逆代碼 的英文怎麼說

中文拼音 [dài]
逆代碼 英文
inverse code
  • : Ⅰ形容詞1 (方向相反) contrary; counter 2 [數學] inverse; converse Ⅱ動詞1 (抵觸; 不順從) go aga...
  • : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  1. 100 prizes : an infantile epistle, dated, small em monday, reading : capital pee papli comma capital aitch how are you note of interrogation capital eye i am very well full stop new paragraph signature with flourishes capital em milly no stop : a cameo brooch, property of ellen bloom born higgins, deceased : 3 typewritten letters, addressee, henry flower, c o p. o. westland row, addresser, martha clifford, c o p. o. dolphin s barn : the transliterated name and address of the addresser of the 3 letters in reserved alphabetic boustrophedontic punctated quadrilinear cryptogram vowels suppressed n. igs. wi. uu

    三封打字信,收信人為:亨利弗羅爾,韋斯特蘭橫街郵政局轉交發信人為:瑪莎克利弗德,海豚倉巷郵政局收轉。三信的發信人住址姓名被改寫為字母交互綴式附有句號分作四行的密母音字母略之如下: nigs wiuuoxwoksmhyim 296英國周刊現社會297的一張剪報:論女學校中的體罰。一截粉紅色緞帶,這是一八九九年系在一顆復活節彩蛋上的。
  2. How to apply modern cryptography to the copyright protection of digital contents is the focus of this dissertation, in which the traitor tracing problem of digital fingerprinting technology is researched in order that the issue of digital contents is run by natural commercial format

    本文中重點研究如何將現學技術應用到數字產品的版權保護中,即數字指紋技術中的叛者追蹤問題,以保證數字產品的出版發行能夠按正常商業形式運作。
  3. In autoore, a novel approach to extract java semantic relational model is presented. to get precise object relational result, the java code polymorphism invoke location is formal defined and a program analysis method based on extended class hierarchy graph ( echg ) is proposed

    抽取是oore的起點,從起點開始支持理解是向工程的重要目標, autoore在java抽取中,抽取模型採用文中提出的java詞法和語義兩個模型,利用一個基於java擴展類層次圖( echg )的多態調用點分析演算法,得到更精確的靜態對象關系。
  4. The intermediate code created by the compiler is very compact and is propitious read by the running system because the paper uses reverse polish representations, hi the simulative running system, the paper uses the hardware plc principles and the oo method to white the running program

    中間採取了波蘭表示法,這使得生成的比較緊湊,且有利於運行程序的讀取。在模擬運行部分,本文利用硬plc循環掃描的工作原理,結合pc環境下的特點,用面向對象的方式編寫出了模擬運行程序。
  5. So there is need to do the desired extraction of high - level design information from code. according to it, we will design a reverse engineering tool, analysing java source code, mapping to uml class diagram and alsd, visualizing the analysis result

    根據這種需求,我們針對面向對象語言java ,設計一個分析java源,以uml類圖和抽象邏輯結構圖( alsd )來可視化表示分析結果的向工具。
  6. First, because the client executable contains the checksum computation code, and attacker can reverse engineer the checksum algorithm, and then compute valid checksums for any message

    第一,因為客戶端執行文件包含校驗和演算法,攻擊者能夠向工程出此演算法,從而可以為任何消息計算校驗和。
  7. Third, i present three methods to find vulnerabilities : source scan, fault injection and reverse engineering

    其後具體闡述了如何檢測軟體中存在的安全漏洞,分為源掃描、軟體錯誤注入和向工程三種辦法。
  8. To find this password, you have to reverse engineer the binary

    為了找到密,你需要
  9. Especially in those security area, such as war industry and aerospace science, some important software must. be consistent by verifying with source file and binary code, by the way of de - compiling

    尤其在軍工和航天等應用領域,出於安全考慮,一些關鍵軟體需通過編譯驗證可執行與源的等價性。
  10. In this installment of " the geronimo renegade " column, java and microsoft. net developer neal sanche invites you to experience his dream where shared, low - level object - oriented code enables developers to integrate and build any application on top of it

    在「 geronimo叛者」專欄的這一部分中, java和microsoft . net開發人員neal sanche邀請您體驗他的夢想共享的、底層的、面向對象的使開發人員可以在其上集成和構建任何應用程序。
  11. In the part of realizing design, firstly we expound the designing of the database based on uml, the mapping from uml classes to relation database modeles, the mapping from uml classes to tables and the mapping of tables in aibas. then we describe the mapping of c + + codes and its reverse engineering. and then we introduce the system structure based on corba and producing of corba / idl codes. at last we realize the system simply with a case tool - aibas

    在系統的實現部分,本文首先描述了基於uml的數據庫的設計,並詳細描述了uml類向關系數據庫模型的映射、 uml中的類圖中的類映射成表以及數據表格在case工具aibas中的映射,然後文章又描述了基於uml的c + +語言的映射及其向工程,並且介紹了基於corba的體系結構和corba idl的生成,最後運用case工具aibas對系統進行了簡單的實現。
  12. Reverse engineering of existing code

    現有向工程
分享友人