accessing 中文意思是什麼

accessing 解釋
訪問
  1. The recommended approach for accessing resources outside the database under an impersonation context is to use certificates and signatures as apposed to the

    在模擬上下文內訪問數據庫以外資源的建議方法是使用證書和簽名替代
  2. Accessing. net objects through com callable wrapper

    通過com可調用包裝來訪問. net對象
  3. It implements web crawling through distributed technology, and builds index database through accidence analyzing chinese characters separating unuseful words deleting etyma extracting index words selecting and lexicon. the level system uses new model of web accessing and level computation to build web level system so that the requirement for computer resources is greatly reduced

    該搜索引擎使用分散式技術實現網頁獲取模塊;通過詞法分析、中文分詞、無用詞匯刪除、詞干提取、索引詞條選擇和詞典等技術建立索引數據庫;該搜索引擎的級別系統使用了新的網路訪問模型和級別計算模型,大大降低了搜索引擎對于計算機資源的要求。
  4. After accessing the situation, the sergeant withdrew his extendible baton as a precautionary measure and calmed down the suspect, ordering him to drop the chopper

    當他評估現場環境后,警長取出伸縮警棍作出防禦,並把疑匪冷靜下來,隨后命令他放下菜刀。
  5. Facilities : a modem, state - of - the - art convention center equipped with simultaneous interpretation system, multi - function board rooms installed with digital av systems accessing six regions in the world for video conferencing, helipad for executives on the go, ample car parking, high - speed broadband network, intelligent information system

    配套設施:配備同聲翻譯系統的大型會議廳,同時掌控6個地區資訊的智能視頻會議廳,商務直升飛機坪,高速網路服務,智能化信息管理,高級商務餐廳。
  6. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  7. The task planning of imaging satellite is to assign imaging demand to satellites and assign satellite accessing to land stations

    衛星任務規劃就是在多種約束條件下預先為各衛星分配成像需求任務;為各地面站分配衛星訪問任務。
  8. Wireless lan is accessible from most outdoor areas on campus. checking e - mail, accessing course material or even doing group projects are no longer limited to indoors - an experience one shouldn t miss especially on a warm and sunny day with a light breeze

    無線網路系統現已覆蓋校園內大部分的戶外地方, z過多個無線接駁點,你可在戶外查閱電郵、進行網上學習,甚至和同學討論功課?這些活動再不用局限於室內了。
  9. Aiming for the problem of accessing data on different flats, gives some research, limns the server / client system, and based on the transferring ftp net files, uses the method of windows " sockets network programming, devises and achieves the network function, fulfill data accessing using odbc technology

    針對實際中存在的跨平臺數據訪問的問題進行了研究。對客戶機/服務器體系作了描述,在ftp的網路文件傳輸的基礎上,利用windowssockets網路編程方法,設計實現了網路功能。
  10. Telecommunications - uniform language for accessing power plants - humans - machine language

    電信.接入動力裝置的統一語言.人機語言
  11. Complexity of the accessing of chinese monosyllabic words : evidence from cognitive experiments

    來自認知心理的實驗證據
  12. With the acceleration of economic globlization, the purchasing globlization of automobile parts is becoming the necessitous trend of automobile manufacture industry. from accessing to the wto in 2001, chinese automobile industry had been brought into the international distribution rapidly. chinese motor spare parts enterprises meet new development opportunity. meanwhile, following the canceled and weaken of tariff and non - tariff wall, the motor ' s parts market boundary between domestic and international is very weak. the domestic enterprises are forced to take part in the international competition

    2001年中國加入wto以後,中國汽車工業已被迅速地納入國際分工體系之中,中國境內的汽車零部件企業迎來了新的發展機遇;另一方面,隨著各種關稅和非關稅壁壘的減弱和消失,汽車零部件的國內、國際市場界限已非常的模糊,中國境內的汽車零部件企業將被迫參與國際競爭。
  13. Accessing a remote parallel computer by a proxy

    使用代理訪問遠程并行計算機
  14. If accessing a patent on the internet were to constitute an infringement, this would go against the fundamental quid pro quo on which patent law is based, eisenberg contends

    艾森柏格斷言,如果在網際網路上儲存或取得專利標的就會構成侵權,無異將推翻目前專利法所依循的游戲規則。
  15. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種特殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的管理,提出一種訪問控制的增強型安全設計原則,基於此原則建立了管理授權和推薦式授權的安全訪問機制,用以提高系統的訪問安全性,並大大減少授權管理維護量;研究了特殊屬性對象的數據庫存儲機理,從而構造一種快速存儲、訪問和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的訪問。
  16. A developmental research on accessing categorical referents

    類別指稱對象提取過程的發展研究
  17. For example, suppose you are accessing a web service called

    例如,假設您正在訪問一個名為
  18. Accessing unexposed members through managed interfaces

    通過託管介面訪問未公開的成員
  19. Accessing unexposed members on the managed html document object model

    >在託管html文檔對象模型中訪問未公開成員
  20. Provides properties for accessing the current local time and universal coordinated time equivalent to greenwich mean time from the system clock

    提供了用於從系統時鐘中訪問當前本地時間和協調通用時間等同於格林威治時間的屬性。
分享友人