點式地址 的英文怎麼說

中文拼音 [diǎnshìdezhǐ]
點式地址 英文
dotted decimal
  • : Ⅰ名詞1 (液體的小滴) drop (of liquid) 2 (細小的痕跡) spot; dot; speck 3 (漢字的筆畫「、」)...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : 名詞(建築物的位置; 地基) location; site; ground; foundation
  1. On the base of researching the theory of the scheme and analyzing the signal feature, it is obtained that the existence manners and character of distance information in the differential frequency signal. at the same time, a new conclusion is gained that the technology of frequency agility can decrease the constant error of system. it is also to say that frequency agility and frequency modulation fixed - distance fuze has the similar feature to random period frequency modulation fixed - distance fuze. according to the theory of address coding in the hopping - frequency communication, the paper presents the principle of selecting the frequency agility sequence which fit to the radio fuze and constructs the frequency agility sequence family based on the rs codes

    在深入研究方案原理和分析信號特徵的基礎上,獲得了該體制引信差頻信號中,距離信息的存在形和特,得出了頻率捷變技術的引入降低了系統定距固定誤差這一新的結論,即頻率捷變調頻定距引信在定距性能上具有類似隨機周期調頻定距的特徵。本文引入跳頻通信編碼理論,結合無線電引信的具體特徵,提出了適用於無線電引信的頻率捷變序列的選擇原則,並構造了基於rs碼的寬間隔頻率捷變序列族。
  2. An attacking node can personate other nodes through replaying their binding messages, changing the address field to provide wrong return address, and achieving dos ( denial of service ) attack by replaying binding messages

    攻擊節可以通過重放節綁定信息的形來冒充此節;通過修改綁定消息中的部分來提供虛假;還可以通過大量重放監聽到的綁定消息進行拒絕服務攻擊。
  3. Basis " orders of sell of access of land of shenzhen special economic zone " the seventeenth regulation, contract of sell one ' s own things should have the following and main provision : ( one ) the full name of bilateral party or name, address ; ( 2 ) a ground date of access of land of sell one ' s own things, area ; ( 3 ) land is used year period reach case stop time ; ( 4 ) the amount of gold of land access sell one ' s own things, money is planted, pay kind and time ; ( 5 ) the time of consign land ; ( 6 ) point of program, municipal design ; ( 7 ) project complete is referred check and accept time ; ( 8 ) municipal facilities form a complete set builds obligation ; ( 9 ) land of use photograph adjacent and viatic limitation ; ( 10 ) the project that builds accessary, add establishment and obligation ; ( 11 ) responsibility of breach of contract ; ( 12 ) party thinks necessary other item

    根據《深圳經濟特區土使用權出讓條例》第十七條的規定,出讓合同應具備以下主要條款: (一)雙方當事人的姓名或者名稱、; (二)出讓土使用權的宗號、面積; (三)土使用年期及起止時間; (四)土使用權出讓金的數額、幣種、交付方及時間; (五)交付土的時間; (六)規劃、市政設計要; (七)項目竣工提交驗收時間; (八)市政設施配套建設義務; (九)使用相鄰土和道路的限制; (十)建設附屬、附加設施的項目及義務; (十一)違約責任; (十二)當事人認為必要的其他條款。
  4. Find directions for and explore towns and cities worldwide. display addresses on a map, view nearby businesses, get driving directions and maps, and plan a trip with city information. also includes aerial photographs of selected areas

    -可查詢北市各區各里之人口資料,提供路口及路名查詢等方,找尋重要的公務單位公共設施。
  5. It combines feeder automation, and develops the fault identifying principle from one direction to two direction. so it enhances the redundancy of fault information, and improves the reliability of the fault location. we choose the transient zero current prior to others, for it is bigger than others mostly

    本文敘述了饋線系統保護原理,提出了基於饋線自動化系統的幾種單相接故障處理方案,討論了這幾種方案下故障特徵量的比較方,分析了故障特徵量選用的出發以及配電終端命名規則等問題。
  6. For the windows nt device driver of pioneer - net, pioneer - net card is a programmable i / o device, and the device driver uses buffer i / o mode to copy data between user address space and kernel address space

    在windowsnt操作系統下,本文認為先鋒網卡具有可編程i o設備的特,並且採用緩沖i o的方用於在用戶空間和內核空間之間的數據拷貝。
  7. The new method firstly put forward by this paper : the method of preventing ip embezzlement based arp spoofing, is low cost and easy to implement, and also, it ' s effectual to various kind of ip embezzlement

    本文獨立提出的ip防盜用新方法即基於arp偽裝技術的ip防盜用解決方案,具有低成本、易實施的特,而且對各種ip盜用的形都能夠防範。
  8. The ip address is various because teachers and students go to the internet in different places and different connection. using ihe mixed architecture of the server programming, the clients immediately communicate as peers and the server is only connecting function. as clients, teachers and students can directly deal with data without server, the quantities of information or server were reduced and the middle tache during transferring data was avoided

    教師和學生上網不定,上網連入方不同,其ip是不固定的,採用混合型服務器程序設計方法,服務器端只起到握手連接作用,讓客戶端直接連接,教師和學生直接進行數據通訊,使學生和教師的數據處理無須通過服務器,降低服務器信息處理量,從而消除了數據傳遞的中間環節。
  9. In addition to message format definitions and messaging patterns, the service description optionally contains the address that is associated with each xml web service entry point

    除消息格定義和消息處理模以外,服務描述還可以選擇包含與每個xml web服務入口關聯的
  10. And by replacing the values that are bold

    的模並替換粗體值來確定端
  11. Selection of the endpoint address, based on the interaction style

    基於交互方的端選擇
  12. It supports configuration of endpoint addresses at deployment time

    該模支持在部署階段配置端
  13. A url is an ideal way to identify a web service endpoint address

    使用url是識別web服務端的一種理想方
  14. Now the emphasis is transferred to the design and implementation of memory system. before a deep discussing, some basic knowledge is introduced, such as the memory classification and hierarchy, address space, access controlling, cache, memory coherence, and the popular memory system implementation method. then the archteture of the target memory system is presented and divided into two subsystems, the virtual memory management subsystem and memory access subsystem, according to their function

    接下來本文將重轉移到研究已定目標vliw處理器存儲系統的設計和實現,先對存儲系統設計涉及的存儲器及其組織層次、空間、訪問控制、 cache 、存儲一致性、常見的實現方等因素作了分析,然後給出了目標存儲系統的總體框架,並按功能將其劃分為虛存管理和訪存兩個子系統。
  15. Theoretical source of transparent model " s advantages is discussed, and then solutions of its key technology, last a programming realization - setting network card promsic to receive packets, keeping mac address, and checking packets base mac frame to realize transparent model in ip protocol rebuilding. the key technologies of firewall are packet filter and application proxy both of which can " t keep in step with network attack development

    鑒於此,本文從透明模防火墻的特徵和功能出發,探討了其本質、技術實現要及可行性方案,給出有別于上述兩方案的實現:網卡置於混雜模,保留mac, ip重組、檢查、轉發過程一氣呵成,將透明模的實現融合在ip重建中,使得整個防火墻體系結構更加緊湊,提高了效率。
  16. The application controls which dynamic libraries are loaded and which functions in the libraries are called by using linux dynamic loader routines to perform the loading and linking and to return the addresses of the required entry points

    通過使用linux動態裝入器常,應用程序控制裝入哪一個動態庫以及調用庫中的哪一個函數,以執行裝入和鏈接以及返回所需入口
  17. High - effective and low - cost memory system the demand for bandwidth and response time of video decoder is analyzed, a high - effective and low - cost multi - entity interlaced ddr sdram controller design and relevant address mapping scheme is proposed

    高效低成本的存儲系統設計本文分析了avs和h . 264解碼器對存儲系統帶寬和響應速度的要求,針對ddrsdram延遲長、多bank的特,設計了一套高效的多體交錯ddrsdram控制方案和相應的映射方
  18. Finally an endpoint can have multiple endpoint addresses based on the interaction style synchronous versus one - way as required by the consumer

    最後,基於客戶需要的交互方(同步或者單向) ,每個服務端又具有多個端
  19. The thesis is mainly concerns about : ( 1 ) this paper discusses the protocol stack of voice over ip. the function, address format, the mode of call request and response, sip module and correlative protocol are introduced

    本文的內容主要包括: ( 1 )從ip電話的協議棧出發,介紹了sip的功能特、呼叫及響應方、 sip組件以及相關協議。
  20. The mapping of unique node identifiers to hierarchical addresses is done using a distributed hash table that leverage the hierarchical network structure

    唯一節標識符到層次化的映射用一個平衡層次化網路結構的分散哈希表來實現的。
分享友人