系统中还显示其他两个策略组。
There are two other policy groups that are shown in the system.
图11中总结了前面定义的两个策略。
The two policies that are therefore defined, are summarized in Figure 11.
假设希望把前面提到的两个策略示例形式化。
Suppose you want to formalize the two policies I mentioned as examples.
拟人和禁忌表两个策略被给出。
Personification strategy and tabu list strategy are presented.
为了有效地处理这些关系,需要分支的两个策略。
To effectively address these concerns, a two-pronged strategy is required.
两个策略的交集给出0或多个双方一致同意的替代。
The intersection of two policies gives zero or more alternatives on which both parties agree.
在本文后面将看到启用两个策略的效果(见图12)。
You will see the effects of two enabled policies later in this article (see Figure 12).
两个策略都被扩展为标准形式后才开始进行处理。
The process begins with both policies being expanded to Normal form.
这种表示法能够表达这两个策略;但是,它有两个主要问题。
This notation captures both of the policies; however it has two major problems.
现在,如果同时启用两个策略,那么会显示不同的结果,见图12。
Now, if you enable both policies, a different result is displayed, as shown in Figure 12.
如果这两个策略都失败,受方将会出现空隙而被取方打到。
Failure to do one of the two will result in his being open to being struck by nage.
但是,从好的方面说,该策略很常容易与另两个策略组合在一起。
On the plus side, though, this strategy can be combined quite easily with the other two.
后面将给出针对Ralf ' sGuitars用户组的两个策略示例。
Two example policies for the user group Ralf's Guitars are presented later.
本文余下部分将讨论在JSF应用程序中使用安全bean 的两个策略
The rest of this article discusses two strategies for using secure beans in JSF applications
要充分了解REST和SOAP之间的差异,您需要先掌握这两个策略的更深层语义。
To understand the difference between REST and SOAP fully, you need to appreciate the deeper semantics of these two strategies.
在这种情况下,一个服务策略中的请求需要过多CPU资源,这会导致过载,进而导致另一个策略或这两个策略的服务目标被破坏。
In this case, requests from one service policy which demand excessive CPU and lead to overload could result in breached service goals for the other policy or for both policies.
尽管如此,We b容器还是支持RMLTs和LT c容器策略,使用这两个策略可以影响eci资源适配器发出的JCA请求。
However, the Web container does support both RMLTs and the LTC containment policy, and both of these can be used with some affect for JCA requests made by the ECI resource adapter.
图9显示了两个策略:一个AllAllowed策略允许访问维度的所有成员,一个AllDenied策略拒绝访问维度的所有成员。
In Figure 9, you see two policies, an all Allowed policy that permits access to all members of the dimension and an all Denied policy that denies access to all members of the dimension.
要通过工作提高生活质量,两个互补的策略很必要。
To improve the quality of life through work, two complementary strategies are necessary.
这种策略有两个主要变体。
然而,该策略遇到了两个障碍。
这是一个OMG标准,从根本定义了可重新使用策略的两个方面。
This is an OMG standard that fundamentally defines two aspects of a reuse strategy.
要实现这种策略,我们需要两个内核线程。
You will need two kernel threads for the implementation of this strategy.
类似的异议也出现在面向对象应用程序开发使用的两个持久性策略之间。
A similar disagreement is developing between supporters of the two persistence strategies for object-oriented application development.
如果将环境扩展为多于两个单元,同样的基础策略也适用。
If the environment is expanded to have more than two cells, the same basic strategy applies.
本文中介绍的策略需要使用两个不同的系统。
You will need two different systems for the strategies described here.
开发出一套整合这两个因素的管理策略的方法之一是用策略语言编写一组规则。
One way to develop a management strategy that incorporates both factors is to write a set of rules in a policy language.
通常,对于每个页面,都需要两个布局策略文件。
Generally, for each page, two layout policy files are needed.
虽然两个系统中的策略文件可能显得有些不同,但是两个系统中使用了相同的数据布局和收银系统。
While the policy files in the two systems may appear somewhat different, the same data layout and cash registering program is used in both systems.
最后,混合云存储支持合并这两个模型,通过策略定义哪些数据必须私下维护,哪些可在公共云内得到安全维护(参见图6)。
Finally, hybrid cloud storage permits the two models to merge, allowing policies to define which data must be maintained privately and which can be secured within public clouds (see Figure 6).
应用推荐