Some scholars argue that the concentration of water within the urban core of these sites provided a centralized source of political authority for Maya elites based largely on controlled water access.
一些学者认为,集中在这些地点的城市核心区的水资源为玛雅精英提供了一个集中的政治权力来源,而这些权力主要是基于对水资源的控制。
We can perform almost any office-based task from any location in the world as long as we have access to the internet.
只要我们能够访问互联网,我们几乎可以在世界上任何地方执行任何基于办公室的任务。
This method restricts access to objects based commonly on the groups to which they belong.
此方法通常根据对象所属的分组来限制对对象的访问。
Because different users have different access modes based on the process and their role the shape can vary, based on the user's role and context.
因为根据流程和其角色,不同的用户有不同的访问模式,所以根据用户的角色和上下文不同,它们的形状也各不相同。
Providing accounting mechanisms so that different groups have fair access, based on their needs and contributions to the infrastructure.
提供会计机制,基于不同级别的需求和对基础设施的贡献,保证公平的访问。
Memory and CPU based access can provide much lower latency and greater throughput than disk and network based access.
相比基于磁盘和网络的访问,基于内存和CPU的访问能提供更低的延迟和更高的吞吐量。
There might be performance implications in using the JACC method parameter-based access.
在使用JACC基于方法参数的访问时可能会存在性能影响。
Access plans can change based on accumulated data.
访问计划可以根据累积的数据进行更改。
The process engine provides secure (role based) access to critical process data.
处理引擎提供了对关键流程数据的安全(基于角色)访问。
If the client is allowed access based on the allowed rules, then TCPD hands over control to the real daemon that was called (in this case, telnetd).
如果该客户端符合允许访问规则,那么tcpd就会交出对所调用的实际守护进程的控制权(本例中是telnetd)。
This client is either allowed or denied access based on the rules contained in the hosts.allow or hosts.deny file.
根据hosts. allow或hosts . deny文件中的规则,会允许或拒绝该客户端的访问。
Within the J2EE application, you can define and name security roles and constrain resource access based on those roles.
在J2EE应用程序内,您可以基于这些角色定义和命名安全角色及约束资源访问。
Within the J2EE application, you can define and name security roles and constrain resource access based on those roles.
在J2EE应用程序内,您可以基于这些角色定义和命名安全角色及约束资源访问。
This configuration provides the ability to assign different permissions and access levels based on access from the trusted network and the untrusted Internet.
这个配置提供根据从可信网络还是从不可信互联网访问分配不同的权限和访问级别的能力。
As you've seen in the steps above, the optimizer selects the optimal access plan based on available statistics.
您可以从以上步骤看到,这个优化器基于可用的统计信息选择了最优的存取计划。
They allow us to test people who cannot access diagnosis based on microscopy in remote, rural areas where the majority of malaria occurs.
这使我们可以对那些地处偏远的农村疟疾多发地区并且无法获得基于显微镜的诊断的人进行检测。
To obtain access, the user requests access to a specific application, including specific roles or access levels, based on the user's needs.
为了获得访问权限,用户将基于自己的需要请求对特定应用程序的访问,包括特定角色或访问级别。
Therefore, it's wise to avoid using access controls based on the client's hostname and to scope them as described when they're necessary.
因此,避免使用基于客户主机名的访问控制,在必须使用时限定其作用域,这些都是明智的做法。
If access is based entirely on self-signed certificates, deleting the public key of a certificate from the trust store revokes its access.
如果访问完全基于自签名证书,则从信任存储区中删除证书的公钥将撤销其访问权。
However, you would still like the optimizer to find the best access plan based on the values that users have passed into the query.
然而,您可能仍然希望优化器基于用户传递给查询的值来查找最佳的存取计划。
For queries that do not match any guideline, the regular cost-based access plan is chosen.
对于不与任何准则匹配的查询,将选择常规的基于成本的访问计划。
Role-based authorization provides access to resources based on the fact that the user is a member of some class of users.
基于角色的授权基于用户是某类用户的成员这一事实提供对资源的访问。
Therefore, the finer your XML document granularity, the higher your potential benefit from index-based access.
因此,XML文档的粒度越细,从基于索引的访问中得到的好处就越大。
Data access services provide or prevent access to data based on authorizations and restrictions (policies and rules for access).
数据访问服务基于授权和限制(策略和访问规则)来提供或阻止数据访问。
If current statistics are not available, the optimizer may choose an inefficient access plan based on inaccurate default statistics.
如果无法获得当前的统计数据,优化器就可能会基于不准确的默认统计数据选择低效的访问计划。
Enterprise encyclopedias are databases that have role-based access control and instance-level access control.
企业百科全书是拥有基于角色控制以及实例层次控制的数据库。
Another approach to controlling access is role-based access control (RBAC).
另一种控制访问的方法是基于角色的访问控制(RBAC)。
So you really shouldn't rely on index-based access for a specific named element.
所以确实不应该对指定了名称的元素使用基于索引的访问方法。
Consider the code in Listing 6, which does just that, all using index-based access.
考虑清单6中的代码,它就是完成这项工作的,这里全部使用了基于索引的访问。
Includes the Advanced access control Feature (ACCF) enabling cell -, column - and row-level label-based access control (LBAC).
内含启用资料格层次、栏层次与列层次标签型存取控制(LBAC)的“进阶存取控制功能”(ACCF)。
应用推荐