标识可疑数据结构有助于更好地理解内存泄漏的根源。
Identification of suspected data structures aid in a better understanding of the root cause of a memory leak.
关于援助机构的报道往往依赖于由其提供的可疑数据。
Stories featuring aid projects often rely on dubious Numbers provided by the organizations.
通过程序的运行,使分析人员能及时发现燃煤分析过程中的可疑数据,减少分析误差。
The program running enables an analyst to find suspected data promptly in coal analysis to reduce analysis error.
隐写式密码解密的目的非常简单:侦测可疑数据,确定数据中是否隐藏了信息,然后揭露该数据。
The goal of steganalysis is quite simple: Detect suspect data, determine whether information is hidden within the data, and recover that data.
数据结构被分组到每个转储中,然后在主转储和基线转储之间进行匹配与比较,以确定大量增长的可疑数据结构。
Data structures are grouped together in each dump and then matched and compared across the primary and baseline dump to identify suspected data structures experiencing large amount of growth.
使用 MMD4J提供的工具可以帮助开发人员确认可疑数据结构是真正的内存泄漏还是适当增长的数据结构。
MMD4J provides tools to help developers confirm whether a suspect data structure is actually a memory leak or an appropriately growing data structure.
列出导致堆使用增长的可疑数据结构、数据类型和数据包,用于比较分析;列出大规模堆,用于单一传储分析。
Lists suspected data structures, data types, and packages contributing to the growth in heap usage for comparative analysis, and to the large size of the heap for single dump analysis.
在实际体质监测工作中,由于抽样调查技术或疏忽大意导致错误,或人为的编造等原因,会使报上来的数据产生可疑数据。
In practical monitoring, due to sampling error or negligence error or artificial compilation, etc, the reported statistics may contain some dubious data.
试验表明可疑数据与试样加工形状尺寸、试样热处理对中性、试样洛氏硬度试验送样装置对试样距离控制和各环节的规范操作有关。
The test results showed that the suspicious data was related to size of sample, concentration of sample heat treatment, control of sample submitting equipment on sample distance.
试验表明可疑数据与试样加工形状尺寸、试样热处理对中性、试样洛氏硬度试验送样装置对试样距离控制和各环节的规范操作有关。
The test results showed that the suspicious data was related to size of sample, concentration of sample heat treatment, control of sample submitting equipment on sampled...
图形用户界面提供浏览功能,以便验证可疑内存泄漏区域和了解组成这些泄漏区域的数据结构。
The graphical user interface provides browsing capabilities for verifiing suspected memory leak regions, and for understanding the data structures that comprise these leaking regions.
然后,根据配置参数,进入的数据将被标准化和匹配,可疑副本将被识别并销毁。
Then, depending on configuration parameters, incoming data can be standardized and matched, and suspected duplicates can be identified and collapsed.
本例的“脏数据”包含40%的可疑副本。
The "dirty data" for the example includes 40% suspect duplicates.
在他们公布的可疑的财产数据面前,他们欺瞒公众的企图更加暴露无遗。
Their intention to defraud the public becomes evident in the dubious assets most of them declare.
我觉得一开始的观测结果就够可疑的了你干吗还要给我看更不可信的数据呢?
I found the first observation dubious, why are you showing me something even more unlikely?
有时,最好只运行一段代码,在可疑代码处停止运行,在这个位置检查数据。
Sometimes it's better to just run a section of code and stop execution at that point so you can examine data at that location.
100%干净数据—不包含可疑副本。
60%干净数据—40%记录的每个当事人都有一个可疑副本。
60% clean data - 40% of total records have one suspect duplicate per party.
辐射数据包括探测低水平的微克辐射和可疑的alpha/beta微粒。
The radiation data involved detecting low levels of gamma radiation and suspected alpha/beta particulates in air.
这些方法包括扫描传入数据以防有恶意软件和扫描携带有病毒和包含可疑信息的e-mail。
Many approaches involve scanning incoming data for possible malware and screening spam e-mail laden with viruses or containing suspicious messages.
人所共知,这些数据是十分可疑的。
“数据是可疑的和混杂的,但牡蛎的确可以作为一盘好的开胃菜,”她说。
"The data is questionable and mixed, but oysters do make a nice appetizer," she said.
这可以保证数据在存储后,或者未经修改返回,或者被标识为“可疑”—非常类似于受保护的HDD。
This ensures that, once stored, data is either returned unmodified, or is identified as being "suspect" - much like data on HDDs is safeguarded.
因为没有执行比较分析,所以没有任何数据结构可疑点。
There are no data structure suspects because comparative analysis is not performed.
验证可疑性能瓶颈的一个方法是查看查询的运行时统计数据,这可以通过打开IFCID 318上的性能跟踪获得。
One way to validate the suspicious performance bottleneck is by looking into the runtime statistics of the query, which can be obtained by turn on the performance trace on IFCID 318.
在本例中,仅有一个可疑点,此数据结构占主要转储全部堆大小84%,从这一点可以看出该数据结构非常可疑。
In this case, there is only one suspect and the fact that this data structure can account for 84 percent of the total heap size of the primary dump identifies this as a very likely suspect.
比如说,IDS监视并记录某一特定计算机或来自具有调查数据并能提供识别可疑活动“犯罪之后”的侦破能力的网络上的重要事件。
As an example, IDS monitors and records significant events on a specific computer or from the network examining data and providing an "after the fact" forensic ability to identify suspect activity.
如果测试表明意外的行为,或发现可疑物品,新的数据采样点位置可以添加用户和注释的调查报告。
If measurements indicate unexpected behavior, or suspicious material is found, new data sample locations can be added by the user and annotated in the survey report.
SOP能够确保您接收的任何数据都是由原始的Web站点实际发送的;您不能够从任何其他(有可能是可疑的)源头接收数据。
The SOP ensures that whatever data you receive is actually sent by the original Web site; you cannot receive any code from other (possibly suspect) origins.
这是一种不同的用途比本文讨论可疑为更多的信息,参见代数的数据类型。
This is a different usage than in this article. For more information, see algebraic data type.
应用推荐