今天的应用沉浸在大量的数据和事务里,它们需要被日益复杂的算法来处理,简化之后,再不会出现这种情况了。
That's simply not the case anymore-today's applications are drowning in data and transactions that need to be processed with increasingly sophisticated algorithms.
多形态计划的目标是创建一种从静态开环转移到反应式闭环任务算法、应用软件和硬件的范例。
The goal of the polymorphous initiative was to "institute a paradigm shift from static open loop to reactive closed-loop mission algorithms, application software, and hardware implementation."
此工具同时分析插件配置和对应的跟踪文件,然后应用模式识别算法,以便向用户发出有关可能的不一致性的警报。
The tool parses both plug-in configuration and corresponding trace files and then applies pattern recognition algorithms in order to alert users of possible inconsistencies.
应用传统的算法和启发式方法很难维护,因为随着时间的推移,系统的性能下降使系统变得难以控制。
Traditional methods of applying dedicated algorithms and heuristics result in hard to maintain, unwieldy systems with performance degradation over time.
当在高级语言上编程时,不需要考虑特定处理器的细节,只用关心算法和应用。
When programming in a high-level language, it is possible to concentrate on algorithms and applications without worrying about the details of a particular processor.
当然,如果这是一个真正的应用程序,我就会希望开发某种类型的算法来选择期望的端口和操作。
Of course if this were a real-world application I would want to develop some type of algorithm to choose the desired port and operation.
命令式编程由一系列带有明确顺序的语句构成,它们的算法和编程构造严重依赖于应用程序的状态。
Imperative programs are formed by a sequence of statements with an explicit order, and their algorithms and programming constructs rely heavily on application state.
我们的解决方案将采用一种算法(协议)来适应高可用性集群中应用程序(或节点)的第一次和第二次故障。
Our solution was to come up an algorithm (protocol) to accommodate a first and second failure of application (or nodes) within the highly available cluster.
在搜索数据库和其他参考应用程序里,这种算法类型相当普遍。
This algorithm type is quite common in search databases and other reference applications.
只要您掌握了应用程序和部署环境的信息,就足以选择合适的算法。
Given what you know about your application and deployment environment, this may be enough to select the appropriate algorithm.
这种应用程式必须指定附加金钥、算法、处理和再现需要。
Such an application must specify additional key, algorithm, processing and rendering requirements.
本文中介绍的算法和自由形式的文本搜索也可应用到客户数据库和其他小范围数据库。
The same algorithms and free-form text searching described here will also work on customer databases and other small-scope data repositories.
RAD的配置和日志透视包含一些视图,用来分析你的应用程序的内存使用,和通过比较两个堆转储的高级算法来检测这些泄漏。
RAD's profiling and logging perspective includes views for analyzing your application's memory usage and detecting these leaks through advanced algorithms that compare two heap dumps.
为使服务质量更好,谷歌的图像识别研究小组已经把该算法应用到了在线图像搜索和自动图片组织服务当中。
Google's image recognition team has previously made its algorithms work for better online image searches and automatic photo organization.
结合本文演示的组件和算法,无需d - Bus或其他API就可以实现应用程序控制。
This article will demonstrate components and algorithms that can be linked together to control applications without a D-Bus or other API.
通过将一组模式参数应用到一个模式实例中,您可以快速生成一组MessageBroker工件,它们包含针对日志和错误处理等方面的通用算法。
By applying a set of pattern parameters to a pattern instance, you can quickly generate a set of Message Broker artifacts, with common algorithms for aspects such as logging and error handling.
接下来,我们讨论了Sun和IBMJVM的垃圾收集算法,以及它们对应用程序的性能和可伸缩性的影响。
Next, garbage collection algorithms for both Sun and IBM JVM and its impact on performance and scalability of the application were discussed.
虽然Soundex和Metaphone算法都很好地解决了语音模糊的匹配问题,但是如果不能纠正打字错误,那么拼写检查应用程序是不完整的。
While both Soundex and Metaphone algorithms solve phonetic fuzzy matching very well, no spell checking application is complete without typo correction.
在实现全数字控制的同时还实现了多种智能算法的柔性化设计和应用。
The flexible design and application with many intelligent algorithms are implemented as well as the fully-digital control.
如何找到一种更加行之有效的RBF神经网络学习算法具有重要的理论意义和应用价值。
It has important theoretical significance and application value how to find an effective learning algorithm of RBF neural networks.
大部分Web开发者和用户仍然忽略了基于浏览器的加密算法带来的在Web应用程序引入传统软件的隐私和安全性的机会。
Web developers and web users are still largely ignoring the opportunity offered by browser-based cryptography to bring the privacy and security of traditional software programs to web applications.
最后以车队的相互通信和指挥控制为例说明了本文算法的应用。
At last, as an example, the algorithm is applied to the intercommunication and command-control in a motorcade.
实验表明本文提出的图像颜色特征提取算法可成功应用于海量图像库检索和图像语义信息的自动提取。
Experiments show that the new algorithm proposed can be successfully used in retrieving the image from good-sized image database and extracting semantic information from image automatically.
针对MAP法提出了具体算法和参数估计方法。并提出应用图象分割法来提高计算机复原速度,节省存储空间。
We derive the algorithm and parameters estimate method for the MAP restoration, and propose the image sectioning to speed up the restoration and save memory space.
此外,UDT不仅是一个新的控制算法,也为用户可配置的控制算法和更强大的API支持新的应用程序级协议。
Furthermore, UDT is not only a new control algorithm, but also a new application level protocol with support for user configurable control algorithms and more powerful APIs.
然后,我们能够开发PC组件和特性的本体,并应用算法来配制定制pc。
We can then develop an ontology of PC components and characteristics and apply the algorithm to configure made-to-order PCs.
主要介绍系统组成和功能,测量内容和算法,设计与实现方法,以及系统的应用情况。
The system structure, functions, measuring points and algorithms, design and implementation, and application instances are mainly introduced.
研究结果显示,基于皮尔曲线的自适应免疫算法在隧道工程智能预测应用中的优越性和实用性。
The research results show that the adaptive immune algorithm of the Pearl curve has superiority and effectiveness for intellectuality prediction of tunnel engineering.
研究结果显示,基于皮尔曲线的自适应免疫算法在隧道工程智能预测应用中的优越性和实用性。
The research results show that the adaptive immune algorithm of the Pearl curve has superiority and effectiveness for intellectuality prediction of tunnel engineering.
应用推荐