另一方面,错误是意外的问题——因为我们事先不知道哪里会出错,我们需要分析实际测试运行中的回溯来诊断这种问题。
Errors, on the other hand, are unexpected problems — since we do not know in advance what can go wrong, we need to examine the traceback in the actual test run to diagnose such problems.
这个数据可以回溯到对洞穴绘画的研究,人们观察猎人们用哪只手拿武器,以及考古学上对文物的分析。
And this goes back to studies of cave paintings, looking at which hands hunters are using to hold their spears, and to archaeological analyses of ancient artifacts.
通过基于最终结果执行数据流分析,可以将结果回溯到对生成此结果有影响的所有语句。
By performing a data flow analysis based on the final results, it's possible to trace the result back through all of the statements that contributed to producing it.
通过分析不同种类黏菌的DNA,研究人员重新建构了他们的进化史,结果竟然回溯到10亿年前。
By analyzing the DNA of different slime mold species, researchers are reconstructing their evolutionary history, which turns out to reach back about a billion years.
该文首先分析了当前试题库组卷算法中常用的随机、回溯算法,以及出题策略。
This paper begins with the analysis of the existing algorithms for generating test-sheets and their generating tactics.
通过对图书的回溯数据编制工作实践,就一些数据的主题标引字段提出了简浅的分析与认识。
Through the practice of compiling the data backtrack of the books, this paper briefly analyzes the subject indexing field of some data.
对孔明棋求解问题进行分析,提出了基于回溯思想的递归和非递归算法,运行结果表明了算法的有效性。
On the analysis of Kongming chess, proposes recursion and non-recursion algorithms based on backtrack for the issue, which works effectively.
分析图书馆回溯建库工作的特点,介绍WBS的定义、重要性以及创建表示方法。
This paper analyzes the characteristics of Retrospective Conversion Bibliographic Database (RCBD) in Library and introduces the WBS's definition, composition and method to be created.
通过回溯分析,试图找到发起攻击的攻击者。将状态分析法运用于入侵检测,可增强网络抵御IP欺骗攻击的能力。
According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.
通过回溯分析,试图找到发起攻击的攻击者。将状态分析法运用于入侵检测,可增强网络抵御IP欺骗攻击的能力。
According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.
应用推荐