If the tokens match access is granted.
如果令牌匹配的话,访问就被允许。
All of the tokens that you have defined are here.
您所定义的所有标记都在这里。
The sidebar describes the tokens that you can set.
侧栏中描述了可以设置的符号。
In which to go through the tokens contained in a string.
在经过一个字符串中的标记。
Expressions in W3Eval are built from the tokens shown in Table 1.
W3Eval的表达式由表1所示的符号组成。
This is the piece of code that determines what the tokens are.
这是一段确定标记为什么的代码。
Define the syntax of the language itself in terms of the tokens.
按照标记定义语言本身的语法。
These directives are used to define the tokens the lexer can return.
这些指令用来定义lexer可以返回的记号。
Now we can repeatedly evaluate the text to replace the tokens as needed.
现在可以重复地评估文本来根据需要替换标记。
In fact, we love collecting the tokens so much we quickly forget what they're for.
实际上,我们是如此喜欢收集代币以致我们很快忘记它们是干什么的。
The target server receives the request with the tokens embedded in the protocol (CSIv2).
目标服务器接收协议(CSIv2)中嵌入令牌的请求。
My associates and I examined the tokens generated by two popular application servers.
我的合作伙伴和我检测到这些标识是由两个十分受欢迎的应用服务器所产生的。
During the transmission, the tokens are serialized and, preferably, encrypted as well.
在传输的过程中,对令牌进行序列化,并且最好同时对其进行加密。
If the tokens do not match V8 performs a callback to check if access should be allowed.
如果令牌不匹配的话,v8会调用回调函数来判断这个访问是否应该被允许。
When working with tokens, the whole lifecycle and lifetime of the tokens should be considered.
在使用令牌时,应该考虑令牌的整个生命周期和生存期。
The transactions are interconnected by the tokens generated by ARM and passed by applications.
事务通过ARM生成的令牌互连在一起,并由应用程序进行传递。
Next it loops over the tokens looking for XML elements, attributes and parent-of separators (/).
接着,该方法对这些标记进行循环以查找XML元素、属性和表示“……之父”关系的分隔符( / )。
Now that you have the tokens defined, it is time to define the parsing rules in terms of the tokens.
既然已经定义了标记,那么现在是时候按照标记来定义解析规则了。
Instead, learn to parse the program in your head, identifying the tokens and interpreting the structure.
大家应该学着动脑来解译程序,分辨代号,解析结构。
At the level of tokenizing, we are not yet interested in how the tokens are structured, just what they are.
在记号赋予这一层,我们还不想讨论如何构造记号,让它们维持原样就可以了。
The special syntax of tokens also makes it possible to verify that values for all the tokens have been supplied.
符号的特殊语法也让验证替换值是否都给出提供了可能。
The solution isn't to simply reject the game entirely, just don't give the tokens more value than they have.
也不是单单因此而拒绝玩游戏了,只是不要把他们看得太重了。
The process that scans an input string and determines what the tokens are is called the tokenizer. In the query.
扫描输入字符串以及判断是何标记的过程称作记号赋予器(tokenizer)。
Additionally, the program provides some simple query functions on the tokens, such as token info and mechanism list.
另外,这个程序提供了对令牌的一些简单查询功能,譬如令牌信息和机制列表。
The tokens are of strong regional colors, saturated with the writer's personal growing experience and cognition of life.
具有地域色彩,浸透着作家个人的成长体验和人生认知;
Note that the tokens are opaque binary data, and only the underlying security mechanism needs to be able to interpret them.
注意,标志(token)是隐性二进制数据,只有底层安全性机制才需要能够解释它们。
The target server deserializes the tokens and attaches them to the subject or the thread, depending on the type of the token.
目标服务器对令牌进行反序列化,并将它们附加到主题或线程,这取决于令牌的具体类型。
The tokens themselves are not exposed as objects, but their type and properties are discoverable through methods on the cursor.
标志本身不作为对象公开,但其类型和属性可以通过游标方法来访问。
Given the special syntax of the tokens, it is usually possible (and advisable) to derive this list by inspecting the package contents.
基于特定的符号语法,通常能够(并推荐)依据这个定制项列表对包内容进行检查。
Fans like to reward artists, musicians, authors and the like with the tokens of their appreciation, because it allows them to connect.
粉丝喜欢给艺术家、音乐家、作家等回报来表示他们的赞许,因为这允许他们联系在一起。
应用推荐