信息管理栈中的企业搜索、数据质量与验证,以及分析等服务通常是外购的不错选择。
Services such as enterprise search, data quality and validation, and analytics in the information management stack are often good candidates for outsourcing.
这些例子演示如何注册XML模式、如何执行 XML实例文档验证,以及如何使用XQuery或SQL/XML查询 XML数据等。
The examples show how to register an XML Schema, how to perform validation of XML instance documents, how to query XML data using XQuery or SQL/XML and much more.
这些子类能够一起处理验证、过滤、安全、数据转换以及将传入请求路由到相应资源等操作。
Those subclasses work together to handle authentication, filtering, security, data transformation, and routing the incoming requests to the respective resources.
它可以对一些数据库事件,例如授权检查、数据库对象维护、安全性维护、系统管理和用户验证等做日志记录。
It is capable of logging database events such as authorization checking, database object maintenance, security maintenance, system administration, and user validation.
在处理电子邮件验证、电话号码、URL、日期等数据时,有时编写自己的验证 器会更好一些,不过我们将在稍后对此进行讨论。
When dealing with e-mail validation, phone numbers, URLs, dates, etc., it's sometimes better to write your own validator; but we'll get to that in just a bit.
最后会加进如请求验证、安全GateKeepers与数据校验等约束。
Finally, constraints are applied such as request throttles, security GateKeepers and data validation.
还讨论了Zend框架的一些表单处理功能,如验证数据和清除提要条目等。
You also discussed some of the Zend Framework's form-handling capabilities, validating data, and sanitizing feed items.
Body元素包含Web服务将要处理的信息,而Header 元素包含特定于应用程序的信息,比如身份验证数据和会话数据等。
The Body element contains information intended for the web service to process and the Header Element contains application specific information like authetication data,session data etc.
用户可能为了多个目标使用“how - to”,比如设置Web身份验证、从web应用程序中读数据库等。
A user might have several goals that would benefit from a how-to: for instance, setting up Web authentication, reading a database from a Web application, and so on.
该项目计划利用我们的语言模式——这不光包括我们说话的内容,还包括我们说话的方式——以及打字习惯等的行为数据,建立一个更可靠的身份验证体系。
It plans to use our speech patterns - not just what we say but how we say it - in conjunction with other behavioural data, such as how we type, to build up a more reliable picture of our identity.
移动代理安全性体现在移动代理机密数据的保护、移动代理和移动代理执行平台的验证等。
The security of mobile agent systems lies in the protection of confidential data, the verification of mobile agents and mobile agent platforms.
再对多源数据进行取舍、验证、修改等处理,生成综合信息。
Choosing data, proving data and revising data etc. operations was carried on, and then, integrated information was produced.
控制数据流图可用于系统建模、软硬件功能划分、系统综合与验证等多个环节。
CDFG (control data flow graph) can be used in system modeling, software and hardware partition, synthesis and verification.
并利用广州市出租车综合管理系统提供的浮动车数据,结合车牌计时和跟车测试等实验对该方法的有效性进行了验证。
And experiments based on probe vehicle data provided by the taxi management system of Guangzhou, with reference to vehicle license recognition and practical timing.
本文通过对验证的内涵、意义、具体做法及验证的组织实施等讨论,将所得数据进行统计学处理。
By discussing the connotation, sense, material modusoperandi and actualization of validation, this paper processes the gained data in a statistical way.
然后,以系统中数据处理和传输过程的公平性、及时性和可靠性等问题为例,进行建模、分析和验证,从而说明本方法的有效性。
Then, we use this method to model, analyze and verify some problems of data processing and transmission such as fairness and reliability, so that we prove the method is reliable and efficient.
基于目前XML类型处理问题的研究现状,对XML数据库类型系统的形式化建模、类型验证和类型检验等问题进行了研究探讨。
According to the current research status of XML type processing problems, we will investigate the type validation and type checking problems for the type systems of the XML Database deeply.
其优势体现为:跨越时空的界限、数据收集与处理的便捷、避免研究者效应和容易实现可重复性的验证研究等。
Its advantages embody: the overcome of space-time boundary, convenience of data analysis, avoidance of researcher effect and easy to repeated test.
并强调了模型设计过程中要注意的数据提取、数据预处理、模型验证等问题。
And it emphasizes some questions in the model designing, such as data distilling, the pretreatment, model validating.
并利用广州市出租车综合管理系统提供的浮动车数据,结合车牌计时和跟车测试等实验对该方法的有效性进行了验证。
And experiments based on probe vehicle data provided by the taxi management system of Guangzhou, combined with vehicle license recognition and practical timing.
通过实验验证该算法完全可以满足高速网络中入侵检测、文本搜索、病毒扫描、信息查询等数据处理的要求。
It has been proved by experiments that the algorithm entirely satisfies the disposal of intrusion detection, text search, virus scans and information inquires in the high-speed network.
除了格式不对、坏的身份验证程序或未知类型等原因之外而放弃的输入数据包数目。
The number of incoming packets silently discarded for a reason other than malformed , bad authenticators, or unknown types.
运用探索性因素分析、验证性因素分析、结构方程、层次回归等方法,对收集的数据进行了分析。
The data collected were analyzed by EFA (exploratory factor analysis), CFA (confirmatory factor analysis), structural equation, hierarchical regression method and other methods.
经实验数据验证和与其它模型对比分析,建立的模型更适合对高炉等炼铁工艺的模拟。
The results show that the model presented here could simulate the iron-making process such as blast furnace process much more appropriately.
进一步地介绍了数据库验证、外部验证、企业验证和并发许可等用户验证和许可限制。
These policies are policies integrated of system security, data security and user security, and introduce the authentication of Database, exterior, enterprise and user and the permission res.
通过类型定义、特征表示、数据标注、模型训练、实验验证等一系列过程,最终的结果表明能够对论坛数据实现高性能的答案抽取。
After class definition, feature extraction, data annotation, model training and experimenting, the output proves that acceptable performance of answer extraction could be reached.
经应用验证,该方法具有数据准确、运算速度快、图型美观等优点,在环境影响评价中具有较高使用价值。
After tested and verified practically, this method has the merit such as accurate result, fast operational speed and elegant chart. The Sue valu...
因此,在浓度较大时,采用线性吸附等温模线会得到偏不安全的结果。该解相对较简单,并可用于验证各种数值模型,拟合试验数据等。
The present method was relatively simple to apply and could be used for evaluating experimental results and verifying more complex numerical models.
建议部署传统的数据网络安全技术如加密、身份验证和数据完整性等。
Conventional data networks policies like encryption, authentication and data integrity are highly recommended.
采用描述性统计分析、单因素方差分析、相关分析、回归分析等统计分析方法对调查数据进行分析,对理论假设和模型进行验证。
In the data analysis, theoretical assumptions and model was tested through Descriptive Statistical analysis, ANOVA, Bivariate Correlations analysis, and Linear Regression analysis and so on.
应用推荐