英语人>网络例句>UNIX 相关的网络例句
UNIX相关的网络例句
与 UNIX 相关的网络例句 [注:此内容来源于网络,仅供参考]

Operation as a function of the document description and code, containing all the file manipulation functions, suitable for the windows...

操作文件的函数的说明和代码,包含了所有文件操作的功能,适合在windows和unix下运行。

We're either looking at a file because it has a well-known name and defined format or because it has a well-known filename extension that indicates the format of the contents.

同时我们针对的是对文件的操作,因为在Unix它有固定的格式或者在Windows中它有扩展名表示其内容的格式。

The file uses a simple, classically UNIX free-format syntax, but can become forbiddingly complicated when a user has POP3 and IMAP accounts at multiple sites.

这个例子,可以看一下Listing 1,是一些我的简化版本。

The incapability of access control mechanism of Linux/Unix in defending malware is shown.

第二,设计了适合在安全操作系统中实施的恶意代码防御框架。

We develop the optimal JAPE grammar rules for IBM and HP web pages that describe IT product specification and download 36 IT product web pages to test the extraction performance. The testing result show the average recall and precision are over 90%. It reveals the JAPE grammar rules have good extraction performance when optimized for specific knowledge domain.

我们针对HP和IBM的网页撰写适当的JAPE语法规则,再从这两家公司的个人电脑(包含Desktop和Notebook),Unix伺服器,显示器及印表机等四大产品线,抽样36个网页进行产品规格的资讯撷取,其平均召回率和正确率都超过90%以上,由此可以验证JAPE语法规则针对特定领域的资讯撷取有相当不错的效能表现。

It is a multiplatform toolkit. It runs on all major operating systems. Including Unix, Windows and Mac.

它是一个多平台的工具包,可以在所有的主流操作系统上运行,包括Unic,Windows和Mac。

Generally, the traditional Intrusion Detection Techniques can be categorized into anomaly detection or misuse detection. Based on the mechanism of computer immune system, this paper presents a new anomaly detection technique to detect intrusion into computer system. In this technique, a Markov chain model is used to represent a temporal profile of normal behavior of a process. The Markov chain model of normal profile can be created by learning the historic data of the sequence of system calls produced by privileged processes running on UNIX system.

传统的入侵检测技术,依照所基于的原则不同,通常分为误用入侵检测与异常入侵检测,本文在入侵研究中所采用的计算机系统免疫思想的基础上,提出了一种新的异常入侵检测技术,通过对特权进程系统调用序列的历史数据的学习,用马尔可夫链模型来建立特权进程的正常时态行为轮廓。

Philosophy is an outgrowth of Unixexperience, and it is an excellent complement to this book.

作者的理论是从Unix的经验中得来,它可以作为本书很好的一个补充。

They lack facilities to create additional links to a directory, rename parent links (".." in Unix-like OS), and create bidirectional links to files.

它是数据的组织者和提供者,至于它的底层,可以是磁盘,也可以是其它动态生成数据的设备。

UNIX System V/386 Release 4 Programmer's Reference Manual.

本书是针对Intel80386处理器的SVR4实现的程序员参考手册。

第25/29页 首页 < ... 21 22 23 24 25 26 27 28 29 > 尾页
推荐网络例句

Do not gum up the work by telling mother what we are going to do .

别告诉母亲我们要干的事,那会把事情搞糟的。

In recent years, application of the partial prestressed concrete beam s is developed.

近年来,随着部分预应力砼梁应用的推广,发现我国规范所采用的名义拉应力法的计算结果不稳定。

Gorky once said:"If it is not a book, I'd be stupid and indecent drowning."

高尔基曾说:"如果不是书籍的话,我就要被愚蠢和下流淹死。"