• 例如 Shor算法多项式时间找到一个N函数周期

    Shor's algorithm, for example, is able to find the period of a function of N bits in polynomial time.

    youdao

  • 给出函数方法推导介质覆盖导电缝隙天线辐射场严格解过程。

    A novel method based on potential function theory is given in this paper to formulate the analytic solution of slot antenna on electrical sphere coated with dielectric layer.

    youdao

  • 本文给出求解有限导电媒质平面上方垂直偶极源赫兹位函数解析方法

    In this paper, an analytical approach is described for the evaluation of the Hertz potential of a vertical magnetic dipole over the finitely conducting medium plane.

    youdao

  • 但在计算矢量函数标量位函数微分过程中,TPM模型产生奇异

    When the vector potential function and the differential of the scalar potential function are computed, singular points would occur on TPM.

    youdao

  • 通过引入静电场的标量函数,将电场强度的矢量泊松方程转化椭圆型偏微分方程的诺问题

    And the problem is converted to the typical Neumann boundary value problem for the elliptic equations by inducing the scalar potential function.

    youdao

  • SQL标准所述函数返回输入字符串字节长度字节长度。

    This function, as mentioned in SQL standard, returns the length of the input string in octets or bytes.

    youdao

  • 最近几年以来,数百用户一直维护库中的每一个函数

    They've had hundreds of users for several years looking at every function in the library.

    youdao

  • 模仿布尔数据类型以及函数并非一定一个挑战性过程

    Emulating bit and Boolean data types and functions does not have to be a challenging process.

    youdao

  • 记住函数第一参数传递ppe的64地址

    Remember, the first parameter to the function is the 64-bit address that was passed in from the PPE.

    youdao

  • 如果寄存器8首选中的跳到函数尾部

    If the bits in the preferred slot of register 8 are all set to false, you skip to the end of the function.

    youdao

  • escape函数%后跟编码字符的两16进制代替了几乎所有非字母数字ASCII字符。

    The escape function replaces almost any non-alphanumeric ASCII character with % followed by the two-digit hexadecimal code of the encoded character.

    youdao

  • 例如Not函数会把取反。

    For instance, the Not function flips the value of a bit.

    youdao

  • 这个函数接受两个64输入名为val1val2

    The function receives two 64-bit input values, called val1 and val2.

    youdao

  • 为了验证函数确实按照所设计方式工作我们需要再次每个型数字转换二进制数字,一个执行EXLUSIVE OR运算,然后结果还原成integer

    To verify that the function indeed works as designed, we, again, need to convert each integer to BINARY, perform EXLUSIVE or for each bit, and then convert the result back to integer.

    youdao

  • 代码一部分提供了线索一个64编码PHP函数

    The first part of the string offers a clue: It’s using a PHP function to decode the string of text, which is encoded as base64. If we pass this through a decoder, the string looks a lot more malicious

    youdao

  • 然而对于64整数来说,没有标准函数

    However, there is no standard set of functions for 64-bit. But Linux provides the following macros on both big and little endian systems.

    youdao

  • 函数请求提取32整数使用中的算术运算计算一个动态缓冲区大小

    This function takes a 32-bit integer from the request, and USES it in an arithmetic operation that calculates the size of a dynamic buffer.

    youdao

  • PINE 并没有包括系统头文件而是相关函数提供了自己声明所有这些都是使用32 偏移量来定义的。

    PINE, rather than including the system headers, provided its own declaration of the related functions, all defined in terms of 32-bit offsets.

    youdao

  • 举例来说,如果32传递一个期望16值的函数而且所传递的参数值正确范围之内,那么这个函数永远不会注意多出来字节

    For instance, if you pass a 32-bit value to a function expecting a 16-bit value, and the value is in range, the function may never notice the extra bytes.

    youdao

  • spu_mfcdma32()函数允许PPE理论上)64地址空间中的32 子集中使用DMA 方式获取数据对于我们目的来说已经足够了。

    The spu_mfcdma32() function allows DMA from a 32-bit subset of the PPE's theoretical 64-bit address space which is plenty for our purposes.

    youdao

  • spu_mfcdma64()函数则使用另外一个参数来指定有效地址32部分

    The spu_mfcdma64() function takes an additional argument specifying the top 32 bits of an effective address.

    youdao

  • gperf找到某种配置,并且该配置将每个keysig分配生成查找惟一时,将生成一个完美hash函数

    A perfect hash function is produced when gperf finds a configuration that assigns each keysig to a unique location within the generated lookup table.

    youdao

  • salt一些随机数据组成,用于密码同时输入hash函数从以下两个主要方面缓解风险

    A "salt" consists of random bits used as an input to the hash function in conjunction with the password, and mitigates the risk in two major ways

    youdao

  • 作为DataBlade模块一部分,数据类型还附带了用于验证数据类型的字符串操纵函数操作函数

    As part of a new DataBlade module, these data types come with string manipulation functions to validate the data types and bitwise operation functions.

    youdao

  • 即使目标处理器(PPE)拥有64本地地址空间,spu_mfcdma32函数也会使用一个32

    The spu_mfcdma32 function takes a 32-bit value even though the target processor (the PPE) has a native 64-bit address space.

    youdao

  • 尽管寄存器可以存储多个(例中4个32值),但当参数传递给函数时,每个参数都会在其自己的寄存器传递。

    Although registers can hold multiple values (in this case, four 32-bit values), when passing parameters to a function, each parameter value is passed in its own register.

    youdao

  • 例如清单4中的CommentBlock函数假设评论可能需要可选参数所以将其放置参数列表第一

    The CommentBlock function in Listing 4, for example, assumes that the comment introducer is the optional argument that is most likely to be needed, and so places it first in the parameter list.

    youdao

  • 明星工程师专注三种基本类型重用第一内部基础架构重用,相应代码自己或同事编写的;第二,使用第三方的函数库,比如jdk。

    A rockstar engineer will focus on three essential kinds of reuse. First of all, the reuse of internal infrastructure, the code that he and his peers have written.

    youdao

  • 本文给出多层媒质中水平垂直偶极子标量矢量格林函数的一般表达式,验证了其正确性。

    The spectral domain Green's functions of scalar and vector potentials for vertical and horizontal electric as well as magnetic dipoles in multi-layered medium are presented and verified.

    youdao

  • 应当知道,任何受过职业道德训练软件工程师不会同意一个“摧毁巴格达DestroyBaghdad”这样的函数

    It should be noted that no ethically-trained software engineer would ever consent to write a DestroyBaghdad procedure.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定