• 关于二进制还是文本格式争论已经结束

    The debate about binary versus text formats is over.

    youdao

  • 使我们能够收集关于二进制消息时间开销信息以及消息开销信息。

    This will allow us to gather timing information as well as information on message overhead for binary-based messages.

    youdao

  • 一个关于二进制编码校验问题,通过校验之后,检验是否传输正确

    This is a binary encoded on the check, by check, to verify whether the correct transmission.

    youdao

  • 关于其他选项兼容性GCC 3.0以前的版本生成二进制代码的调用兼容性,请参考GCC手册获得详细情况

    Refer to the GCC manual for details concerning the compatibility with other options and for call-compatibility with binary code generated by pre-3.0 versions of GCC.

    youdao

  • 本文评论了关于Linux onPOWER二进制兼容性来源为什么存在这些来源,以及开发人员如何将这些不兼容性代码影响降低到最小。

    This paper reviews sources of binary incompatibility regarding Linux on POWER, why these sources exist, and how developers can minimize the impact these incompatibilities have on their code.

    youdao

  • 使用这种技术时,收集关于给定工作负载数据(比如剖析),然后优化工作负载的方式使用这些数据重构应用程序二进制代码

    When using this technique, data is collected for a given workload, such as a profile that is then used to rebuild the application binary in such a way to optimize the workload.

    youdao

  • 要了解更多关于如何通过上传二进制内容创建文档的信息,请查看LotusQuickrwiki中的DocumentsServices主题

    For more details about how to create a document by uploading the binary content, see the Documents Services topic in the Lotus Quickr wiki.

    youdao

  • 入侵检测系统联用时,关于恶意软件行为数据包捕获恶意二进制文件本身这些有价值信息就可以获得

    When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.

    youdao

  • 入侵检测系统联用时,关于恶意软件行为数据包捕获恶意二进制文件本身这些有价值信息就可以获得

    When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定