图8演示转换如何与CSS文件一起工作,从而根据XMLSchema约束文件和本地元数据登记系统中的值创建各种表单控件。
Figure 8 shows how the transform can work together with a CSS file to create various form presentations based on the values in the XML Schema constraint file and a local metadata registry.
该文件不具约束力,但将作为资助保健和计划生育方案的国家和捐助国的指导方针。
The document is non-binding, but it will serve as a guideline for countries and donor states that fund health care and family planning programmes.
除了磁盘空间限制存储更大的用户邮件文件之外,该服务器上没有任何硬件资源约束。
There were no hardware resource constraints on this server, except the disk-space limitation for storing the larger user mail files.
这些约束可以来一个文件,也可以来自多个文件。
Those constraints can come from a single file or even multiple files.
首先,将约束模型(可能是某个磁盘上的文件)转化为JAXP可以使用的格式。
First, convert your constraint model — presumably a file on disk somewhere — into a format that JAXP can use.
此外,还可以使用以下这种面向对象的查询语言将XML文件作为EMF对象进行查询:对象约束语言(ocl)。
In addition, it is possible to query the XML files as EMF objects using an object-oriented query language: object Constraint language (OCL).
清单3中的代码展示了约束组在模式组文件中是如何设置的。
The code in Listing 3 shows how the constraint groups are set up in the schema group file.
例如,在清单5中,一个选项被约束到文件系统的特定部分,重写也可以是有作用域的。
For example, in Listing 5, where an option is restricted to a certain part of the file system, overrides can also be scoped.
要减少这种想当然的想法并不难,只要删除特定于平台的约束并将它们变成可替换的,例如通过属性文件进行设置。
Reducing assumptions is as easy as removing platform-specific constraints and making them replaceable, such as through property files.
首席技术官或者首席法务官应该鼓励员工,不仅要明确公司的核心商业机密,还要将之制作成有约束力的法律文件。
The chief technology or legal officer should encourage employees to identify and document the company's key trade secrets.
根据web. xml文件中指定的安全性约束,通常会定义一个或多个角色,这些角色的用户将拥有访问这些脚本的适当权限。
You would typically define one or more roles whose users would have the right the access the scripts depending on the security constraints specified in the web.xml file.
声明方法需要通过web. xml文件和应用程序服务器特定的部署文件,来添加安全约束。
The declarative method involves adding security constraints through the web.xml file and through the application server-specific deployment files.
诸如prolog、Mercury、SQL、XSLT这样的语言、ebnf语法和各种格式的真正配置文件,都声明某事是这种情况,或者应用了某些约束。
Languages like Prolog, Mercury, SQL, XSLT, EBNF grammars, and indeed configuration files of various formats, all declare that something is the case, or that certain constraints apply.
file - realm - demo:展示如何使用用户和组的平面文件设置安全约束。
File-realm-demo: Demonstrates how to setup security restrictions using a flat file of users and groups.
按照 Separation of Concerns设计模式,将约束和导入的数据元素定义文件分隔开。
The creation of separate constraint and imported data element definition files leverages the Separation of Concerns design pattern.
我们将使用应用服务器工具集(Application Server Toolkit,ASTK)来修改示例war文件,以增加安全性约束。
We are going to use the Application Server Toolkit (ASTK) to modify the sample war file to add security constraints.
services - config . xml:引用其他配置文件且提供安全约束、通道和日志记录的顶级配置文件。
Services-config.xml: the top-level configuration file that references the other configuration files and also provides security constraints, channels, and logging.
Bean验证规范能让你通过基于ResourceBundle本地化的标准文件系统来外部化和国际化约束错误消息。
The Bean Validation specification lets you externalize and internationalize the constraint error messages through a classic file system based ResourceBundle localization.
本文提供一个zip文件(见下载),其中包含两个将NIEM约束XMLSchema直接转换为X Forms应用程序的示例。
This article includes a zip file (see the download) that has two examples of transforming NIEM XML Constraint XML Schemas directly into an XForms application.
在约束到X Forms的转换过程中,实际上并不使用NIEM生成和导入的子模式文件。
The actual NIEM-generated and imported sub-schema files are not actually used in the constraint to XForms transformation process.
输入您希望添加安全性约束的war文件的位置。
Enter the location of the war file that you want to add security constraints to.
某些约束,如applet的策略文件不受支持。
Some restrictions, such as policy files for applets, are not supported.
xml文件列出应用程序中存在的约束和安全角色以及允许访问某个目录的角色。
The web.xml file lists constraints and security roles that exist in your application as well as the roles that are allowed access to a certain directory.
注意,如果物理文件使用了键控(可能因为它有一个PrimaryKey约束),其隐式索引也将通过这些命令被移动到SSD或从中移出。
Note that if the physical file is keyed (perhaps because it has a Primary key constraint), its index will also be moved on or off of SSD with these commands.
验证XML(NicholasChase,developerWorks,2003 年8 月):验证文件和文档以确保数据满足完整性约束。
Validating XML (Nicholas Chase, developerWorks, August 2003): Validate files and documents to make sure that data fits integrity constraints.
这包括DDS创建的文件和SQL索引,以及带有PrimaryKey约束的物理文件。
This includes both DDS-created files and SQL indexes as well as physical files with a Primary Key constraint.
servlet的web.xml文件包含一个 <security-constraint>元素,该元素定义安全性约束、它应用的 HTTP方法以及使用该约束的角色。
The web.xml file for the servlet contains a <security-constraint> element that defines the security constraint, the HTTP methods that it applies to, and the roles that use the constraint.
对于部署管理器配置文件没有命名约束,这是由于v4中没有类似的对象。
There are no naming restrictions for the deployment manager profile, since there is no analogous object in V4.
对于从V 4迁移时创建的配置文件有特殊约束。
There are special restrictions on the profiles created for migration from V4.
违反数据库约束的数据记录将被连接器拒绝并被转发到一个平面文件中。
Data records that violate the database constraints are rejected by the connector and forwarded to a flat file.
应用推荐