Protocol-independent multicast sparse mode(PIM-SM) is one of the most widely used multicast routing protocols.
协议无关组播-稀疏模式是目前应用最广泛的组播路由协议之一。
Such questions are out of scope of the protocol-independent URI syntax, it's up to the HTTP protocol to provide content negotiation as a solution.
这种问题已经超出了协议无关的URI语法的范围,这得由HTTP协议提供内容协商作为解决方案。
This effective method has some advantages such as protocol-independent, negligible extra traffic, convenience and being able to estimate individual user performance.
这种方法具有与协议无关、对网络流量影响小、测量方法简单、可测量单个用户流等优点。
Customizability Highly customizable, data-types and protocol independent Lightweight, can work only on HTTP, limited data type support Works only on HTTP.
自定义能力高度可自定义,不受数据类型和协议限制轻量级,只能在HTTP上工作,具有有限的数据类型支持只能在HTTP上工作。
WSDL addresses this topic of service IDLs independent of the underlying protocol and encoding requirements.
WSDL不依赖于底层的协议和编码要求来涉及服务IDL的主题。
The protocol buffers message format, which is similar to the Interface Description Language (IDL), is meant to be language-independent so that you can use it with various languages.
protocolbuffers消息格式类似于接口描述语言 (IDL),它与语言无关,因此可以将其与各种语言一起使用。
We carry out a three layers network subsystem structure that is protocol independent layer in kernel, protocol dependent layer in kernel and user level protocol stack.
论文提出了一个三层网络子系统结构:内核级协议无关层、内核级协议相关层和用户级协议栈。
A bridge is a way to connect two Ethernet segments together in a protocol independent way.
网桥是一种协议无关的连接两个以太网段的方式。
Adding behavior protocol to elements of platform independent UML model (such as class and interface) has always no effective solution.
为平台无关的UML模型元素(如类、接口)增加行为协议通常没有有效的解决方法。
The protocol translation procedure indeed depends on the type of address used, but its core concepts and associated issues are generally independent of any address translation mechanism.
协议转换过程的确依赖所用的地址类型,但是协议转换的核心思想和所涉及的问题不依赖于任何地址转换机制。
The formalism is independent of the concrete formalization of a protocol or attackers' possible behaviors.
其次,分析方法与密码协议和攻击者能力的具体形式化描述无关;
The formalism is independent of the concrete formalization of a protocol or attackers' possible behaviors.
其次,分析方法与密码协议和攻击者能力的具体形式化描述无关;
应用推荐