数据查询问题是K -匿名隐私保护模型下数据可用性问题之一。
How to answer queries under the K-anonymity privacy protection model is one of problems for the availability of anonymized data.
在确定了热过载保护模型的基础上,本文设计了一个智能型热过载继电器。
Based on the selected overload protection model, a thermal protector with single-chip is designed in this paper.
基于最小特权原理,从分析进程的访问权限出发,提出了一种防御恶意程序攻击的数据保护模型。
After analyzing the access rights of the processes, this paper presents a data-protection model which will prevent the attack of the malicious processes on the base of minimal privilege principle.
应用计算机系统资源保护模型建立了进程监控系统,阐述了进程监控系统的工作原理和算法实现过程。
The computer system resources defense model is applied to build a process monitor system, and the basic principle and the arithmetic of the process monitor system are set forth.
大规模数据共享的隐私保护模型与关键技术研究,973前期研究专项, 2013-2016,参与。
2013-2016, Privacy Protection Model and Its Core Techniques for Sharing Large-scale Data, China 973 Program, Co-PI.
分析了CHASHIMA核电站的测量系统、控制与保护模型、系统设备及设备失效模型、辅助系统管网模型。
This paper analyzes models of measuring system, control and protection system, system equipments, equipment failure, and some auxiliary system in CHASHIMA NPP.
基于一种非对称公钥叛逆者追踪方案给出了新的电子软件销售和产权保护模型,适用于一类需要安装运行的软件。
A new model for electronic software distribution and copyright protection based on an asymmetric public-key traitor tracing scheme is designed.
与常用反时限保护特性相比较,此保护模型更符合负载的实际运行规律及保护要求,并对测量误差关系进行了分析。
Different from the common inverse time characteristic, this model conforms to the load actual operating law and the protection request, and takes the analysis of measurement error into consideration.
目前大多数电力系统仿真分析工具缺少对继电保护模型的系统化描述,无法真实完全的反映继电保护元件的控制规律。
Most of power system's simulation tools have not the systematic model of relay system and can not response the control rules of relay system truly and completely.
基于该保护理念作者提出了相应的保护模型CLPM,该模型从四个阶段分析壳对数字内容的保护过程,有针对性的解除不同阶段面临的威胁。
A relevant Content Lifecycle Protection Model (CLPM), which divides the whole lifecycle protection of digital content into 4 phases, is provided to deduce the security threats in each phase.
分析了PSCAD/EMTDC的软件结构,提出了基于PSCAD/EMTDC和C语言接口技术的自定义模型的实现方法,用C语言构建了以实际保护装置为原型的数字式距离保护模型。
The program structure of PSCAD/EMTDC is analyzed, and the method of realizing the user-defined model which is based on the interface technique between PSCAD/EMTDC program and C language is presented.
要研究发酵的黑麦麸是否能保护接受右旋糖酐硫酸钠(DSS)的模型小鼠免于结肠炎。
To investigate whether the fermented rye bran can protect the model mice receiving dextran sulfate sodium (DSS) from colitis.
由于这些资源要么是关键基础架构,要么是向为您的应用程序定义的资源提供默认值的模型,需要保护它们。
Since these are either critical infrastructure, or models that provide defaults for the resources defined for your applications, you need to protect them.
您将看到各种云提供商使用的验证模型,并将讨论在隐私性、法规遵从性方面出现的问题和针对拒绝服务威胁提供的保护。
You will see the authentication models used by various cloud providers, and examine the challenges which arise from privacy, regulatory compliance, and protection from Denial-of-Service threats.
相反,JAAS的以用户为中心的认证模型是以保护世界不受用户影响的思路开发的。
In contrast, the user-centric authorization model of JAAS was developed with the idea of protecting the world from the user.
在新研究中,研究人员创建了一个数学模型来衡量抵御真菌的保护效益和高体温代谢值。
In the new work, the researchers created a mathematical model that weighed the fungal protection benefits versus the metabolic cost of high body temperature.
为了保护患者隐私,PODS的设计采用一个多级安全模型。
To safeguard patient privacy, the PODS design USES a multilevel security model.
应在公司用于检测漏洞和保护s OA基础结构的业务策略中包含用于目标和攻击者之间的多个SOA的深度防御模型。
A defense in depth model with multiple SOAs between the target and the adversary should be part of a company's business strategy for detecting vulnerability and protecting SOA infrastructure.
专家说,这项进程可能使这种猫成为一种有价值的新遗传模型,并且很有可能保护自身免受类HIV病毒。
Experts say the advance could make the cat a valuable new genetic model-and potentially protect it from an HIV-like virus.
每网站一进程(process -per -site)模型不会在网站实例之间提供错误保护。
The process-per site model does not provide failure containment across site instances.
目前有几款模型在售,有些由不透明的墙与透明屋顶组成,更好地保护隐私。起步价不到8000欧元。
It's available in a few models, some of which include privacy walls and clear roofs, starting at less than 8, 000 euros each.
[据防务专家网2010年05月17日报道]由IBD开发的高级模型装甲保护(AMAPTM)正是实现平衡和最佳化生存概念上的一种方法。
GMT, May 17, 2010 AMAPTM (Advanced Modular Armor Protection) is the expression of the system approach for a balanced and optimized Survivability Concept, developed by IBD Deisenroth Engineering.
有两种新出现的安全模型提供了合理的方法来保护移动云。
Two emerging security models offer reasonable approaches to securing the mobile cloud.
此后我们将建立模型,描述系统如何提供预订的总括信息,包括提供购买保护产品等等。
After this we would model how the system presents the summary information on the reservation, including offers to purchase protection products, etc.
导入只引入了公共和受保护的信息,而操作实体优化了模型的规模,以更快地载入、保存及切换。
The import brings in only the public and protected information without operations bodies to optimize the size of the model for faster loading, saving, and navigation.
数据模型和XML表示之间的结构性区别可在绑定中处理,即使数据模型随着时间而改变,XML表示通常也可以得到保护。
Structural differences between the data model and the XML representation can be handled in the binding, so the XML representation can generally be preserved even as the data model changes over time.
总之,ACL的范围至少是它保护的资源,不过,应用程序可以扩展该范围,以实现设计人员所需的授权模型。
To sum up, the scope of an ACL is at least the resource it secures, however the scope can be extended by an application in order to implement a designer's desired authorization model.
即使不考虑通过由模型驱动的开发和基于SOA的服务管理所提高的效率,业务应用程序仍须保护信息。
Irrespective of the efficiencies brought by model-driven development and SOA-based service management, business applications must continue to secure information.
高兰尼的目标是让CQESTR模型更加好用,因而土地经营者、研究人员和自然资源保护论者都可以不同的方式利用它。
Gollany's goal is to make CQESTR more user friendly so land managers, researchers, and conservationists can use it in different ways.
高兰尼的目标是让CQESTR模型更加好用,因而土地经营者、研究人员和自然资源保护论者都可以不同的方式利用它。
Gollany's goal is to make CQESTR more user friendly so land managers, researchers, and conservationists can use it in different ways.
应用推荐