英语人>网络例句>访问控制 相关的搜索结果
网络例句

访问控制

与 访问控制 相关的网络例句 [注:此内容来源于网络,仅供参考]

If the destination IP address is local ,the router searches an internal store of IP addresses and local-device Media Access Control addresses. This store is known as the Address Resolution Protocol cache.

如果目的IP地址为本地的,该路由器就搜寻存储着IP地址和本地设备介质访问控制地址的内部存储器,这个存储器叫作地址分辨协议高速缓存。

In addition, access control policies of aggregated resources can be formulated as expressions of the algebra. Several algebraic properties of policy expressions are discussed. It shows that the algebraic properties of policy expressions can be used to verify whether policy composition results meet the protection needs of each party.

用代数表达式形式化地描述聚合资源的访问控制策略,讨论了策略表达式的若干代数性质,说明可借助策略表达式的代数性质去验证策略合成结果是否符合各方对聚合资源的保护性需求。

IEEE 802.1x network access control protocol based on port consists of supplicant, authenticator and authentication sever.

基于端口的IEEE 802.1x访问控制协议由申请者、认证者和认证服务器三部分组成。

Access control is an example of authorization.

访问控制是授权的一个例子。

An authorization and access control model for XML documents is proposed in this paper.

提出了一种XML文档的授权与访问控制模型。

The High Speed Uplink Packet Access technology includes Adaptive Modulation and Coding, Hybrid Automatic Repeat Request, and Node B fast scheduling. It also solves the problem of sharing the uplink channel resources for User Equipment.

为了改善上行性能,高速上行分组接入主要考虑的技术包括自适应调制编码、混合自动重传、节点B快速调度,以及用户终端如何共享上行信道资源,同时包括增加增强的媒体访问控制实体,对协议进行增强和优化。

The High Speed Uplink Packet Access technology includes Adaptive Modulation and Coding, Hybrid Automatic Repeat Request, and Node B fast scheduling. It also solves the problem of sharing the uplink channel resources for User Equipment. Moreover, it has Medium Access Control protocol entities (MAC-e and MAC-es) to enhance and optimize the protocol.

为了改善上行性能,高速上行分组接入主要考虑的技术包括自适应调制编码、混合自动重传、节点B快速调度,以及用户终端如何共享上行信道资源,同时包括增加增强的媒体访问控制实体,对协议进行增强和优化。

It also has a centrally managed global contact list and access controls.

也有中心被管理的全球的联系目录和访问控制

Which of the following access lists will accomplish this task when grouped with the e0 interface on the Chicopee router?

在Chicopee路由器的E0接口下列那些访问控制列表能完成这个工作?

An information security assurance system of enterprises is divided into the basic security link, enhancement link and extended security mechanism, which are subdivided into such concrete links as identification and authentication, access control, auditing, fire wall, real-time monitoring and information ciphering.

企业信息安全保障体系分为基本安全环节、增强环节和扩充的安全机制三个层次,其中又细分为身份标识和鉴别、访问控制、审计、防火墙、实时监控、信息加密等具体环节,有些是基本的,有些则并非一定要部署。

第8/28页 首页 < ... 4 5 6 7 8 9 10 11 12 ... > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher