追補者 的英文怎麼說

中文拼音 [zhuīzhě]
追補者 英文
follower
  • : Ⅰ動詞1 (追趕) chase after; run after; pursue; catch up with 2 (追究) trace; look into; get to...
  • : Ⅰ動詞1 (修理; 修補) repair; mend; patch 2 (補充; 補足;填補) fill up; add supplement; supply; ...
  • : Ⅰ助詞1 (用在形容詞或動詞後面 或帶有形容詞或動詞的詞組後面 表示有此屬性或做此動作的人或事物) 2 ...
  1. The sense of community and the social constructivism, complementary in methods and coherent in pursuit of value, are consistent in essence

    摘要社區意識的內涵與社會建構論的本質意涵具有內在一致性,二具有方法上的互性和價值求上的一致性。
  2. Article 38 anyone who smuggles goods that are subject to import or export prohibitions or restrictions, and hereby commits criminal offenses, shall be subject to criminal prosecution pursuant to the supplementary provisions on the punishment of smuggling crimes

    第三十八條走私禁止進出口或限制進出口的貨物,構成犯罪的,依照懲治走私罪的充規定究刑事責任不構成犯罪的,依照海關法的規定處罰。
  3. Article 40 for illegally importing or exporting technologies whose import or export is banned or restricted against this law, if the case is serious enough to constitute a crime, criminal responsibilities shall be affixed in reference to the supplementary provisions on punishing smuggling crimes

    第四十條違反本法規定,進口或出口禁止進出口或限制進出口的技術,構成犯罪的,比照懲治走私罪的充規定究刑事責任。
  4. Article 40 anyone who imports or exports technologies that are subject to import or export prohibitions or restrictions in violation of this law and commits criminal offenses, shall be subject to criminal prosecutions in the light of the supplementary decision on the punishment of smuggling crime

    第四十條違反本法規定,進口或出口禁止進出口或限制進出口的技術,構成犯罪的,比照懲治走私罪的充規定究刑事責任。
  5. Article 40 anyone who imports or exports technologies that are subject to import or export prohibitions or restrictions in violation of this law and commits criminal offenses, shall be subject to criminal prosecutions in the light of the supplementary provisions on the punishment of smuggling crimes

    第四十條違反本法規定,進口或出口禁止進出口或限制進出口的技術,構成犯罪的,比照懲治走私罪的充規定究刑事責任。
  6. While it contributes nothing positive to apportion blame at this time few people involved are immune from criticism

    盡管在這個時候究責任於事無,但所有參與幾乎沒有人可以逃避指責。
  7. Cultural studies are only complement and improvement to the conception and methods of traditional literary studies, therefore can not take the place of aesthetic transcendence, but rather, takes it as its ultimate pursuit

    文化研究只是對傳統文藝研究在觀念方法上的充和改進,不足以取代後,並且仍應以審美超越為終極求。
  8. “ gonghaowu dance studio ” was founded in september 2006, which is a dance club for professional and amateur dancers

    「工號舞舞蹈工作室」於06年9月上旬成立,這是一個舞蹈愛好的聚集地,海納百川,融匯互通,取長短是我們的共同求。
  9. However, there are short of regulations about the obligation of the principal, the doctrine of liability fixation, the measurement and amount of the compensation caused by misrepresentation in the civil law

    投資的損失只能通過對虛假陳述進行民事償才能夠彌,而我國對虛假陳述民事賠償責任的相關立法極其匱乏。
  10. For example, in the counterplead right of discontinuance, if debtor performs the right of discontinuance beyond due time or surrenders to perform it, it does n ' t effect guarantor to perform counterplead right of discontinuance. this treatise holds the opinion that the stipulation of the twentieth articles of guaranty law that " if debtor surrenders the counterplead right on debt, guarantor still has counterplead right " should be explained more broadly. the situation that debtor does n ' t perform discontinuance right or that debtor surrenders discontinuance right before obligee makes the request of debt should also be regarded as that debtor surrenders the counterplead right on debt

    當事人對保證擔保的范圍或物的擔保的范圍沒有約定或約定不明的,承擔了擔保責任的擔保人,可以向債務人償,也可以要求其他擔保人清償其應當分擔的份額」的規定雖然彌了《擔保法》的立法不足之處、給予了提供物保的第三方和保證人平等的擔保人地位,卻又沒有分清保證人是承擔一般保證還是連帶責任責任的保證方式上的區別,因而過于絕對化,對于承擔一般保證的保證人而言,因為享有先訴抗辯權,不能和提供物保的第三方處于同一債務人位次,所以依然應當享有物保優先權。
  11. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向蹤演算法的基礎上,著重研究了代數方法編碼反向蹤信息的方案,該方案把蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向蹤問題的一種新的解決方法; ddos陷阱作為反向蹤的工具,引誘攻擊相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向蹤有用的充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
分享友人