訪問約束 的英文怎麼說
中文拼音 [fǎngwènyāoshù]
訪問約束
英文
accessibility constraints- 訪 : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
- 問 : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
- 約 : 約動詞[口語] (用秤稱) weigh
- 束 : Ⅰ動詞1 (捆; 系) bind; tie 2 (控制; 約束)control; restrain Ⅱ量詞(用於捆在一起的東西) bundle;...
- 訪問 : visit; call on; interview; access; addressing; reference to
- 約束 : keep within bounds; restrain; bind; bound; boundage;tie; restraint; restriction; engagement; repr...
-
The comet is not bound and makes but one visit to the solar system.
慧星是不受約束的,只是來訪問一次太陽系。The task planning of imaging satellite is to assign imaging demand to satellites and assign satellite accessing to land stations
衛星任務規劃就是在多種約束條件下預先為各衛星分配成像需求任務;為各地面站分配衛星訪問任務。We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac
本章描述了asp和網路化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網路化製造系統的綜合訪問控制模型,包括網路化製造系統的用戶和資源層次關系圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。The outspoken lavigne, who in past interviews has detailed a fondness for wine and hard liquor, admitted having her mom and grandma on the tour could cramp her rock - star lifestyle
直言無諱的小艾,在過去的訪問中就有說到對葡萄酒和烈酒喜愛,承認在巡?上有她的媽媽和奶奶可以約束她的生活方式。And i ve also noted today that the shelling, the rate of shelling across the line of control, has also abated somewhat. and so we re pleased at this progress, but there is still a long way to go, and i can just assure you tonight that the united states will remain engaged
這就是唐?拉姆斯菲爾德部長為什麼在結束對北約和海灣的訪問之後將于明天前往這個地區,繼續進行我們與印度和巴基斯坦的磋商,以便使局勢得以開始走向真正的緩和,使印度軍隊和巴基斯坦軍隊現在可以朝反方向移動。In addition, compallng of anplementaton, security flexibility scalability and support of qos between these two models is provided. at the saxne time, mels vpn - - - - a solution for integrated model is discussed in detail, including network components of mpls vpn and its operation mode. there are also some problems that must be solved to build a mpls vpn, such as customer address space overapping, network accessibility constraini, vpn route updating, saving of backbone bandwidth, reducing of complexity of pe rooters and accessing internet from vpn, etc. mpls vpn can solve all the problems, as well as bring us some values in scalability, implemotation and maintenance
在此基礎上,詳細闡述了集成模型的解決方案? ? mplsvpn的工作原理,包括mplsvpn的網路構成和運行模式,對實現虛擬專用網所面臨的問題:用戶地址空間重疊、網路連通性約束、 vpn路由信息更新、節省骨幹網帶寬資源、降低pe路由器處理的復雜性以及如何在虛擬專用網內訪問internet等提出了解決方案,並對mplsvpn在擴展性、可實現性、可維護性方面的優勢進行了說明。Abbas arrived saturday night in uae after winding up a short visit to jordan where he discussed with some arab lawmakers on the prospect of starting talks between fatah and hamas factions
阿巴斯在結束了同約旦的短暫訪問後於周六晚抵達阿聯酋,在約旦,他同一些立法者就哈馬斯和法塔赫之間的內訌展開了會談。Shows how to constrain type parameters to enable access to methods and properties of the types used to instantiate the generic class
演示如何約束類型參數,以啟用對用於實例化泛型類的類型的方法和屬性的訪問。To display text labels in ssis designer that show the type of the constraint, you must configure the accessibility features of ssis designer
若要在ssis設計器中顯示表明約束類型的文本標簽,則必須配置ssis設計器的可訪問性功能。Method, and searches for the types nested within the current
方法的版本無關的訪問,並使用指定綁定約束搜索嵌套在當前Critical transaction set and task authorization indicator are introduced to allow for finer granular permission control, thus some problems of complex constrains such as history - based separation of duty can be solved effectively, and this provide a good base for active access control
通過引入臨界事務集合和任務授權指示符,實現了細粒度的權限控制,能夠較好地解決基於歷史的職責分離之類的復雜約束問題,並為主動訪問控制奠定了基礎。Explains how to access the settings and constraints editor
解釋如何訪問設置和約束編輯器。The 2 - d access control model of spatial data was presented
定義了其授權和訪問請求判斷的規則和約束條件。According to the surveys and case studies, we have raised a factor model that leads to iad : the characteristics of internet, the social impediment and study pressure of the addicted students are all the superficial factors that lead to iad. the essential factors are those psychological factors such as inside restraints, inferiority complex, etc. and the essential factors influence the addicted students by the superficial factors. for the ways that lead to iad, we cannot differentiate what is primary from what is secondary
根據個案研究並結合單獨訪談,我們提出了一個導致網路成癮的因素模型:網路特徵、成癮個體的交往障礙、學業及其它方面的壓力是導致成癮的表面因素,內在約束力弱、自卑等心理問題或個性特徵是導致成癮的內在或本質因素,內在或本質因素通過表面因素起作用;導致成癮的幾個途徑,並沒有主次之分,不同個體成癮的主要途徑存在差異。An index is a mechanism for providing fast access to table rows or for enforcing certain constraints
索引是一種提供快速訪問表行或強制某些約束的機制。Add, delete, and manage indexes for fast access to table rows or enforcing certain constraints
添加、刪除和管理用於快速訪問表行或強制某些約束的索引。We use a navigational algebra as the target ganguage the describes navigation plans and we show how to us rewrite rules in the spirit of relational optimizers and, taking link and inclusion constraints into account, to reduce the number of page accesses needed to answer a query
我們使用引導代數( navigationalalgebra )作為描述導航方案的目標語言,同時我們在研究最優化關系抽象中使用重寫規則,將鏈接約束和包含約束引入到運算中,以便在回答查詢中,減少大量需要訪問的頁面數量。The auth - constraint element is used to specify constraints for an authenticated user account that must be met prior to accessing protected pages
Auth - constraint元素用於指定對通過認證的用戶帳戶的約束,這些約束必須在訪問受保護頁面之前得到滿足。In the essay, discussions are focused on the transparency of database linkage and location, error management in remote control, treatment of suspending matters, referential integrity constraint, database access security and inquiry optimization
文中,對oracle分散式數據庫系統設計與實現中的數據庫鏈接與位置透明性、遠程過程中錯誤的管理、懸而未決事務的處理、參照完整性約束、數據庫訪問的安全性以及查詢優化幾個部分重點進行了探索。This discussion provides the theoretical evidence for partition - based quarantine approach. second, time and space constraints will make user form certain habit after using the internet for some period, and this user - habit limits the total access destination number
第二,由於時間、空間等各項約束會讓用戶在訪問網路時產生一定的用戶習慣,在習慣的作用下,用戶的訪問目的地是較為集中和有限的。分享友人