access constraint

英 [ˈækses kənˈstreɪnt] 美 [ˈækses kənˈstreɪnt]

存取约束

计算机



双语例句

  1. Note: If you need to access resources that require authentication, you can specify a second servlet mapping that is associated with a security constraint.
    注意:如果您想访问需要认证的资源,那么您可以指定第二个与安全性限制相关联的servlet映射。
  2. Despite positive political momentum over the past year, physical and economic access to food remains a major constraint.
    尽管过去一年出现了积极的政治势头,但是获得粮食的实际机会和经济能力仍然是重大的制约因素。
  3. A class level constraint has access to the bean instance rather than one of its properties and applies some constraint logic based on several properties.
    类级别的约束能获取Bean实例,而不是它的某一属性,还能应用一些基于若干属性的约束。
  4. Insecurity, with the resulting lack of access to disease-endemic areas, is a major constraint, especially in countries where cases are still occurring, namely Chad, Ethiopia, Mali and South Sudan.
    不安全状况会使人们难以进入疾病流行地区,这是一项主要制约因素,尤其是在那些仍然发生病例的国家,即乍得、埃塞俄比亚、马里和南苏丹。
  5. The pulse designed here not only was limited to time so as to reduce the multiple access interference but enhanced the spectrum utilization efficiency under the spectral mask constraint, which improved the transmission quality of a UWB system.
    所设计的脉冲不仅时间上受限减少了多址干扰,而且在满足频谱模板的情况下提高了频谱利用率,改善了UWB通信系统的性能。
  6. A Key-Lock mechanism of access control with multiple checks is provided. The linear transformation and nonlinear constraint are used.
    本文借助于线性变换和非线性约束,设计了一种具有多重检查能力的钥锁式存取控制方法。
  7. In addition, nearly all state-owned commercial banks are decreasing their branch agencies in the counties, remote cities and towns, where formal financial services appear vacuum and SMEs lack of access to finance to be a serious constraint.
    此外,几乎所有国有商业银行都在撤销在农村和边远地区的分支机构,这将使正规金融出现真空,中小企业融资面临更多的困难。
  8. Selection of market access mode of multinational hotels is the result of the weighing between risk and benefit on the part of multinational hotel groups and host institutions and bargains with each other under the constraint of lots of factors.
    跨国饭店市场进入方式的选择是在众多影响因素的约束下,跨国饭店集团和东道国通过对各自面临的风险与收益的权衡,以及最终双方讨价还价的博弈结果。
  9. The traditional RBAC model cannot express complicated workflow secure access control constraint.
    传统的RBAC访问控制模型已经不能表达复杂的工作流安全访问控制约束。
  10. During the implementation of identity authentication and access control system, it brings out several key technologies such as dynamic permission control, dynamic constraint.
    NET开发技术,重点论述了动态权限控制、动态角色分配、动态约束控制等关键技术的实现路线。
  11. Usually, database system often have many transaction concurrently, these transaction maybe access the same data, causing many problems, such as update losing, non-consistent reading and integrity constraint breaking.
    通常情况下数据库系统总是有若于今事务在运行,这些事务可能并发的存取相同的数据,由此带来了丢失更新、不一致读、破坏完整性约束等问题。
  12. Using control flow and data flow analysis with demand-driven techniques, it builds the linear constraints of statements that access memory or call a function, and transforms the problem of buffer overrun detection into the problem of linear constraint resolution.
    通过需求驱动的控制流分析和数据流分析,建立内存访问语句和函数调用语句发生溢出的线性约束,从而将缓冲区溢出的检测问题转换为线性约束求解问题。
  13. Secondly, considering that PCS law may not be available during transmission, a prescribed switching law is adopted to describe access constraint.
    其次,考虑到传输过程中PCS规则可能不一定适用,我们采用指定的切换序列描述传输受限。
  14. Propose a heuristic method to tackle the issues of fault tolerance access point ( AP) placement with QoS constraint in wireless local area networks.
    提出了一种启发式算法来解决在无线局域网络中,考虑失效容忍和QoS约束的访问点放置问题。
  15. In the context of NCSs, since communication capacity and bandwidth of the network are limited, only parts of sensors and actuators are allowed to exchange information with a remote controller, which is named medium access constraint or channels limitation of NCSs.
    然而由于网络通信资源有限,在任意时刻只有部分传感器和执行器能够与控制器进行数据交换,这称为介质访问约束或者信道受限。
  16. In order to achieve the necessary safety requirements, the role-based access control model Spatial-RBAC, with the spatial characteristics, must meet the three constraints: the constraint on spatial region, the spatial separation of duty constraint and the constraint on cardinality of spatial role activation.
    带有空间特性的角色访问控制模型Spatial-RBAC规定系统达到必要的安全要求须满足一定的空间约束,即空间区域约束、空间角色激活基数约束和空间职责分离约束。
  17. In the existing literature investigating the similar problem, periodic communication sequence ( PCS) and Bernoulli stochastic variable are adopted to describe access constraint and packet dropout, respectively.
    在已有讨论相似问题的文献中,通常采用周期性的通讯序列(PCS)描述传输受限,并采用Bernoulli随机变量描述丢包。
  18. Considering that PCS law may not be available and the current communication status may have some relationship with the prior-known information, we use two independent Markov chains to describe the access constraint and packet dropout, respectively.
    考虑到PCS通信规律不一定适用,并且当前通信状态可能与先前信息有某种关系,我们采用两个独立的Markov链分别描述传输受限和丢包。
  19. The model of NCS with medium access constraint is established in the Mixed Logical Dynamical framework.
    在混合逻辑动态模型的框架下对具有介质接入约束的网络控制系统进行建模。
  20. When we share the information and access the resource, we must consider the security of the system that we access. Access control is a security service mechanism, which constraint the action to the resource to insulate the sensitivity information.
    在进行信息共享和资源访问的同时,必须兼顾到系统的安全性,而访问控制正是一种通过约束用户访问行为而达到对敏感信息进行隔离目的的安全服务机制。
  21. Based on the theory of open innovation, this thesis analyzes the impact of open innovation on the paradigm for enterprises to obtain sources, and suggests that access to external resources considerably eases the constraint imposed on organization by the scarcity of internal resources.
    基于开放式创新的理论视角,本文首先分析了开放式创新模式对企业获取资源方式的改变,多种外部资源的使用攻破了内部资源稀缺所带来的限制。
  22. Propose some advices: Perfect the right to freedom of association, release access system; Make legal status in ESO cleared, rationalize the relations; Clear the main content of Economic Autonomy; at last, perfect the structure models, which constraint Economic Autonomy.
    提出,完善自由结社权,放宽准入制度;明确经济自治团体的法律地位,理顺相关关系;明确经济自治权的具体内容;完善经济自治权约束结构模型。
  23. Compared with some existing models, signal quantization and packet dropout compensation are more properly considered in this new model. A new model describing packet dropouts, time delays, signal quantization, and access constraint is proposed for the following reasons.
    相比于已有文献,该模型更合理地考虑了量化和丢包补偿等问题。基于如下考虑,提出了一个同时描述丢包、时滞、量化和传输受限的新模型。