time stamp 中文意思是什麼

time stamp 解釋
記時印表機
  • time : n 1 時,時間,時日,歲月。2 時候,時刻;期間;時節,季節;〈常pl 〉時期,年代,時代; 〈the time ...
  • stamp : n 1 戳子,圖章,戳記,印記。2 郵票,印花(稅)。3 〈常用 sing 〉標記;特徵;記號,痕跡。4 壓型器...
  1. 9 check the revocation list on the time stamp signer

    9檢查時間戳簽名程序上的吊銷列表。
  2. With audio as master media stream and video as slave stream, the scheme makes a comparison between the presentation time stamp of the audio frame and the video frame which are played back recently to synchronize the presentation of video sequence with audio sequence

    並以音頻流為主媒體流,視頻流為從媒體流,比較最近播放的音頻幀和視頻幀的播放時間標簽,調整視頻幀的播放持續時間來取得音視頻媒體間同步。
  3. Date and time stamp

    可撥動時間日期的日戳
  4. Time stamp - the evaluation s time stamp

    時間戳評詁時間戳
  5. A time mark or notation that indicates the date and the time of an action, and the identity of the person or device that sent or received the time stamp

    時間標示顯示行動的日期和時間,及發出或收取該時間標簽的人的身分或裝置的時間標記或標示。
  6. The theoretic basis and the dat agram format of the newly propounded rts method are presented. finally, in the protocol stack of ip over ethernet, after the analysis of plesiochronization method and external clock method, a new synchronization method of absolute time stamp ( ats ) method is put forward, and detailed discussion is presented in this thesis

    針對物理層不能提供同步的情況(如ipoverethernet ) ,本文在分析基於外部同步信息的準同步法和外同步法以及基於業務碼流的自適應時鐘法之後,提出了一種新的絕對時標法,並對該方法的實現進行了較為詳細的研究。
  7. Transaction can be assigned a unique identifier ( time stamp ) which can be through of as the transaction ' s start time

    任何處理元執行時,均將它開始執行的時間當作一個唯一的識別(時間戳記) 。
  8. Procedure tells the computer operator which task the application is about to perform, and also displays a time stamp

    過程通知計算機操作員應用程序將要執行哪個任務,並且還顯示一個時間戳。
  9. And introduces the authentication centre ( ca ) for allocation and conservation of the secret key. the authentication centre uses a time - stamp, which proves the watermark embedded time and resists the interpretation attack effectively. at the same time, a trusted third party ( ttp ) is introduced to the open watermark, which brings out a feasible standard watermark model for the author, user and the authentication

    最後,提出了一個完整的版權保護的水印框架,其中引入了分配和保存密鑰的認證中心,該認證中心還有提供時戳的能力,有力地證明了水印嵌入時間,能有效地抵抗解釋攻擊;同時為水印的公開化引入了可信任第三方,為商家、用戶和認證之間提出了一個可行的規范的水印模型;並從理論上分析了該模型的抗攻擊能力。
  10. We print the current time stamp back into the page

    我們將當前的時間戳顯示到頁面上。
  11. Presentation time stamp

    出現時間標記
  12. Gets the raw, high - fidelity time stamp

    獲取原始的高保真時間戳。
  13. One common task would be retrieving the value of an automatically generated identity field or time stamp from the data source. the

    一項常見的任務是從數據源中檢索自動生成的標識欄位或時間戳的值。
  14. The number of groups is much smaller than the number of actual connections. lfrr deals with these groups. when lfrr allocates slots, groups with large weight have high priority to possess slot, instead of choosing minimum value from each connection ' s time stamp to decide the slot allocation

    Lfrr在確定連接的時隙分配時,採用權值大的連接優先分配的原則,改變了一些wrr改進演算法從各個連接的時間標簽中選取最小值的做法,因而降低了實現復雜度。
  15. A memory dump file name includes a time stamp for the time when the nsd was generated

    內存轉儲文件名包含一個時間戳,表示生成nsd時的時間。
  16. Wosign code signing certificate test page no time stamp

    Wosign代碼簽名證書測試頁面沒有加時間戳
  17. Because authentication is apart from data transpoart later and the authentication has no time stamp or nonce, when received information the bluetooth device does n ' t tell from the information is new or out of date. so authentication is easy attacked by so called middle man. we may solve this by introduce time idea at authentication. one is operate the bluetooth device address and bluetooth clock and take the value as bluetooth device, the other is start a timer at authentication

    由於鑒權過程和後面的數據傳輸是分開的,同時鑒權過程又沒有時間戳或現時,藍牙設備收到信息后不能辨別所收到的信息是新的信息還是過時的信息,所以鑒權過程易受「中間人」攻擊。可以在鑒權過程中引入時間概念,一是將藍牙時鐘與藍牙設備地址進行某些操作,操作后的值作為鑒權時的藍牙設備地址輸入;二是在鑒權開始時啟動定時器。
  18. Creates an authenticode time - stamp signature for a signed file

    為簽名的文件創建authenticode時間戳簽名。
  19. In the former instance, the author has propounded three synchronization methods. they are " network clock extraction method ", " adaptive clock method " and " residual time stamp method ( rts ) "

    在物理層能夠提供同步的情況下(如ipoversdh pdh ) ,本文提出了網路時鐘提取法、自適應時鐘法和剩餘時標法等三種方法。
  20. The root is not trusted as the time stamp root

    該根不被信任為時間戳根。
分享友人