此模型实际上是由数组组成的数组。
The model is actually an array of arrays. Listing 9 shows the structure definition.
此模型已被证实极具挑战性。
下一步是用新病人的数据验证此模型。
The next step would be to validate the models against data from new patients.
此模型简化了应用程序设计。
此模型应该足够有效以支持可选的模拟。
This model should be sufficiently valid to support optional simulation.
我还需要拿此模型的输出申报财产税。
(I'll also be taking the output from this model to protest my property-tax assessment).
每条消息仅被此模型中的一个接收方使用。
Each message is consumed by only one receiver in this model.
此模型的实现因语言和框架的不同而不同。
Implementations of this model vary between languages and frameworks.
此模型描述系统中的实体及其关系。
It describes the entities in the system and their relationship.
此模型可随后供后续服务支持项目和活动使用。
This model can then be followed by subsequent service-enabled projects and initiatives.
此模型显示了Catalog服务的接口和实现。
The model shows an interface and an implementation for the catalog service. There are three operations here.
此模型的实现处理XML数据的构造、修改和序列化。
Implementations of this model handle construction, modification, and serialization of the XML data.
此模型(如图7中所示)依赖中间层处理路由。
This model, depicted in Figure 7, relies on an intermediary to handle the routing.
正如您可能已经猜到的,此模型对于敏捷开发并不理想。
As you might already guess, this model is not good for agile development.
此模型可以帮助确定软件和数据库基础架构的实际使用量。
This model helps to determine the actual usage of software and infrastructures for databases.
图3显示了一个屏幕快照,清单3则包含了此模型的输出。
Figure 3 shows a screenshot, and Listing 3 contains the output from this model.
另外,请确保向此模型化的故障添加合适的业务或技术数据。
Make sure the appropriate business or technical data is added to the modeled faults.
此模型描述本地或远程服务的实现以及特定于实现的配置属性。
This model describes the implementation of a local or remote service and implementation-specific configuration properties.
此模型整合了学术和技术COE风格所特有的活动和突出功能。
This model incorporates the activities and salient features characterized by the academic and technical COE styles.
就实现而言,此模型将很可能作为一个或多个表存在于数据库内。
In terms of implementation, this model will most likely exist as one or more tables in the database.
和端到端信任类似,此模型假定请求应用程序是已知的受信任软件。
This model assumes, like the end to end trust, that a requesting application is known and trusted software.
此模型显示,细胞生殖生命将尽之时,这些蛋白也失去大部分功能。
The model suggested that these proteins lose most of their function just as the cell is coming to the end of its reproductive life.
此模型依赖部署管理器与其托管节点之间的紧密耦合的可靠通信链路。
This model relies on tightly coupled reliable communication links between the deployment manager and its managed nodes.
此模型可以包括依赖关系和交互关系,以便了解重构期间决策的影响。
The model can include dependencies and interrelationships that allow you to understand the impact of decisions during the refactoring.
为使用这些不同的标准,此模型提供了允许灵活配置的Web服务引擎。
This model provides a web services engine that allows flexible configurations for using these diverse standards.
随着各个项目团队和业务线开始使用新体系结构,此模型会变得非常重要。
This model becomes important as various project teams and lines of business begin to use the new architecture.
在特定情况下,此模型可能可行,特别在从企业外提供服务提供者实现时。
In certain scenarios this model may work, especially if you're sourcing service-provider implementations external to the enterprise.
此模型支持用户单点登录到受信任应用程序,由后者以用户的身份进行服务请求。
This model supports single sign on by users to trusted applications which are able to make service requests on their behalf.
此模型由IT安全服务、安全策略基础设施、业务安全服务和安全支持因素组成。
This model consists of it security services, security policy infrastructure, business security services, and security enablers.
此模型由IT安全服务、安全策略基础设施、业务安全服务和安全支持因素组成。
This model consists of it security services, security policy infrastructure, business security services, and security enablers.
应用推荐