call trace 中文意思是什麼

call trace 解釋
呼叫跟蹤
  • call : vt 1 大聲念[說],喊,叫。2 召喚,叫來,請來;召集,徵召;號召;喚醒。3 把…取名為,稱呼,把…叫做。...
  • trace : n 1 跡,足跡,蹤跡,去向。2 痕跡;證跡,線索,結果;【心理學】記憶痕;【植物;植物學】(脈)跡。3...
  1. Fos + / th + / gfap + and fos + / vp + / gfap + triple labeled n - asc could be found in the mvz, pvn and son respectively ; ( 2 ) under electronic microscope, the astrocytic processes connected closely with the dendrites or axons of the neurons, where the bilateral membranes became thick. we call transiently it electron - dense areas ( edas ). the number of edas increased remarkably following hyperosmotic stimulation ; ( 3 ) when trace retrogradely, wga - hrp was microinjected into the unilateral son, pvn or nucleus of solitary tract ( nts ) respectively using the stereotaxic method, the n - ascs formed by the neurons triple - labeled with hrp / fos / th ( or vp ) and astrocytes labeled with gfap could be found in the mvz, son and pvn respectively ; ( 4 ) after being treated with heperosmotic nacl solution, intracellular calcium concentration in cultured hypothamic neurons and astrocytes increased and then decreased

    腦內gfap陽性結構也明顯增多,其分佈與fos陽性細胞分佈基本一致,表現為胞體肥大、突起粗長; ast緊密包繞在神經元周圍形成神經元- ast復合體( n - asc ) ;在mvz 、 pvn和son三重免疫組化染色切片上可見到fos + th + gfap +第四軍醫大學博士學位論文和fos vp gfap三重標記asc ; ( 2 )免疫電鏡下son內星型膠質細胞突起與神經元樹突或軸突之間接觸部位出現增厚的膜結構一電于緻密區( edas ) ,高滲刺激后數量明顯增多: ( 3 )將們個mp注入大鼠一側n卜、卜卜或孤束核( ws ) ,分別在延髓內臟帶( mvz ) 、 so和pvn內出現fos hrp th 、 fos hrp八p三重標記神經元和gfap陽性標記ast形成的n asc ; ( 4 )高滲刺激使培養神經元和ast內鈣水平先升高后降低,最後維持在比高滲刺激前稍高的靜息鈣水平上。
  2. Abstract : the paper introduces various identification methods for tracing the malicious call and calling identification services in spc telephone exchanges, especially describes the malicious call trace methods by using switch boards and " r " key tandem function and telephone set which can display calling subscriber ' s numbers

    文摘:介紹了程式控制電話交換機追查惡意呼叫和主叫用戶信息識別業務的各種識別方法,特別是詳細介紹了利用話務臺和話機上的" r "鍵轉接的功能,以及利用能顯示主叫信息的話機來顯示主叫電話號碼和追查惡意呼叫電話的方法。
  3. The paper introduces various identification methods for tracing the malicious call and calling identification services in spc telephone exchanges, especially describes the malicious call trace methods by using switch boards and " r " key tandem function and telephone set which can display calling subscriber ' s numbers

    介紹了程式控制電話交換機追查惡意呼叫和主叫用戶信息識別業務的各種識別方法,特別是詳細介紹了利用話務臺和話機上的" r "鍵轉接的功能,以及利用能顯示主叫信息的話機來顯示主叫電話號碼和追查惡意呼叫電話的方法。
  4. Viewing an application s call trace in graphical form can be an educational experience

    可以將以圖形形式查看應用程序的調用過程看作是一個學習經歷。
  5. At array index 0 represents the most recent function call in the stack trace and the last frame pushed onto the call stack

    表示堆棧跟蹤中最近的函數調用以及推入到調用堆棧中的最後一幀。
  6. In this section, you ll learn how to generate a dynamic call graph, which is a nested trace that depicts the pushing and popping of frames on the execution stack as a use - case runs from start to finish

    在本節中,您將學習如何生成一個動態的調用圖,它是一個嵌套的跟蹤軌跡,描繪了用例從開頭運行到結尾的過程中,堆棧幀在執行堆棧上壓入和彈出的過程。
  7. The tool prints the number of native instructions executed in each function with the call trace

    此工具利用調用跟蹤顯示在每個函數中執行的本機指令數。
  8. Additionally, a call trace can identify the maximum call depth of user functions, which you can then use to efficiently bind the memory that the call stack uses an important consideration in embedded systems

    另外,調用跟蹤還可以判斷用戶函數的最大調用深度,這可以用來對調用棧使用的內存進行有效限制(在嵌入式系統中,這是非常重要的一個考慮因素) 。
  9. Minus 1 represents the oldest function call in the stack trace and the first frame pushed onto the call stack

    表示堆棧跟蹤中最早的函數調用以及推入到調用堆棧中的第一幀。
  10. I ' ii trace this call and fucking kill you

    我一定要追查到電話的來源我他媽的要幹掉你
  11. The minimum measured time for a method call to be included in the trace output

    在跟蹤輸出中加入的方法調用的最小測量時間。
  12. As the call chain is parsed from the trace file, a connectivity matrix is built that identifies which functions call which other functions

    在分析跟蹤文件中的調用鏈時,會構建一個連通矩陣,用來表示哪個函數調用了其他哪些函數。
  13. Data collection : capturing a function call trace

    數據搜集:捕獲函數調用路徑
  14. To gather a function call trace, you need to identify when every function is called in your application

    要收集一個函數調用的蹤跡,您需要確定每個函數在應用程序中調用的時間。
  15. The consistently repeated system call sequences in normal process trace were regarded as macros, and then an anomaly detection model based on system call macros markov chain was created

    把正常程序行為產生的系統調用跡中大量有規律的重復出現的系統調用短序列看成一個個獨立的基本單位(宏) ,並以宏為基本單位構建一個基於馬爾可夫鏈的異常入侵檢測模型。
  16. This call has to wait for the server response before returning, so clearly there is a lot of processing going on that s outside what s being covered in the trace - all the server code is running in a separate jvm, without aspectwerkz

    這個調用在返回之前必須等待服務器響應,因此顯然有大量處理是在跟蹤所覆蓋的范圍之外進行的所有服務器代碼都是在沒有aspectwerkz的、單獨的jvm中運行的。
  17. The tool maintains a simulated call stack that contains all the assemblies involved in the code path trace

    該工具維護一個模擬調用堆棧,堆棧中包含代碼路徑跟蹤中所涉及的所有程序集。
分享友人