GPL类软件有许多不同的衍生分类,也有其他很多授权协议都提供了上述的自由权利,包括beerware和WTFPL。
There are many different variations of GPL software and many other licenses that would still provide the freedoms above, including beerware and WTFPL.
妥善保管各种合同和协议文件,监督必要的会计程序和会计分类账及总账的记录。
To safeguard all contracts and agreements and to supervise the necessary accounting procedures and the preparation of accounting ledgers and summaries.
本文对路由协议的成胁行为进行了分类,并分析了各种威胁行为可能给网络带来的影响。
In this paper, the threat actions to the routing protocol are classied into serven kinds accorting to their manners.
基于信道预约,协议采用分类调度机制以满足多媒体业务中各类业务的服务质量需求。
Based on the channel reservation, designed the classified types scheduling mechanism to satisfy the quality of service (QoS) of the multimedia applications.
流量可以由ip地址范围、主机地址、协议、端口或者以上这些参数的任意组合进行分类。
Traffic can be classified by IP address range, host address, protocol, port or any combination of these parameters.
接着在对现有的面向文件共享的P2P协议进行研究的基础上,从系统结构方面对P2P系统进行分类。
Then based on the research of several popular P2P protocol for file sharing, we sort the P2P systems from architecture.
对股权转让的概念、分类作简要介绍,在此基础上提出股权非协议转让的概念及可行性。
This part briefly introduces the concept and classification of equity shares'transference, on the basis of which produces the feasibility of equity shares'transference without agreement in advance.
该文根据建模基础的不同,对目前处在研究热点中的几个重要协议形式模型进行了分类分析。
In this paper, some kinds of critically formal models for security protocols, which have recently catched much researcher's attentions, are analyzed in terms of their different modeling bases.
纺织品配额分类和计量单位以有关协议规定为准。
The classification and measurement unit of textile quotas shall be based on relevant agreements.
另一方面是协议限制竞争行为的两个大的分类,即横向协议限制竞争行为和纵向协议限制竞争行为。
On the other hand it is two classifications, namely conduct of horizontal restriction of competition and vertical restriction of competition.
然后按照测试用例的分类,对每一种业务测试时可能出现的问题进行总结,并针对每一种问题给出相应的协议参考。
According to the classification of test cases, summarize all possible problems come out when testing, and put forward the corresponding resolvent.
分析了网络安全扫描的原理,对扫描中使用的主要技术进行了分类,并阐述了每种技术的原理及协议特性。
Analyzes the principles of network security scan, categories the techniques used in a scan process, presents the concept and protocols each technique derives from.
他们还用“拥有钱财和很多物品对于我来说从来都不重要”这样的说法来对问卷调查协议进行分类。
They also rated their agreement with the phrase "Having money and lots of things has never been important to me."
对电子选举协议提出了新的分类方法,并考察了其优缺点;
We propose some new taxonomy of the security protocols proposed for Electronic Voting procedures and examine their advantages and shortcomings.
在协议的业务分类基础上,给出了上行链路两层调度的模型,并在每一层上分析比较各种调度算法。
Based on the service classes proposed in the standard, we gave out the two-level scheduling model and analyzed the scheduling algorithms on the two levels.
文中对RFID协议进行分类研究,探讨了RFID协议的安全性分析和证明方法。
This paper carries out classification research on RFID protocols and discussion on the method fors...
根据五种分类标准对协商协议进行了分析、比较和分类。
To summarize, classify and compare the major negotiation protocols used in electronic commerce systems according to the 5 criteria.
该文按照协议分类分别概述了几个具有代表性的不可否认数据源认证协议,并对每一个协议的优缺点和存在问题进行了讨论。
In this paper, several typical data origin authentication protocols with non-repudiation are summarized according to the taxonomy of data origin authentication with non-repudiation.
该文按照协议分类分别概述了几个具有代表性的不可否认数据源认证协议,并对每一个协议的优缺点和存在问题进行了讨论。
In this paper, several typical data origin authentication protocols with non-repudiation are summarized according to the taxonomy of data origin authentication with non-repudiation.
应用推荐