• 一方面,错误意外的问题——因为我们事先知道哪里出错,我们需要分析实际测试运行中的回溯诊断这种问题。

    Errors, on the other hand, are unexpected problemssince we do not know in advance what can go wrong, we need to examine the traceback in the actual test run to diagnose such problems.

    youdao

  • 这个数据可以回溯到对洞穴绘画研究,人们观察猎人们只手武器以及考古学上文物分析

    And this goes back to studies of cave paintings, looking at which hands hunters are using to hold their spears, and to archaeological analyses of ancient artifacts.

    youdao

  • 通过基于最终结果执行数据分析可以将结果回溯生成结果有影响所有语句

    By performing a data flow analysis based on the final results, it's possible to trace the result back through all of the statements that contributed to producing it.

    youdao

  • 通过分析不同种类黏菌DNA研究人员重新建构了他们进化史结果竟然回溯10亿年前

    By analyzing the DNA of different slime mold species, researchers are reconstructing their evolutionary history, which turns out to reach back about a billion years.

    youdao

  • 该文首先分析了当前试题库组卷算法中常用随机、回溯算法,以及出题策略

    This paper begins with the analysis of the existing algorithms for generating test-sheets and their generating tactics.

    youdao

  • 通过图书回溯数据编制工作实践,就一些数据主题标引字段提出了简浅的分析与认识。

    Through the practice of compiling the data backtrack of the books, this paper briefly analyzes the subject indexing field of some data.

    youdao

  • 孔明棋求解问题进行分析提出了基于回溯思想非递归算法,运行结果表明了算法有效性

    On the analysis of Kongming chess, proposes recursion and non-recursion algorithms based on backtrack for the issue, which works effectively.

    youdao

  • 分析图书馆回溯工作特点介绍WBS定义、重要性以及创建表示方法

    This paper analyzes the characteristics of Retrospective Conversion Bibliographic Database (RCBD) in Library and introduces the WBS's definition, composition and method to be created.

    youdao

  • 通过回溯分析,试图找到发起攻击的攻击者。状态分析运用入侵检测,可增强网络抵御IP欺骗攻击的能力。

    According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.

    youdao

  • 通过回溯分析,试图找到发起攻击的攻击者。状态分析运用入侵检测,可增强网络抵御IP欺骗攻击的能力。

    According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定