訪問約束 的英文怎麼說

中文拼音 [fǎngwènyāoshù]
訪問約束 英文
accessibility constraints
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 約動詞[口語] (用秤稱) weigh
  • : Ⅰ動詞1 (捆; 系) bind; tie 2 (控制; 約束)control; restrain Ⅱ量詞(用於捆在一起的東西) bundle;...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 約束 : keep within bounds; restrain; bind; bound; boundage;tie; restraint; restriction; engagement; repr...
  1. The comet is not bound and makes but one visit to the solar system.

    慧星是不受的,只是來一次太陽系。
  2. The task planning of imaging satellite is to assign imaging demand to satellites and assign satellite accessing to land stations

    衛星任務規劃就是在多種條件下預先為各衛星分配成像需求任務;為各地面站分配衛星任務。
  3. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性題,尤其是用戶控制的題;接著介紹了幾種浙江大學博士學位論文典型的控制方法,包括強制控制、任意控制、基於角色的控制、基於任務的控制,以及基於公司關系的控制、基於企業聯盟的控制等;在前面描述的典型控制模型基礎上,給出了一個網路化製造系統的綜合控制模型,包括網路化製造系統的用戶和資源層次關系圖、控制參考模型和控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的控制描述語言。
  4. The outspoken lavigne, who in past interviews has detailed a fondness for wine and hard liquor, admitted having her mom and grandma on the tour could cramp her rock - star lifestyle

    直言無諱的小艾,在過去的中就有說到對葡萄酒和烈酒喜愛,承認在巡?上有她的媽媽和奶奶可以她的生活方式。
  5. And i ve also noted today that the shelling, the rate of shelling across the line of control, has also abated somewhat. and so we re pleased at this progress, but there is still a long way to go, and i can just assure you tonight that the united states will remain engaged

    這就是唐?拉姆斯菲爾德部長為什麼在結對北和海灣的之後將于明天前往這個地區,繼續進行我們與印度和巴基斯坦的磋商,以便使局勢得以開始走向真正的緩和,使印度軍隊和巴基斯坦軍隊現在可以朝反方向移動。
  6. In addition, compallng of anplementaton, security flexibility scalability and support of qos between these two models is provided. at the saxne time, mels vpn - - - - a solution for integrated model is discussed in detail, including network components of mpls vpn and its operation mode. there are also some problems that must be solved to build a mpls vpn, such as customer address space overapping, network accessibility constraini, vpn route updating, saving of backbone bandwidth, reducing of complexity of pe rooters and accessing internet from vpn, etc. mpls vpn can solve all the problems, as well as bring us some values in scalability, implemotation and maintenance

    在此基礎上,詳細闡述了集成模型的解決方案? ? mplsvpn的工作原理,包括mplsvpn的網路構成和運行模式,對實現虛擬專用網所面臨的題:用戶地址空間重疊、網路連通性、 vpn路由信息更新、節省骨幹網帶寬資源、降低pe路由器處理的復雜性以及如何在虛擬專用網內internet等提出了解決方案,並對mplsvpn在擴展性、可實現性、可維護性方面的優勢進行了說明。
  7. Abbas arrived saturday night in uae after winding up a short visit to jordan where he discussed with some arab lawmakers on the prospect of starting talks between fatah and hamas factions

    阿巴斯在結了同旦的短暫後於周六晚抵達阿聯酋,在旦,他同一些立法者就哈馬斯和法塔赫之間的內訌展開了會談。
  8. Shows how to constrain type parameters to enable access to methods and properties of the types used to instantiate the generic class

    演示如何類型參數,以啟用對用於實例化泛型類的類型的方法和屬性的
  9. To display text labels in ssis designer that show the type of the constraint, you must configure the accessibility features of ssis designer

    若要在ssis設計器中顯示表明類型的文本標簽,則必須配置ssis設計器的可性功能。
  10. Method, and searches for the types nested within the current

    方法的版本無關的,並使用指定綁定搜索嵌套在當前
  11. Critical transaction set and task authorization indicator are introduced to allow for finer granular permission control, thus some problems of complex constrains such as history - based separation of duty can be solved effectively, and this provide a good base for active access control

    通過引入臨界事務集合和任務授權指示符,實現了細粒度的權限控制,能夠較好地解決基於歷史的職責分離之類的復雜題,並為主動控制奠定了基礎。
  12. Explains how to access the settings and constraints editor

    解釋如何設置和編輯器。
  13. The 2 - d access control model of spatial data was presented

    定義了其授權和請求判斷的規則和條件。
  14. According to the surveys and case studies, we have raised a factor model that leads to iad : the characteristics of internet, the social impediment and study pressure of the addicted students are all the superficial factors that lead to iad. the essential factors are those psychological factors such as inside restraints, inferiority complex, etc. and the essential factors influence the addicted students by the superficial factors. for the ways that lead to iad, we cannot differentiate what is primary from what is secondary

    根據個案研究並結合單獨談,我們提出了一個導致網路成癮的因素模型:網路特徵、成癮個體的交往障礙、學業及其它方面的壓力是導致成癮的表面因素,內在力弱、自卑等心理題或個性特徵是導致成癮的內在或本質因素,內在或本質因素通過表面因素起作用;導致成癮的幾個途徑,並沒有主次之分,不同個體成癮的主要途徑存在差異。
  15. An index is a mechanism for providing fast access to table rows or for enforcing certain constraints

    索引是一種提供快速表行或強制某些的機制。
  16. Add, delete, and manage indexes for fast access to table rows or enforcing certain constraints

    添加、刪除和管理用於快速表行或強制某些的索引。
  17. We use a navigational algebra as the target ganguage the describes navigation plans and we show how to us rewrite rules in the spirit of relational optimizers and, taking link and inclusion constraints into account, to reduce the number of page accesses needed to answer a query

    我們使用引導代數( navigationalalgebra )作為描述導航方案的目標語言,同時我們在研究最優化關系抽象中使用重寫規則,將鏈接和包含引入到運算中,以便在回答查詢中,減少大量需要的頁面數量。
  18. The auth - constraint element is used to specify constraints for an authenticated user account that must be met prior to accessing protected pages

    Auth - constraint元素用於指定對通過認證的用戶帳戶的,這些必須在受保護頁面之前得到滿足。
  19. In the essay, discussions are focused on the transparency of database linkage and location, error management in remote control, treatment of suspending matters, referential integrity constraint, database access security and inquiry optimization

    文中,對oracle分散式數據庫系統設計與實現中的數據庫鏈接與位置透明性、遠程過程中錯誤的管理、懸而未決事務的處理、參照完整性、數據庫的安全性以及查詢優化幾個部分重點進行了探索。
  20. This discussion provides the theoretical evidence for partition - based quarantine approach. second, time and space constraints will make user form certain habit after using the internet for some period, and this user - habit limits the total access destination number

    第二,由於時間、空間等各項會讓用戶在網路時產生一定的用戶習慣,在習慣的作用下,用戶的目的地是較為集中和有限的。
分享友人