• We explore the WebSphere II process model and describe the difference between trusted and fenced wrappers; the latter being a prerequisite for exploitation of partitioned database resources.

    我们研究WebSphereII过程模型描述受信任包装设防包装器之间不同后者研究分区数据库资源先决条件。

    youdao

  • The difference of MTM and TPM on the security model is compared, then the process implementing trusted computing is given.

    比较MTMTPM安全模型区别给出了实现可信机制过程

    youdao

  • The difference of MTM and TPM on the security model is compared, then the process implementing trusted computing is given.

    比较MTMTPM安全模型区别给出了实现可信机制过程

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定