采用了可见性判定和合理的消隐技术,加快了模型数据截取和绘制的速度。
The technique of the judging of viewing volume and reasonable hidden surface removal are adopted, and the processing of cull and draw of models are faster.
无线信号的可截取本质以及大多数手持设备有限的内存和计算能力,使无线系统极易受到数据窃贼的攻击。
The interceptable nature of wireless signals and the limited memory and computing power of most handheld devices leaves wireless systems dangerously vulnerable to data theft.
如果数据被第三方截取,或者欺骗性数据被当作有效数据接收,那么会引起严重的财务或法律后果。
Negative financial or legal consequences can result if data is intercepted by third parties, or if fraudulent data is accepted as valid.
对于每个请求,HTTPcookies都会在客户端和服务器端来回传递,因此其中的所有数据都可能被截取。
HTTP cookies are sent back and forth between the client and server on every request, so any data in them could be intercepted.
ISAPI筛选器可以截取甚至修改传入和传出的数据。
ISAPI filters can intercept and even modify the incoming and outgoing data. ISAPI filters have numerous applications, including.
上下文数据由客户端截取程序放入该调用中,再由服务器端截取程序取出,然后传入到EJB服务器stub。
The contextual data is pushed into the invocation by the client-side interceptor, popped by the server-side interceptor, and then passed to the EJB server stub.
截取一个数据库管理器快照:db2getsnapshotfor dbm
在这篇短文中,我只能截取数据库的一点皮毛和启示。
In this short talk, I can only scratch the surface of the database and its implications.
这种类型的病毒截取输入的数据传送到一台远程服务器。
This type of virus intercepts entered data and transmits it to a remote server.
传入跟踪方法的InvocationContext为截取程序提供全部有关调用的元数据,包括。
The InvocationContext passed into the trace method provides the interceptor all the metadata regarding the invocation, including.
定义我要用来收集方法调用性能数据的截取程序,因为这个类将会被静态编入 EmpDAOImpl 类的字节码中。
The first step is to define the interceptor I want to use to collect the method-invocation performance data, because this class will be statically woven into the bytecode of the EmpDAOImpl class.
这对截取程序通过在相同负载内承载上下文数据,将上下文数据作为EJB调用传递到同一个调用。
The interceptor pair passes contextual data in the same call as the EJB invocation by piggybacking the contextual data within the same payload. The contextual data is made up of.
介绍了一种截取计算机数字通信数据的硬件电路和软件程序以及破译通信协议的方法。
This paper introduced the hardware and software of intercepting the data of computer digital communication and a method of interpreting the communication protocol.
截取MOD IS光谱数据分析窗,是判定和分析火场最有效的手段。
Intercepting MODIS spectral data analysis window is the most effective means to judge and analyze fire sites.
最近也写了一个数据报截取程序,但有问题,请进。
Recently reported the interception of a data write process, but there are problems, Come.
计算机网络中的数据总是通过介质传送,所以数据常常出现被截取、中断、篡改、伪造等安全性问题。
Data in computer networks was transmitted by media, so data always arise question of cut out, interrupt, modify and gorge.
高速缓存服务器直接位于客户机和远程网站之间的数据路径上,并中途截取所有外发请求。
A cache server sits directly on the data path between the clients and the remote Web sites and intercepts all outgoing requests.
本文研究如何通过多智能代理技术等方法,截取、分析和回放网络数据流来测量软件性能。
This paper is about how to use multi-agent to do network stream analysis and replay to find the problem of system performance.
英国现行法律允许截取必须的通信,但是将随着新数据库的执行而改变。
Under the UK's current law a warrant is required to intercept communications, but that will change with the implementation of the new database.
光斑图像处理涉及到采集卡数据传输、数字图像处理、光斑外形截取等方面内容;
The first one refers to data transference, digital image precession and the facula figuration.
突发(异常)脑电活动分析,截取的数据段必须含有25%以上的异常成分。
The abnormal rate in the taken EEG epochs for analyzing the breaking out (abnormal) brain electrical activity must be more than 25 per cent.
利用这个支持服务,可调查出数据出处,询问调查方法,并可接受数据操作或截取时最佳方法等建议。
Use the support service to clarify a source of data, query our methodology or to simply get advice on how to best manipulate and extract data.
该文截取实际网络链路上的流量,对数据包处理过程进行模拟,并分析cache机制对网络处理器的各性能参数的影响。
This paper presents a simulation of the packet processing procedure using real traffic traces to analyze the impact of the caching mechanism on the network processor performance.
该文截取实际网络链路上的流量,对数据包处理过程进行模拟,并分析cache机制对网络处理器的各性能参数的影响。
This paper presents a simulation of the packet processing procedure using real traffic traces to analyze the impact of the caching mechanism on the network processor performance.
应用推荐