• Simplifies JDBC access patterns.

    简化jdbc访问模式

    youdao

  • Data messaging model and data access patterns are being used.

    使用数据消息传递模型数据访问模式

    youdao

  • Making use of target frequent access patterns, we can forecast user 'target.

    利用目标频繁访问模式我们可以预测用户浏览页面的意图。

    youdao

  • By understanding the volume projections and the access patterns, a cost can be estimated.

    通过对数据预计以及访问模式理解,就可以估算出成本

    youdao

  • Access patterns: The access patterns of an OLTP system consist mainly of short, atomic transactions.

    访问模式OLTP系统访问主要的、原子事务组成。

    youdao

  • Other application areas include intrusion detection, web log analysis, database access patterns, and so on.

    其他应用领域还包括侵入检测Web日志分析数据库访问模式等等

    youdao

  • Sequential scans are typical in decision support system (DSS) applications but rare with OLTP access patterns.

    顺序扫描一般决策支持系统(DSS)应用程序常见,很少出现在OLTP访问模式中。

    youdao

  • And we abstract that integrated data platform from the consuming applications via service-oriented data access patterns.

    然后消费者应用通过面向服务数据访问模式这一集成的数据平台进行抽象

    youdao

  • Factors like data compressibility, memory usage and access patterns decide the benefit of AME which are not commonly known.

    数据压缩能力内存使用情况访问模式因素决定一些常见AME优势

    youdao

  • In addition to the amount of data table, the table different access patterns may also affect the performance and availability.

    除了数据外,不同访问模式可能会影响性能可用性

    youdao

  • By theoretic analysis and experimental tests, the algorithm can be used to discover all types of users frequent access patterns.

    通过理论分析实验验证算法可以有效发现用户频繁访问模式

    youdao

  • It's also optimized for full table scans (one of the most common-and most time-consuming-business intelligence query access patterns).

    针对完全扫描(一个常见—也最耗时—的商业智能查询访问模式)进行了优化

    youdao

  • By analyzing access patterns, a model of evaluating cost was constructed, and its efficiency under various workloads was validated.

    通过分析负载访问模式,构造一个代价评估模型不同工作负载下验证模型有效性

    youdao

  • RDBMS designers concentrated on optimizing I/O and tried to align the data access patterns with the block structure imposed by the drives.

    RDBMS设计者精力主要集中优化I/O设法驱动器结构来安排数据访问模式

    youdao

  • The access patterns to system memory and graphics local memory are averaged because there is no time-based sequential pattern to make them exact.

    系统存储器图形本地存储器访问模式平均的,因为没有使它们准确基于时间顺序模式

    youdao

  • But it might not be the best way to express the access patterns in every situation, and that's where issues like object-relational mismatch arose.

    可能不是解决每一种问题最好实现模式,不适合对象关系不匹配应用系统。

    youdao

  • In Table 1 you can see a breakdown of the differences between OLTP and OLAP databases, with particular regard to access patterns and resource usage for each type.

    1中,可以看到OLTPOLAP数据库差异细目,这些差异主要每种技术使用访问模式资源使用情况相关。

    youdao

  • If the number of consuming services increases then both data volumes and concurrent data access patterns may be significantly different from the initial situation.

    如果使用服务数量增加数据并发数据访问模式可能最初投入使用时的情况大为不同

    youdao

  • Online transaction processing (OLTP) is not the same thing as online analytical processing (OLAP), and data access patterns for each technique are quite different.

    联机事务处理(OLTP)联机分析处理(OLAP)并不相同种技术使用数据访问模式很大区别

    youdao

  • As explained in Access patterns for service Creation scenario, the main difference between indirect and direct exposure is the inclusion of a service component layer.

    正如服务创建场景访问模式中所述,间接公开直接公开区别在于其中包含了服务组件层。

    youdao

  • We derived our deployment requirements from a thorough understanding of our users' access patterns, and the realization that we could not spend time managing physical hardware.

    我们通过充分了解用户访问模式确定了部署需求同时意识不能时间去管理物理硬件。

    youdao

  • We have discussed the various data access patterns that are supported and the basic usage scenarios, and we have demonstrated examples ranging from very simple to somewhat complex.

    我们讨论了所支持各种数据访问模式基本使用场景给出了非常简单示例和较为复杂的示例。

    youdao

  • In this process I will discuss remote access patterns versus separation of concerns and caching, and finally describe some proper guidelines for good distributed application design.

    这个过程中讨论远程访问模式分离相关因素以及高速缓存最后就如何进行好的分布式应用程序设计提供适当指导

    youdao

  • Another common trend is the application of service gateway patterns to provide enhanced access security for service endpoints.

    另一个常见趋势应用服务网关模式服务端点提供增强访问安全

    youdao

  • Other mediation patterns provide direct or indirect access to the security and management policy definition points so that the mediation flow can perform the appropriate control.

    其他中介模式提供了安全和管理策略定义直接间接访问以便中介能够执行适当控制

    youdao

  • The External Consumer patterns allows third parties outside the provider governance domain access to services that the provider serves.

    外部消费者模式允许提供者控制领域第三访问提供者提供服务

    youdao

  • Developers face a lack of consistency and common patterns for managing identity and access control in a way that is compatible with REST.

    开发人员缺乏针对身份管理访问控制连贯通用模式一种与REST兼容的方式

    youdao

  • Applications connect to one of the messaging engines implemented using depicted in the article patterns, and then access the group's properties.

    应用程序连接使用文中介绍模式所实现消息引擎之一然后访问属性

    youdao

  • Applications connect to one of the messaging engines implemented using depicted in the article patterns, and then access the group's properties.

    应用程序连接使用文中介绍模式所实现消息引擎之一然后访问属性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定