stack architecture 中文意思是什麼

stack architecture 解釋
堆棧結構
  • stack : n 1 (麥桿等的)堆,垛;乾草堆。2 積材,層積,堆積;〈英國〉一堆〈木材等的計量單位,=108立方英尺...
  • architecture : n. 1. 建築學。2. 建築(樣式、風格);建築物。3. 構造,結構;【自動化】(電子計算機的)架構,體系結構。
  1. Figure 1 depicts the gama architecture ; the gama server software stack is on the right

    圖1給出了gama的體系結構;右邊是gama服務器軟體結構。
  2. Vxworks is a embedded realtime os. the ipv4 protocol stack in vxworks is ported from 4. 4 bsd, with realtime capability enhanced. so, the network software architecture in vxworks is similar to 4

    Vxworks是一種嵌入式實時操作系統,其ipv4網路協議棧是通過移植bsd4 . 4中的ipv4協議棧實現的,所以其網路軟體的體系結構與bsd4 . 4的網路體系結構類似。
  3. This thesis has made thorough research to ipsec protocol architecture and esp protocol and ah protocol. it has proposed the design methods of realizing vpn security gateway based on ipsec protocol under linux, and has discussed in detail the implementation of esp protocol and ah protocol in tunnel mode, as well as the secure kernel improvements to ip protocol stack on linux vpn security gateway machine

    本文對ipsec的體系結構、 esp協議、 ah協議進行深入研究,提出了在linux上實現基於ipsec協議的vpn安全網關的設計方法,並討論了在隧道模式下esp協議和ah協議在linux上的的具體實施和對linuxvpn安全網關上內核ip協議棧的安全內核改造。
  4. There are no push or pop instructions and no dedicated stack pointer register defined by the architecture

    體系結構沒有定義壓入或者彈出指令,也沒有定義專門的棧指針寄存器。
  5. Novel stack cache architecture and data - forwarding mechanism between it and the execution unit are also presented. the relationship between the capacity and the backup frequency of the stack cache is analyzed too

    文中還設計了一種由多體靜態存儲器構成的堆棧緩沖結構,並在堆棧緩沖和執行部件之間採用了數據重定向技術,還對緩沖容量和後援頻度的關系進行了理論分析。
  6. The fault management, configuration management, performance management and account management for cable modem have been realized. at the beginning, the thesis discusses the management functions of the hfc network based on the analysis to the architecture and the protocol stack of hfc

    基本實現了cablemodem的配置管理、性能管理、故障管理和記帳管理,使網路管理者能夠實施基於用戶的管理,進行遠程控制,提供多種業務,提高服務質量和網路性能,從而使hfc網路穩定運行,發揮更大的效益和作用。
  7. The powerpc architecture has no notion of a stack for local storage

    Powerpc體系結構沒有關于本地存儲器的棧的概念。
  8. The main contributions of the thesis are : ( 1 ) we present an end - to - end transport architecture using the rtp / udp / ip protocol stack and employ an efficient and robust packetization algorithm for mpeg - 4 video bit - streams at the sync layer for internet transport. ( 2 ) we study the congestion control mechanism based on aimd algorithm, and make improvement in order to reduce the oscillation of transimition rate due to tremendous contrast of packet loss ratio caused by dynamical change of the network load

    論文的主要貢獻在於:提出了基於rtp的mpeg - 4視頻傳輸模型並充分利用mpeg - 4的videoobjectplane ( vop )特性,採用適用於mpeg - 4視頻傳輸的rw載荷格式及組包演算法,同時具有傳輸的高效性和丟包的魯棒性。
  9. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  10. It uses a stack architecture, meaning instruction operands are loaded to an internal stack before they re used

    它使用堆棧體系結構,這意味著在使用指令操作數之前要先將它們裝入內部堆棧。
  11. Then from the point of system design and development, it gives an specific analysis of bluetooth wireless system feasibility, proposes a dedicated management protocol stack architecture on the basis of software project theory. at last, a suggestion implementation is introduced

    在第一部分的基礎上,從系統實現的角度對系統的架構進行解析,提出專用系統架構設計方案,詳細分析各層的功能與實現,並給出參考實現的詳細設計。
  12. The main contributions of this dissertation are summerized as follows : firstly, take a study on the sip network architecture and session control capabilities. the advantages and disadvantages of the layered network and full - mesh network are assessed, and its impact on the sip stack architecture is analyzed

    本文主要及成果成果在以下幾點: 1 、 sip網路及會話控制能力的深入研究,對比了分級組網與平面組網的優劣,分析了組網會話模型對協議棧架構的重要影響。
  13. In this thesis, the author firstly introduces the realtime embedded os ( realtime operating system ). by interpreting some mechanisms such as task schedule, process management, we discuss os feathers in details. secondly, we learn wap stack layer architecture, and probe into protocol stack ; at last, according system features and requirement, we design middleware porting the wap client into os platform, and make communication between the wap client and os possible

    本文首先介紹了實時嵌入式操作系統,描述了操作系統在任務的調度,進度管理等等方面機制,對嵌入式操作系統進行了深入的探討;然後描述了wap協議的分層結構,並對協議的內容進行了詳細的講解;同時根據系統平臺的特點設計了中間層,從而實現了微瀏覽器到系統平臺的移植,並且在此基礎上實現了應用程序的開發。
  14. In order to build a secure web services architecture, security issues of all layers of the web services stack should be carefully tackled, as vulnerability will invite malicious attackers to penetrate the system

    為建設安全的網路服務架構,必須慎重處理網路服務堆疊中所有層次的保安問題,因為網路服務若有任何漏洞,便可能招致黑客惡意侵入系統。
  15. The most interesting part of this architecture is that you can add and remove complete components from the geronimo stack by editing the plan files and changing the xml declaration of the gbeans

    該架構最有趣的部分是,可以通過編輯計劃文件和更改gbean的xml聲明,來向geronimo堆棧添加和刪除完整組件。
  16. I ll then give you a detailed look at the mechanisms underlying the java 2 platform security architecture s runtime access checking feature, including the stack inspection and traversal mechanism for determining whether or not a permission is to be granted

    然後詳細分析java 2平臺安全體系結構的運行時訪問檢查功能的底層機制,包括堆棧檢查和確定是否授予權限的遍歷( traversal )機制。
  17. Chapter 4 focused on our communication stack software design with four parts : software architecture, unit module, module interfaces and unit integration. chapter 5 detailed some main methods and processes used in testing our communication stack software

    第四章設計的通信棧軟體建構在通信棧關鍵技術研究的基礎上,主要闡述了軟體框架、單元模塊、介面和集成四個方面的設計。
  18. Using ethernet technology, hse interoperating with foundation fieldbus hi, is one of the most valuable industrial ethernet technologies. also, hse provides very important reference to industrial ethernet standardization. chapter 2 provides the architecture of hse and its communication stack model

    Hse現場總線利用以太網技術與基金會低速現場總線實現了互操作,是當前比較熱門的一種工業以太網技術,它對工業以太網的標準化具有重要的參考價值和意義。
分享友人