proxy data 中文意思是什麼

proxy data 解釋
代用資料
  • proxy : n. 1. 代理(權);代表(權);代理投票。2. 代理人,代表人;代用品。3. (對代理人的)委託書。
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  1. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代理作為一種先進易用的防火墻技術的原理,闡述了linux操作系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  2. A multimedia proxy server model is proposed based on the layer - encoding model. the server model makes the server ' s cache be used effectively and can adapt the changing of network bandwidth. in the server model, the data quality of a program stored in the server ' s cache, is directly related to the requesting frequency and requested bandwidth of the program

    本文提出了一套基於分層編碼模型的多媒體代理服務器模型,該模型能自動適應國防科學技術大學研究生院學位論文工nternet中的帶寬變化,充分利用代理服務器的cache空間,並使cache中緩存的多媒體數據質量與其點播頻率和點播帶寬成正比。
  3. Because the maximum amount of data allowed in hidden fields can vary with different firewall and proxy implementations, large hidden fields can cause unpredictable behavior

    由於隱藏欄位中允許的最大數據量隨所採用的防火墻和代理的不同而異,因此較大的隱藏欄位會導致發生不可預知的行為。
  4. ( 2 ) researching on the method of defending data security and the architectures of computer network firewall, and constructing the prototype of cf firewall. ( 3 ) researching on the packet filter technology in computer network firewall, designing and realizing cf _ firewall packet filter router. ( 4 ) researching on the proxy technology in computer network firewall, discussing the applications of proxy technology in computer network, designing and realizing cf _ firewall http proxy server and cf _ firewall ftp proxy server

    主要研究內容如下: ( 1 )提出並討論協同設計網路安全問題,指出進行協同設計網路安全環境方面研究的必要性; ( 2 )研究網路安全防範機制和網路防火墻體系結構,建立cf _ firewall網路防火墻原型系統; ( 3 )研究網路防火墻包過濾技術,設計並實現cf _ firewall過濾路由器; ( 4 )研究網路防火墻應用代理技術,討論代理技術的實用性,設計並實現cf _ firewallhttp代理服務器和cf _ firewallftp代理服務器; ( 5 )研究反向代理技術和vpn技術在建立協同設計網路安全環境里的作用,以指導具體的協同設計網路安全環境的方案選型。
  5. A flow control and the related user interface are designed designs according to the uniformed data exchange theory and using email and intelligent proxy method, and a examples of modeling and analysis for drafting design flow in the product deign is given

    根據以上的設計研究,本文實現了支持計算機協同設計的工作流的圖視化定義並通過統一的數據交換機制,利用電子郵件及智能代理等方式對流程進行控制。
  6. The proxy data for this request

    此請求的代理數據。
  7. You can connect your report to almost any database source, as well as to proxy data, such as a result set for example, an ado. net

    可以將報告連接到幾乎所有的數據庫源以及代理數據,例如結果集(如一個ado . net
  8. Then you can connect your report to almost any database source, as well as to proxy data, such as a result set for example, an ado. net dataset

    然後,可以將報表連接到幾乎所有數據源以及代理數據,例如結果集(例如,一個ado . net dataset ) 。
  9. Based on detailed analysis of security framework of j2ee and jboss, the thesis gives description of security problem from data and data operation aspects, and provides a data transmission solution based on rmi plus ssl, a data access control solution based on wwwwwh ( who, where, when, what, which, how ) security policy. the real system provides the security solution through proxy, which not only assures the high security of the system, but also improves the flexibility of the system

    本文在分析了jzee和jboss的安全框架的基礎上,從數據與操作兩個方面對ip網路管理系統存在的安全問題進行了剖析,並從數據安全和系統效率的角度提出了rmi + ssl的安全數據傳輸方案、基於wwwwwh ( who , where , when , what , which , how )的訪問控制策略,並以安全代理模式實現了上述解決方案,從而不僅保證了數據傳輸和訪問的高安全性,也加強了系統的靈活性。
  10. The stub data is used by custom proxy users to decide what to do with an incoming method call

    自定義代理用戶使用存根( stub )數據確定如何處理傳入的方法調用。
  11. Data minding as we call, which refers to extracting interested knowledge from large database or data warehouse. the network accounting system of the paper compare the traditional methods, the design and realization of network accounting system is based on proxy

    在介紹了入侵檢測系統之後,本論文在比較了傳統的計費方法的基礎上,提出和實現了一種適合本園區網特點的基於代理服務器的計費管理系統。
分享友人