通过计算机验证,其效果是较令人满意的。
我们还计算出36种结构的极大最小距离,并通过计算机验证比较了它们的平均冒尖性。
Furthermore, we give the supremum-minimum distance of 36 kinds of structure and comparing their mean pick-the -winners by computer experiments.
当更小的孩子学习计算机科学时,他们知道它不仅仅是一串令人困惑的、无穷无尽的字母和数字,而是一种构建应用程序、创作艺术品或验证假设的工具。
When younger kids learn computer science, they learn that it's not just a confusing, endless string of letters and numbers—but a tool to build apps, or create artwork, or test hypotheses.
由于您仅能给用户的计算机带来有限的逻辑,客户端验证确实有自身的局限性。
Because you can only bring limited logic to the user's computer, client-side validation does have its limitations.
它也涵盖了仪器仪表、计算机软硬件和通讯设备的安装、测试和验证。
It also covers the installation, testing and validation of instrumentation, computer hardware and software, and communications equipment.
为了验证这一点,可以咨询网卡的生产商或一个计算机专家,来判断该网卡是否有缺陷。
In order to verify this, consult the manufacturer of the Ethernet card or a computer technician to determine whether or not the card is defective.
例如,如果一个测试人员手工地验证具体图像所对应的具体文本,那么他可以安排计算机来验证应用程序中对应图像副本的同样的文本。
For example, if a tester manually validates a particular text for a particular image, then he can program a machine to validate the same text for copies of the image throughout the application.
不幸的是,计算机科学告诉我们,没有一种实用的方法来验证我们所采用的设计是否是最简单的。
Unfortunately, computer science teaches us there is no practical way to know if you have the simplest design.
要记住的一点是相信计算机安全一定能通过计算的方法验证。
One point to remember is that trust in computer security must be computationally verifiable.
除了促进销售,计算机视觉技术同样也可以用在阻止销售方面,最近在日本,通过自动贩卖机销售香烟,如不验证购买对象是否年满20周岁,将被视为非法。
Computer vision can prevent sales, too.In Japan it recently became illegal to sell tobacco from vending machines without verifying that customers are at least 20 years old.
除了促进销售,计算机视觉技术同样也可以用在阻止销售方面,最近在日本,通过自动贩卖机销售香烟,如不验证购买对象是否年满20周岁,将被视为非法。
Computer vision can prevent sales, too. In Japan it recently became illegal to sell tobacco from vending machines without verifying that customers are at least 20 years old.
研究者们同时还在蟑螂间分阶段进行战斗,并用计算机进行模拟,从而验证中等大小的蟑螂最有攻击性。
The researchers also staged fights between cockroaches and created a computer simulation to confirm that midsize cockroaches are the most aggressive.
和计算机芯片相比,这算不了什么。不过图尔称,这种新标签还仅仅处于“验证设想”阶段。
That's not much compared to computer chips, but Tour says this tag is just a "proof of concept."
这会在服务器上对计算机的帐户进行身份验证(将计算机添加到常规Windows 服务器域的域管理员可进行相同的操作,但将使用域管理员帐户)。
This authenticates the machine's account on the server (domain administrators adding machines to regular Windows server domains do the same thing, but with the domain Administrator account).
首次安装代理控制器时,请将其配置为仅接受来自“这台计算机”的请求,或将其配置为对请求进行验证。
When you first install the agent controller, configure it to accept requests only from "this computer," or configure it to authenticate requests.
书面贷款申请首先转到数据验证员,验证员在遗留计算机系统中查找客户信息,并将这些信息与书面申请中的内容相比较。
A paper loan application first goes to a data validator who looks up the customer information in a legacy computer system, and compares it to what is on the paper application.
其它国家的签证印章可以通过入境处计算机上的记录进行验证。
Visa stamps from other countries can be verified against records in their immigration computers.
—一个验证码是质问-响应的测试以便于确定这个响应是不是被一个计算机产生的。
A CAPTCHA is a challenge-response test to determine that the response is not generated by a computer.
为了验证他们的理论,两位研究人员在计算机上模拟了此次碰撞。
To test their theory, the two researchers simulated such a collision on a computer.
NIS和NIS +间的主要区别在于,后者支持nis主计算机和从计算机间的身份验证和数据交换加密。
The main difference between NIS and NIS + is that the latter supports authentication and encryption for data exchanges between the NIS master and slave computers.
这些模块提供额外的身份验证规则,保护对计算机的访问。
These modules provide extra authentication rules to harden access to your machine.
计算机需要通过域控制器的身份验证,然后才会被视为可信系统,从而得以与域的其他部分进行交互。
The machines need to authenticate with the domain controller, before they're considered trusted systems and allowed to interact with the rest of the domain.
计算机模型是唯一可靠的方式,就像机中运行的假设程序一样,因为有它那些假设才能不断地得到验证和更新。
Computer models are only as good as the assumptions they contain, which is why those assumptions are constantly tested and updated.
当可信主机上的用户希望登录远程计算机(可以是不可信的系统)时,使用SSH中基于主机的身份验证。
Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.
在安全的SSL通道建立(在此过程中对服务器计算机进行身份验证)之前,不会传输任何应用程序数据。
No application data is transmitted until the secure SSL channel is established, a process during which the server machine is authenticated.
建立其数学模型,并进行计算机仿真验证,其结果显示出该方法可以有效地提高目标的位置精度与可靠性。
A mathematical model is established and validated with computer imitation. The results show that the method can effectively improve accuracy of object position and reliability.
建立其数学模型,并进行计算机仿真验证,其结果显示出该方法可以有效地提高目标的位置精度与可靠性。
A mathematical model is established and validated with computer imitation. The results show that the method can effectively improve accuracy of object position and reliability.
应用推荐