌序列同步碼,並採用恆虛警率匹配濾波器捕獲法;在加性白高斯噪聲通道、瑞利衰落通道和多址干擾情況下進行了模擬,分析了各種捕獲性能:在選擇性能最優的混沌序列、適當的序列長度、虛警概率及門限值的情況下,可以獲得較短的捕獲時間和較大的捕獲概率。The " virtual heritage explorer " project provides 360 - degree cubical panorama for about 60 historic buildings and sites. you can explore the real - like monuments through this website,
古物古跡辦事處推出虛擬文物探索計劃,為大約60處歷史建築物及遺址提供360度立體全景影象。Virtual schools seek to raise awareness and build credibility, and also to address issues related to perceptions of their competition with other education methods
虛擬學校選擇提高知名度和建立可信度,也用其它教育方法去聯系他們競爭的地址的問題。分享友人