MHTDMA adjust channel access strategy depending on the level of contention in the network.
MHTDMA根据网内节点的竞争情况来调整节点的信道访问策略。
Namely, it needs a shard-access strategy, a shard-selection strategy, and a shard-resolution strategy.
比如,需要一个切分访问策略、一个切分选择策略和一个切分处理策略。
The main reason to create an OLE DB provider is to take advantage of the Universal Data Access strategy.
建立OLEDB提供者主要是为了运用通用资料存取策略。
It also determined and executed an appropriate data access strategy on our behalf in a manner that was transparent to us.
DB 2 II还以一种对我们透明的方式代表我们确定和执行适当的数据访问策略。
Released with.net 3.5 SP1, it is currently considered to be a major part of Microsoft's ever-changing data access strategy.
它已经随着。NET 3.5SP1发布了,目前被认为是微软不断变化的数据访问策略的重要部分。
And finally, we needed to determine our overall data access strategy — which data to retrieve first, how we would filter data at each source, etc.
最后,我们还需要确定整体数据访问策略——先检索什么数据,如何在每个源上过滤数据等。
This thesis provides a method of organizing the shadow memory of main memory database. Detailed storage structure and access strategy are also included.
提出一种适合内存数据库的“影子内存”组织方法,并给出具体的内存空间的组织管理、存储结构和存取策略。
If your storage requirements are rapidly outpacing your IT budget, you probably need to simplify your data access strategy while holding the line on staff.
如果你们的存储需求迅速地超过你们的IT预算,你们就可能需要在保持员工现状的同时精简数据存取策略。
To take advantage of the increased buffer pool, you must rebind the applications for the optimizer to consider the buffer pool size when deciding its access strategy.
要利用增加的缓冲池,您必须重新绑定应用程序,以使优化器在决定其访问策略时考虑缓冲池大小。
The concept of a consistent data access strategy certainly opposes the notion that each business requirement needs to be matched to an optimal data access method.
通用数据借口策略的概念必然反对每个商业需求都需要最佳的数据接口模式这种观念。
Programmers can work transparently with data from these various sources, relying on DB2 II's global query optimizer to select an efficient data access strategy for such work.
程序员可以透明地使用来自这些不同数据源的数据,并通过DB2II全局查询优化器来选择一个有效的数据访问策略。
Firstly, initiate research on data de-duplication mechanism of mass data backup is made from three aspects which contains data de-duplication manner, storage strategy, access strategy.
首先从消冗方式、存储策略、访问策略三个方面对海量数据备份的消冗机制展开研究。
This strategy of direct access to a maximum number of ecological zones by a single group is called vertical economy.
单一集团直接进入最大数量的生态区的战略称为垂直型经济。
The strategy recognises that people experiencing disability face significant barriers in achieving a full quality of life in areas such as attitude, education, employment and access to services.
该战略认识到,残疾人在态度、教育、就业和获得服务等领域实现全面生活质量面临着重大障碍。
That's why reliable testing requires some sort of in-container strategy with database access.
这就是可靠测试需要某类容器内策略和数据库访问的原因。
In this scenario, an organization has no common strategy for attacking security threats and protecting services from external access.
在此场景中,组织没有用于抵御安全威胁和保护服务避免外部访问的公共策略。
This transaction demarcation strategy is especially valuable for applications that need to access multiple DAOs in a single transaction.
这种事务界定策略对于需要在一个事务中访问多个DAO的应用程序特别有用。
Establish a strategy in advance for revoking access by distinguished name as well as by individual certificate.
提前制定策略,以便根据专有名称和具体证书撤销访问。
DB2 UDB comes with a powerful cost-based query optimizer that determines the best strategy to access data.
DB 2 UDb中包含了一个功能强大基于成本的查询优化器,用于确定访问数据的最佳策略。
In this strategy, you'll access the device's register the same way as in strategy 1 — using local register variables.
在这种策略中,我们将采用与策略1中相同的方法来访问设备的寄存器,也就是使用本地寄存器变量。
Now it needs to tackle the hard part of its strategy: making it all work together seamlessly, for instance by offering a single sign-on for all its services and one-touch access.
现在诺基亚需要跨过这项战略的困难部分:让其完美无缺协同运作起来。例如,提供针对所有服务的单一认证或是一键链接。
That has become a popular strategy with SSH being a first choice to access virtual machines in the cloud.
这成为一个流行策略,其中SSH成为访问云中的虚拟机的首选。
So, if you're building a virtualized environment with SAN storage, you should definitely consider multipath access in your strategy to achieve high availability, reliability, and serviceability.
因此,如果您正在构建一个带有SAN存储的虚拟化环境,那么肯定应该考虑多路访问,以获得高度的可用性、可靠性和可服务性。
If the environment or processes require blocking FM access, it's a good idea to develop a strategy for doing so based off the concepts described in section 2.1.
如果环境或流程需要阻止FM访问,最好根据2.1节描述的概念开发相关的战略。
Use the "nonstrict-read-write" strategy if your data is read-mostly or concurrent cache access and update is rare.
如果你的数据读很多或者很少有并发缓存访问和更新,那么可以使用“nonstrict - read - write”策略。
In summary the most effective strategy for preventing FM access to an environment is.
总之,防止FM访问的最有效战略是。
Model-view-controller: The Rails MVC framework — called Action Pack — is customized for Web-based access and implements a well-known design strategy called Model 2 (see Resources).
模型-视图-控制器:Rails的MVC框架(称为Action Pack)为基于Web的访问进行了定制并且实现了著名的被称为Model2(参见参考资料)的设计策略。
Can you adapt your backup strategy if users demand access to the database before a backup completes?
如果用户在备份完成之前要求访问数据库,您能调整备份策略吗?
Therefore, developing an effective poverty reduction strategy requires a detailed and up-to-date understanding of rural women's workload and access to all sorts of resources.
因此,制定有效的减贫战略,就需要对农村妇女的劳动负担和能否获得各种资源有一个详细的了解,把握最新的情况。
Therefore, developing an effective poverty reduction strategy requires a detailed and up-to-date understanding of rural women's workload and access to all sorts of resources.
因此,制定有效的减贫战略,就需要对农村妇女的劳动负担和能否获得各种资源有一个详细的了解,把握最新的情况。
应用推荐