application access time 中文意思是什麼

application access time 解釋
應用軟體存取時間
  • application : n. 1. 適用,應用;運用。2. 申請,請求;申請表格。3. 勤勉,用功。4. 敷用;敷用藥。
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • time : n 1 時,時間,時日,歲月。2 時候,時刻;期間;時節,季節;〈常pl 〉時期,年代,時代; 〈the time ...
  1. Application access time

    應用軟體存取時間
  2. In order to access information we design a web site based on the brower / server model, and at the same time, we develop the wap service, which is the expansion of wireless network application in the vts system. the transmission method based on ip multicast is used in information transmission system

    對于信息訪問系統設計了基於browser / server (瀏覽器朋臣務器)模式的web網站,並在此基礎上開發了對vts系統的無線網路應用的擴展? ? wap服務;對于信息傳輸系統設計採用了基於ip組播方式的傳輸手段。
  3. At the early age of embedded system history, many real - time operating system use multi - task sharing single address space mode, which means kernel and application run in the same priviledge and application can access the whose address space with full pomission, for the limited performance and hardware resource

    在嵌入式系統發展早期,由於硬體資源和性能有限,很多實時操作系統採用的是單地址多任務空間模式,即內核和應用都運行在同一特權級,應用程序可以無限制的訪問整個系統地址空間。
  4. Access intent is a websphere application server run - time service that enables you to more precisely manage an application s persistence

    訪問目的是websphere application server運行時服務,它允許您更加準確的管理應用程序的連續性。
  5. In this paper, on the basis of previous research works, the ivth system model is studied, and results are compared with the ii th one, and we get expressions for the transfer probability of the customers pij, the mean number of customers in the steady state m, and the mean detained time of the customers in the system w. so far, the theory foundation of the contention - collision elimination access mode has been established for its application

    其中競爭?沖突淘汰存取方式類、類、類、類系統模型的數學建模已經完成。本文就類系統模型進行了數學建模,提出了顧客轉移概率p _ ij 、平穩狀態下系統平均隊長( ? ) 、顧客平均等待時間w等的算式。
  6. We can take dsp to realize fast encryption algorithm because of its highly parallelism, application - specific hardware logic, and application - specific instructions. pci transaction and dsp processing of data can take place simultaneously for its dual - access ram ( daram ) and host port interface ( hpi ). and, the time taken for interruption almost can be ignored because of deep buffer technology

    Dsp具有高度的并行結構、專用硬體邏輯以及許多專用指令,可以實現快速加密演算法, dsp的雙訪問ram ( daram )和主機并行介面( hpi )可以實現數據pci傳送和dsp處理同時進行,另外採用了深度緩沖技術,使花在主機中斷上的時間幾乎可以忽略不計,所以基於dsp的計算機數據加密卡pcijmc2000獲得了較高的處理速度。
  7. Provides access to culture - specific resources at run time and controls how the application retrieves resources using the resource fallback process

    提供在運行時對特定於區域性的資源的訪問,並通過使用資源后備進程式控制制應用程序檢索資源的方式。
  8. Class provides access to culture - specific resources at run time and controls how the application retrieves resources by using the resource fallback process

    類提供在運行時對特定於區域性的資源的訪問,並通過使用資源后備進程式控制制應用程序檢索資源的方式。
  9. The el gives us easy access to application data and makes it easy to manipulate that data without scriptlets or request - time expressions

    El使我們可以容易地訪問應用程序數據並更容易在不使用腳本或者請求時表達式的條件下操作這些數據。
  10. Cold startup, in which all the assemblies in an application must be loaded from the hard disk, does not benefit as much from native images because the hard disk access time predominates

    而冷啟動(應用程序中的所有程序集必須從硬盤上加載)則不會從本機映像中獲得相同的益處,因為硬盤訪問時間佔了很大比重。
  11. I agree to abide by the respective terms and conditions stated on this application form for using 56k dial - up internet access service of hkbn and any terms and conditions in force from time to time

    本人同意遵守此申請表格上所列香港寬頻56k撥號上網服務之使用細則及條款,包括不時生效之細則及條款。
  12. The ethernet which is used widely at present is a typical non - real - time network because of access conflict that leads uncertain data transmission time. if we want to realize real - time application in the current software and hardware environment of ethernet, we must solve the question of access conflict

    而目前應用極為廣泛的以太網由於訪問沖突問題,其數據傳輸時間不確定,是一種典型的非實時網路,如果要充分利用現有的以太網軟硬體環境,實現實時應用,就必須設法解決以太網的訪問沖突問題。
  13. Firstly upon the real - time operating system rex, we study the module of ui task, adopt the in - level finite state machine mechanism, and give the total architecture design of the ui task, at the same time, realize the functional routines of the application, the definition of data structure, the design of interface etc ; then, we study the access strategy design of flash data and the display implementation design of lcd ; and study multi - language mechanism, design and implement text input method and display of multi - language ; finally, it evaluates the analysis and design of embedded software and makes a summary

    同時,設計開發了一些功能模塊,包括數據結構定義,各種介面實現等。然後,研究了以flash為存儲介質,對數據的存儲管理的實現;以lcd為顯示媒介,對數據的顯示管理的實現。接著研究了移動終端的多語言機制,設計並實現了多語言文本的輸入法及字元顯示功能;最後,本文對cdma移動終端嵌入式軟體的分析、設計進行了評估與總結,並對未來的工作進行展望。
  14. Providing interface for users, so they can monitor packet, inquire about log, manage control rules, set system settings, set user access of network, set network neighborhood, set web site, set access time. application and driver capture and filter packet in the internet. the firewall can record and display the log of accesses, store and display the control rules, and monitor accesses in real time

    對提供用戶界面進行封包監視、日誌查詢、控管規則的管理、系統設置、訪問網路的設置、網上鄰居的設置、網站設置和訪問時間的設置的顯示;應用層封包截獲和過濾;驅動層封包截獲和過濾;訪問動作的日誌記錄和控管規則的存儲和顯示;設置控管規則、訪問時間、訪問網路、網上鄰居、網站和系統設置;實時監控等六個功能進行了建模開發。
  15. If the application will support many users, or if the list of users is likely to change over time, consider establishing roles to manage user access

    如果應用程序將支持若干用戶,或如果用戶列表可能隨時間的推移而更改,則請考慮建立角色以管理用戶訪問。
  16. At the same time, a cbd method through layered development was presented. 2. from the domain requirement of fcis, through the analysis of the concepts and characteristics of application framework and opening system, this paper presented a open distributed fcis integration framework - oaff which was composed of the function components, data access service, gis framework

    ( 2 )對應用框架和開放式體系結構的基本概念和特點進行了分析,從防汛系統特定領域應用需求出發,提出了一個開放分散式防汛信息系統集成框架oaif , oaif由功能構件、數據存取服務、地理信息框架組成,幾個部分結合在一起實現一般防汛信息系統的功能。
  17. To access all that information, the application would invoke every accessor method for every column - that s five method invocations, each one sucking up just a little more rmi traffic time

    為了訪問所有信息,應用程序為每列調用一個取值方法共有五次方法調用,每次都會多佔用一點rmi通信時間。
  18. Based on the analysis of the evolution of the structural parameters of non - pillar sublevel caving of mines both in and outside china, it is pointed out that increasing continuously the sublevel height is not suitable for application in china because of the limitation of various factors while increasing the access space is the main way to reduce the amount of developing work, reduce the mining cost and increase the one - time caved ore amount so as to raise the mining strength and the labour production rate

    分析了國內外礦山無底柱分段崩落法結構參數演變過程后指出,繼續增大分段高度由於諸多因素的限制,在我國並不適宜推廣應用,而增大進路間距卻是減少採準工程量、降低采礦成本、增大一次崩礦量、提高采礦強度和勞動生產率的主要途徑。
分享友人