點對點網路 的英文怎麼說

中文拼音 [diǎnduìdiǎnwǎng]
點對點網路 英文
point-point network
  • : Ⅰ名詞1 (液體的小滴) drop (of liquid) 2 (細小的痕跡) spot; dot; speck 3 (漢字的筆畫「、」)...
  • : Ⅰ動詞1 (回答) answer; reply 2 (對待; 對付) treat; cope with; counter 3 (朝; 向; 面對) be tr...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • 點對點 : pear-to-pear
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. Based on this algorithm, an end - to - end rate - based transport protocol named the trinomial protocol is developed, in terms of individual performance and capacities, the trinomial protocol provides much better transmission service than current tcp or udp protocols : it minimizes transmission delays and delay jitter by omitting re - transmission ; in the steady state, its transmission rate is smooth ; and when available network bandwidth increases / decreases, it adapts to the change quickly

    基於該機制,開發了基於速率的三項式協議。在個體性能和容量方面,三項式協議提供了比當前tcp和udp協議更好的傳輸服務;在穩態,它的傳輸速率是平滑的,並且當可用的帶寬增加或減小時,能迅速而自適應地進行改變。
  2. Generalized multiprotocol label switching : an overview of routing and management enhancements. ieee communications magazine, 2001, 39 : 144 - 150. 19 fontaine m, smith d g. bandwidth allocation and connection admission control in atm networks

    在論文中,將針波長的使用效率徑的長度波長轉換器使用的個數及傳送所花費的資源,來評估所研究的演算法執行效能。
  3. ( 3 ) with the conception of quantum probability and composite method of path in network, the earliest time of node merged with two or more paths is corrected, and then make a dummy activity which follows the node and which holds a duration time that the earliest time of the node added time after the paths are merged, and the subsequent work of the node follow the dummy activity

    採用線合成,引進當量概率概念,pert中有二條以上匯入線的最早時間進行修正,並將修正後增加的時間作為一新活動(工序)的持續時間,然後將該新活動作為原節的緊后工序,而原節的緊后工序作為該新工序的緊后工序。
  4. To overcome the limitations of general fnns and bp algorithm, this thesis introduced a hybrid feed - forward neural network, which is composed of a linear model and a general multi - layer fnn, and proposed a new learning algorithm for the hybrid fnn

    其次,針bp存在的缺陷,結合前向神經和線性最小二乘法的優,構造了一種基於混合結構的神經,提出了相應的非迭代的快速學習演算法。
  5. 15 li l, horrocks i. a software framework for matchmaking based on semantic web technology. in proc

    為此,也利用語義模型進行描述,彼此之間通過語義關聯進行自組織。
  6. In the second part of this paper, it makes a detailed analysis among fluid - model - based, smith - principle - based and two - pd - controllers - based by comparing to the method and application of control theory. then it gets the laws to keep the control loop stable. in order to analyze the dynamic and transient characters, three congestion control algorithms mentioned above have been carried out in the nist atm network simulator and the successful outcomes are brought out

    本論文atmabr業務擁塞控制的控制理論演算法進行了總結,簡要分析了其優和缺;運用控制理論的分析方法和觀基於流體控制模型、史密斯預估控制模型和雙重比例微分控制模型三種擁塞控制演算法加以具體的分析,從而分析了怎樣確保控制環的穩定性;在nistatm模擬軟體中嵌入以上三種擁塞控制演算法,從而演算法的動態和瞬態特性進行模擬分析,以此證明控制演算法的有效性;最後提出了今後atmabr業務擁塞控制演算法的發展趨勢。
  7. On the internet, multimedia services such as streaming media, video / audio conference, voice over ip and video on demand, become more and more important, end - to - end data transmission or unicast ca n ' t be competent for the task which have the characteristic of one - to - many transmission. if we use unicast, the server has to offer the packet with same context for each connection, which will consume too much bandwidth. then the broadcast is alternative selection for us to deliver data in the lan, as we known, when broadcast technology used, all the pcs in the lan will receive the broadcast packets regardless that you would like to or not

    傳輸的單播方式不能適應此業務的傳輸特性(單發送多接收) ,這使得服務器必須為每一個接收者提供一個相同內容的ip報文拷貝,並在上重復地傳輸相同內容的報文,這必然佔用大量資源。雖然ip廣播允許一個主機把一個1p報文發送給同一個的所有主機,但是由於不一定是所有的主機都需要這些報文,這又可能浪費大量資源。
  8. So it should : if films and music can be readily exchanged via peer - to - peer networks, why not shares

    理當如此:如果電影和音樂能方便地通過點對點網路進行交換,股票為什麼不行呢?
  9. Mr tsang added that customs raid operations had led to a significant drop in retail piracy. " this year, the department uncovered a case of peer - to - peer network infringement - - the first such case in the world - - and the offender was successfully prosecuted, " he said

    他說:本年,海關偵破了全球第一宗檔案分享的侵權案件,並成功檢控涉案人士,表證香港在保護知識產權方面的決心和成效。
  10. Firstly, this paper makes a detailed study on the field control bus system ( pcs ), including the characters of pcs by comparing fcs and dcs, model networking of pcs and several popular field bus, then put forward a question for discussion combining embeded internet technology and field bus and measure and control networking model based embeded internet technology is constructed. secondly, it studies embeded system including the core of hardware ? mbeded microprocessor and real time operation system. thirdly, the method of realizing embeded internet is discussed for emphasis, and difficulty of ehernet application in industry measure & control system is analysed. an instance of measure & control networking system based embedded ip is given. finally, the author designed a networked remote video surveillance system based embedded web server, c / os - ii is sacled and ported into the embedded microprocessor at89c51. based on the c / os - ii rtos, tcp / ip protocol suite and application program is designed in detail. the system w orks well that improves that the embedded internet technology will be widely used in modern measure & control networking system and has extend values

    本文首先分析了現場總線系統( fcs )與傳統集散控制系統( dcs )相比具有的特、 fcs的體系結構,介紹了幾種流行的現場總線,提出了將嵌入式internet技術結合現場總線構建現代測控的課題;在此基礎上,構建了基於嵌入式internet技術的測控結構模型;深入研究了嵌入式系統的核心硬體?嵌入式微處理器,通過比普通操作系統,描述了嵌入式實時操作系統的特;重研究了實現嵌入式internet的四種實現方法,並分析了以太在工業測控系統中應用的難,給出了一個基於嵌入式ip的測控系統實例;最後,研究與設計了一個基於嵌入式web服務器的遠程視頻監控系統,該嵌入式web服務器利用目前成熟的嵌入式實時操作系統c / os - ,通過c / os -進行適當的裁剪、修改與移植,在at89c51嵌入式微處理器上實現了tcp / ip協議棧及應用程序,系統的成功運行證明了本文研究成果的有效性,也表明嵌入式internet技術在現代測控系統中具有廣闊的應用前景和推廣價值。
  11. The panel discussed the paper on the actions taken by the government to combat infringing activities on peer - to peer file sharing networks

    事務委員會討論有關政府就打擊檔案分享的侵權活動所採取的行動的文件。
  12. We are encouraged by the recent first - ever successful enforcement action taken by the customs against copyright piracy relating to p2p file sharing activities

    我們海關近日首次成功檢獲檔案分享的盜版活動感到鼓舞。
  13. This is the nature of peer - to - peer and networking in general

    答:總的來說這是的天性。
  14. A : this is the nature of peer - to - peer and networking in general

    答:總的來說這是的天性。
  15. This paper mainly studys the technologies of route protocols in ad hoc network, data caching and query optimizing in mobile database system

    本文主要adhoc由策略、移動數據庫的緩沖技術和查詢優化技術進行了重研究。
  16. To connect lightweight mobile peers to the rest of the jxta network

    來連接輕量級的移動與jxta的其餘部分。
  17. This research paper, based on the theory of social interaction, utilizing the method of network analysis through the case survey in the jingwenwu village in the town of bishidu of ezhou city in hubei province, for the first time concentrates on the developing tendency of social supporting network of the work force in the rural area of china

    本研究以社會互動理論為支撐,運用分析的方法,通過湖北省鄂州市碧石渡鎮金文武村的個案調查,中國農村勞動人口社會支持的發展趨勢進行了研究。
  18. Cwdm provides wide bandwidths at low cost, which can be applied to point - to - point, ethernet, sonet rings etc. this assay designed the main control unit in cwdm system

    稀疏波分復用系統cwdm用很低的成本提供了很高的接入帶寬,適用於、以太、 sonet環等各種流行的結構。
  19. Point - to - point network

    點對點網路
  20. All these filtering ways are mainly executed by setting down detailed and complicated rules. this makes it is excessively dependent on rules, and cannot distinguish the real text meanings, which are the biggest drawbacks. as we know, the information will be filtered when it satisfies the filtering rules, and this cannot satisfy our needs for today ' s applications

    這些過濾方式主要通過制定詳細繁瑣的過濾規則來實現,其特是實現簡單,實時性強? ?這一上的應用來說是很重要的;但它的一個最大的缺就在於過濾過于規則化,無法辨別文檔實際含義,只要滿足過濾規則就會被過濾掉,無法滿足現在過濾需求。
分享友人