此外,它引入了对知识搜索的支持,并提供统一的层,从而隐藏数据的异质性、技术和元数据。
In addition, it introduces support for knowledge search and offers unification layers to hide the heterogeneity of data, technology and metadata.
您可以使内容对于搜索引擎和屏幕阅读器是可见的,同时又对观看者隐藏了这些内容。
Your content can be visible to search engines and screen readers without jarring the human eye.
这两个评论的一个共同点是一种轻蔑,其对象是任何在谷歌的搜索算法面前想要隐藏私生活信息和保护知识产权的人。
The thing that unites these two remarks is the disdain they imply for anyone wanting to hide details of their private lives, or protect their intellectual property, from Google's algorithms.
图二搜索引擎通常隐藏返回的应用文件类型比如pdf word和pps。
Fig. 2: Search engines often return cryptic file names for application files like PDFs and PowerPoint slideshows.
提供一目了然的搜索结果标题,包括通常隐藏格式的word和pdf应用文件格式
Ensure that result titles are comprehensible at a glance, including application files like PDFs and Word documents, which often return cryptic file names by default.
此外,需要在搜索结果页上,隐藏分类和标签页面链接。
Also, we have to hide the category and tag links for pages on Search results pages.
我的工作是通过在雷场…空间隐喻的内存空间 ,目前的搜索,对空间的真实与想象,隐藏和显示。
My work is a search through a minefield of metaphors in spaces…spaces of memory and of the present, spaces of the real and the imagined, the hidden and revealed.
在上述论述的基础上对量子搜索算法与传统搜索算法进行了比较和分析,总结了隐藏在不同量子搜索算法背后的深刻思想。
Finally, based on the comparison and analysis of classical search algorithm and the quantum one, the thoughts behind various quantum search algorithms are illustrated.
1775年4月19日在波士顿托马斯计英国指挥官派遣探险队在700的常客,上校弗兰西斯史密斯搜索隐藏的物资和武器康科德镇。
On April 19, 1775 the British commander in Boston Thomas Gage despatched an expedition of around 700 regulars under Colonel Francis Smith to search the town of Concord for hidden supplies and weapons.
该仿真网可以隐藏真正网络拓扑结构,扩大IP地址搜索空间,再利用伪装网络服务使黑客在仿真网上花费大量的时间和精力;
The simulation network may hide the true network topology, enlarge IP address room and spend hacker's massive time and energy using giving camouflage network service.
该仿真网可以隐藏真正网络拓扑结构,扩大IP地址搜索空间,再利用伪装网络服务使黑客在仿真网上花费大量的时间和精力;
The simulation network may hide the true network topology, enlarge IP address room and spend hacker's massive time and energy using giving camouflage network service.
应用推荐