In this article we explained a complete object model mapping method step by step.
本文由总而分逐步给出了一种完整的对象模型映射方法。
Because of its compactness, fineness and unambiguity, formal analysis of cryptographic protocol has been an efficient and correct method step by step.
形式化分析由于其精炼、简洁和无二义性逐步成为分析密码协议的一条可靠和准确的途径。
We'd better follow the seven-step hand-washing method to keep healthy.
我们最好遵循七步洗手法来保持健康。
A single method can no longer produce reliable estimates across every step in the process.
单一的评估方法不可能在过程的每一步产生可靠的评估结果。
Verification of the system stress test is the reason for this final step in the method.
之所以要执行方法中的这最后一步,是为了对系统压力测试进行核实。
Step 3: Specify the method to be used for authenticating the user.
第 3步:指定验证用户所使用的方法。
The first step is to create a method plug-in as shown in Figure 1.
第一步是创建一个方法插件,如图1所示。
Finally, in step 3, the DII method (described in the previous section) is used.
最后,在步骤3中,使用DII方法(在前面的部分中进行了描述)。
Step 2: Implement the validate method.
第2步:实现验证方法。
Notice that the compile method includes the optimization specified by Step 2 of our algorithm.
注意,compile方法包括算法的第2步所指定的优化过程。
Finally in Step 19, you call DirContext.rebind method.
最后,在步骤19中调用DirContext . rebind方法。
Step 2: Implement the getAsObject method
第 2步:实现getAsObject方法
Step 3: Calling a method of the insecure bean.
步骤3:调用不安全bean的方法。
Step 5. Perform the search: Here you call the search method of the DirContext object you got in Step 2 of Listing 6.
步骤5.执行搜索:在这里调用清单6的步骤2得到的DirContext对象的search方法。
The second parameter of the Context.bind method call is the MessagingPreferences object from Step 3.
bind方法调用的第二个参数是步骤3中的MessagingPreferences对象。
This step calls the method getIdForPath created previously.
此步骤调用前面创建的方法getIdForPath。
Step 5: Calling a method of the secure bean.
步骤5:调用安全bean的方法。
The last step in the execute method returns the instance of ActionForward, forward.
execute方法中的最后步骤返回ActionForward (forward)的实例。
When you call a method of a secure bean, the proxy object that you got in Step 4 dispatches a method invocation request to the interceptor.
当调用安全bean的方法时,您在步骤4中获得的代理对象将一个方法调用请求分配给拦截器。
The rebind method takes exactly the same parameters that you passed to the three-parameter bind method in Step 4 of Listing 4, the StoreBobPreferences application.
rebind方法接收的参数就是在StoreBobPreferences应用程序的清单4的步骤4中传递给带有三个参数的bind方法的参数。
The Http11NioProtocol configured in the first step calls the event() method instead of doGet or doPost to process requests.
在第一步中配置的Http11NioProtocol调用event()方法来处理请求,而不是doGet或doPost。
In contrast, a gnosis.xml.objectify node has no built-in method to step through all of its subelements.
相比之下,gnosis . xml . objectify节点没有内置方法可遍历它所有的子元素。
It's called Monroe's Motivated Sequence, a 5-step method for organizing motivational speeches.
这被称为Monroe的煽动序列,是组织煽动性演说的有5个步骤的方法。
Change the listener binding for MDBs (this is the same as method 1 step 2), and specify MQListener as the listener port.
更改mdb的侦听器绑定(这个操作与方法1中的第2步相同),并指定MQListener作为侦听器端口。
A servlet that USES the Template Method pattern to encapsulate a three-step workflow.
一个采用TemplateMethod模式的Servlet封装一个包含三个步骤的工作流。
So the next step is to write a test for this method.
所以下一步就是为这个方法编写一个测试。
Plus, I usually think of questions with three-step-method: First, does god not exist?
加上我思考问题的方法一般都用“三阶思考法”,一阶:神不存在?
Dr He's team experimented with different shapes and found a simple one-step method using polystyrene spheres treated with oxygen and then coated with silica to build raspberry-like shapes.
贺博士的团队针对不同的形状的纳米颗粒做了实验,发现一个简单的一步到位的方法:采用聚苯乙烯微球,先经氧气处理,然后再涂上硅石,便会形成树莓形状的颗粒。
This book provides a step-by-step method to pinpoint painful memories and quickly release toxic emotions and their harmful effects on your body.
这本书逐步讲解了一种帮助找到痛苦回忆,并迅速释放有害情绪以及它们对身体造成的恶性影响的方法。
This book provides a step-by-step method to pinpoint painful memories and quickly release toxic emotions and their harmful effects on your body.
这本书逐步讲解了一种帮助找到痛苦回忆,并迅速释放有害情绪以及它们对身体造成的恶性影响的方法。
应用推荐