您的Portlet可以访问表1所示的模型。
建立访问表并且把它们应用到接口上。
这里的问题是如何访问表数据,可能一次访问所有数据。
The problem here is in how the table data will be accessed, which is all at once.
通过建立表、访问表来实现树的存储和广度优先搜索。
Tree breadth-first search and tree memory can be fulfilled by setting up and making access of data list in the paper.
访问表的应用程序能够在停止时立即看到好处:这就是真正的可用性。
Applications accessing the table would immediately see the benefits up to the point to where it was stopped: that's real availability.
XANDOR元素指定应当通过XAND OR计划访问表order。
The XANDOR element specifies that the table ORDER should be accessed using a XANDOR plan.
values语句提供了一个无需访问表或视图即可执行sql语句的方法。
The VALUES statement provides a method for executing a SQL statement without accessing a table or view.
这意味着,即使是在用户访问表的同时,也可以改变表的存储位置。
This means that even while users are accessing a table, you can change where the table storage resides.
ACCESS元素进一步指定必须使用某些xml索引来访问表custacc。
The access element further specifies that some XML index must be used to access the table CUSTACC.
IXAND访问请求元素要求优化器使用indexanding访问表。
The IXAND access request element directs the optimizer to use index anding to access a table.
例如,盲人如何才能访问表中可视化格式的信息,或图标、树或者滚动列表呢?
How would a blind person access the information visually formatted in a table, for example, or an icon, a tree, or a scrolling list?
CBAC并非只是访问表的一种增强功能,而是一个相对复杂的安全工具集。
CBAC is not only a form additional function, but also a more complicated and safe tool box.
清单16中的示例准则指定必须使用一些XML索引来访问表SECURITY。
The example guideline in Listing 16 specifies that some XML index be used to access the table SECURITY.
如果您希望模拟这种功能,就必须自己添加表来列出可以访问表中某行的用户或角色。
If you want to simulate this, you have to add your own table that lists the users or roles that have access to that particular table row.
也就是说,IDS验证试图访问表的用户是否已经被授予在该表上执行操作所需的权限。
That is, IDS verifies whether the user attempting to access the table has been granted the required privileges to perform the requested operation on that table.
访问计划定义按什么顺序访问表,使用哪些索引,以及用何种连接(join)方法来关联数据。
An access plan defines the order for accessing tables, which indexes are used, and by what kind of join methods data is correlated.
对于只访问表的关系列的查询,现在所需读取的页面数要远远超过未实现内联时需要读取的页面数。
Queries that only access the relational columns of the table now need to read a much larger number of pages than without inlining.
现在,如清单20所示,当用户重新连接到数据库,并试图访问表时,将接收到错误消息。
Now, as shown in Listing 20, when users reconnect to the database and try to access the table, they receive an error.
最后,如果可能的话,将SELECT中所有的列包括到索引当中,这样就不需要访问表中的行。
Finally, if possible, include all of the columns in the SELECT in the index, so that there is no need to access the table rows.
我们后来将这些计划从它的逻辑表示转化成了一个物理的DB 2安装,并给工程团队访问表和测试数据。
We later moved the schema from its logical representation to a physical DB2 installation, to give the engineering team access to tables and test data.
在清单19的示例中,优化准则中的IXAND元素指定使用所有合适的关系和xml索引访问表security。
In the example in Listing 19, the IXAND element in the optimization guideline specifies that the table SECURITY should be accessed using all applicable relational and XML indexes.
如果创建表的表空间的页面大小不合适,或者应该用另一个缓冲区池访问表,就可能需要执行这种数据转移。
This may become necessary if the table was created in a tablespace with an inadequate page size or when a separate bufferpool should be used for accessing the table.
文章就访问表的基本概念及工作原理进行了探讨,最后给出了基于访问表的各种安全控制策略及实现方案。
In this paper, the basic concept and theory of access-list is detailedly discussed. Finally, the solution of network security is given.
“需要重组”列表示这种数据类型修改是否要求在访问表之前进行表重组(SQLSTATE 57016)。
The "Reorg recommended" column identifies the data type alterations that require table reorganization before a table can again be accessed (SQLSTATE 57016).
将该属性设置为 “TRUE”表示必须使用所有合适的关系和XML索引来访问表,而不会考虑成本问题。
Setting the attribute to 'TRUE' indicates that all applicable relational and XML indexes must be used to access the table, irrespective of cost. The optimizer then chooses one of the following plans
在这个场景中,经过分析,可以确定使用索引i 11来访问表tab 1是最优的,但是优化器的默认行为不会这么做,即使在调优之后也仍然不会这样做。
In this scenario, after analysis, it was determined that it will be optimum to use the index I11 to access the table TAB1, but the default behaviour of the optimizer did not, even after tuning.
QuiescedUpdate0x2当调用表空间静默(quiesce)功能的应用程序独占写访问表空间时,该表空间就处于这种状态。
Quiesced Update 0x2 a table space is in this state when the application that invokes the table space quiesce function has exclusive write access to the table space.
在清单18的示例中,优化准则中的IXAND元素指定应当使用两个xml索引sec _ INDUSTRY和SEC_SYMBOL访问表security。
In the example in Listing 18, the IXAND element in the optimization guideline specifies that the table SECURITY should be accessed using two XML indexes, SEC_INDUSTRY and SEC_SYMBOL.
Quiesced Exclusive0x4当调用表空间静默(quiesce)功能的应用程序独占(读或写)访问表空间时,该表空间就处于这种状态。
Quiesced exclusive 0x4 a table space is in this state when the application that invokes the table space quiesce function has exclusive (read or write) access to the table space.
在清单20的示例中,IXAND准则指定应当使用IXAND计划访问表security,并且xml索引sec _ INDUSTRY必须是IXAND下的第一个索引。
In the example in Listing 20, the IXAND guideline specifies that the table SECURITY should be accessed using an IXAND plan and that the XML index SEC_INDUSTRY must be the first index under the IXAND.
应用推荐