英语人>网络例句>code 相关的网络例句
code相关的网络例句
与 code 相关的网络例句 [注:此内容来源于网络,仅供参考]

The code has remarkably features of perspicuous structure, friendly interface, good data security and easy maintenance. Compared with COMMIX code of the Argonne National Lab of USA under a simple smallscale example, PCCSAC-3D code is proven to be believable.

通过对一个小尺寸的算例进行的计算,并与美国Argonne国立实验室用COMMIX程序对同一算例的计算结果进行的比较,验证了PCCSAC-3D程序的可信性。

A kind of visual prediction and analysis framework of the execution time of real-time software based on program flowchart is proposed in the paper. The key issues of implementing the framework are discussed in detail, including creating the mapping between intermediate code segment and statement line of source code, retrieving the time of any given program segment from the perspective of CPU cycles of goal machine instruct, calculating CPU cycles of statement lines of source code, point-to-point WCETC (worst case execution time calculated) analysis algorithm based on program flowchart, and transforming CPU cycle into physical time.

提出了一种基于控制流程图的程序执行时间的可视化分析框架,研究了中间代码段与源程序中语句的对应关系的自动分析、源程序语句行的CPU周期数的提取和计算方法、基于控制流程图的点到点最大时间分析算法和CPU周期的绝对时间估计方法。

The traditional software that reduce toxin is with the feature code means reduces toxin, diagnostic code takes virus example former course namely, put forward a paragraph of of similar dactylogram unique code in the program, add in the software that reduce toxin, scan next all files, if have yard of this paragraph of feature, it is virus, can be killed.

传统杀毒软件都是以特征码方式杀毒,特征码即把病毒样本原程序拿到,提出程序中类似指纹的一段独一无二的代码,加到杀毒软件中,然后扫描所有文件,如果有这段特征码,就是病毒,即可被杀掉。

According to using easy company network safe expert introduces: According to the frangibility of Web application process that OWASP organization released 2007 the statistical result of 10 big ranks makes clear, the flaw of the script that cross a station, infuse, request that cross a station is forged, information divulges the problem that waits for a respect to remain the hacker's at present popular attack way, and be atttacked with SQL infuse especially among them and cross station script attack to attach most importance to, the lawful sex that infuse of so called SQL is atttacked even if uses programmer to do not have pair of user data-in when writing code undertakes judging, bring about the person that inbreak to be able to command through insert and carrying out baleful SQL, obtain data to read the attributive; that take and revises and attack of the script that cross a station is join baleful code through be in the webpage, when the person that visit browses a webpage, the administrator of means prevail on that baleful code can be carried out or ceases through giving an administrator post a letter is browsed, win administrator limits of authority thereby, control whole website.

据动易公司网络安全专家介绍:根据2007年 OWASP 组织发布的 Web 应用程序脆弱性10大排名的统计结果表明,跨站脚本、注入漏洞、跨站请求伪造、信息泄露等方面的问题仍然是现在黑客流行的攻击方式,而其中尤以SQL注入攻击和跨站脚本攻击为重,所谓的SQL注入攻击就是利用程序员在编写代码时没有对用户输入数据的合法性进行判定,导致入侵者可以通过插入并执行恶意SQL命令,获得数据读取和修改的权限;而跨站脚本攻击则是通过在网页中加入恶意代码,当访问者浏览网页时,恶意代码会被执行或者通过给治理员发信息的方式诱使治理员浏览,从而获得治理员权限,控制整个网站。

If this is the case, then it might be that the place where the program put the object is an area which is used by the program code itself, If this data is not really a drawable object but rather an executable code, the fact that it was put (because of the illegal coordinates) outside the region which belongs to data, and in a region which belongs to the program, might cause this code to be executed.

如果是这样的话,那么它可能是地方节目,把对象是一个地区,是由程序代码本身,如果这个数据是不是真正的可绘制对象,而是一个可执行代码的,但事实上,这是把以外的地区属于数据,并在一个地区,其中属于该计划,可能会导致这样的代码被执取消。

One is the Extended Binary Coded Decimal Interchange Code.This code is used in IBM mainframe models and in similar machines produced by other manufactures.The other 8-bit code is ASCII-8,an 8-bit version of ASCII that is frequently used in the larger machines produced by some vendors.Fig. 1-6 presents the 8-bit format and shows how selected characters are represented in these 8-bit codes.

一种是扩展的二-十进制交换码,该编码用于IBM大型计算机及其他厂家生产的类似机器中;另一种8位编码是ASCII-8,是ASCII代码8位格式,常用于一些厂商生产的较大机器中。8位编码的格式及如何表示所选字符如图1-6所示。

Four full adder original code, including the simulation code and four counter code.

4位全加器原码,包括仿真码和4位计数器码。

When the generator polynomial of a given linear rank distance code possesses generalized continuous roots set, the sufficient condition that makes the given linear rank distance code forming rank distance BCH code is discussed.

他们指出当线性秩距离码的生成多项式的根集不是连续根集时,确定秩距离码的最小秩距离以及构做极大秩距离码是未解决的问题。

The symbol bar code reading, there are two rectangular in shape, bar code symbol, optical scanner line graphics information drdw systems'dominant is the bar code symbol to read and and recognition.

条码识读的标记有两栽,条码标记为不幼不圆形线条图形,平教扫描器的新闻读不入编制次给就是差这些条码标记举动浏览和和辨别。

And we have given Hadamard matrix in detail in block design, coding and the specific application in communication., Hadamard code as a nonlinear combinatorial code has catered to the need of development of computer technology, stock systematic data and high speed for realizing and reliable access, request the error control code has not only little redundancy, but also can parallel encoding and decoding with high speed.

Hadamard码作为一种非线性组合码,迎合了计算机技术的发展对实现存储系统数据高速且可靠地存取,要求所采用的差错控制码不但冗余度小,还应当能高速并行编码和译码的需要。

第11/100页 首页 < ... 7 8 9 10 11 12 13 14 15 ... > 尾页
相关中文对照歌词
Code Red
Bro Code (The Motto Freestyle)
I Got A Code In My Doze
Code Of Silence
Code Of The West
Time Code
Arc Of Time (Time Code)
File Code #1459
Rebel Code
Snake Code (Caribbean Death Roulette)
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher