Though this had been suspected, nobody dreamed that a chimpanzee would attack an animal as large as a young bushbuck, until I saw an ape with his kill.
虽然这一点一直被怀疑,直到我看见大猩猩的捕猎行为,没有人会想象到一只大猩猩会袭击大如小羚羊这样的动物。
However, one computer security expert said that even an attack of this size did not necessarily have to be the work of a large or powerful group.
不过,一名计算机安全专家称,即使是这样大规模的攻击也不一定来自大型或有势力的组织。
Israel's air force carried out a large-scale exercise in June that was interpreted by many as a rehearsal for a possible attack on Iran \ 's nuclear facilities.
以色列空军六月进行了大规模的军演,这被许多人理解成是对伊朗核设施有发动攻击之前的彩排。
Assuming a large number of installations (according to Eucalyptus there are more than 25,000 customers), we are doubtful that this attack will be mended on each server within a short period of time.
假设存在大量的设施(Eucalyptus声称其客户超过25000个),那我们真的怀疑能否在短期内修复每台服务器上的攻击。
The specific attack scenario for a Linux SACK processor requires a retransmission queue that already holds large Numbers of packets.
特定于LinuxSACK处理器的攻击场景要求重传队列中已经持有大量包。
One problem that many players have faced in other games, is the ability to gather together to attack or defend against other players on a large scale.
许多玩家在游戏中要面对一个问题就是,召集起来大规模进攻或者防御。
Another potential advantage results from the fact that the plane is already tilted to a large Angle of attack as it rolls down the runway.
另一个潜在的优点,是飞机在跑道滑行时,机翼已经有一个较大的迎角。
RSA security is based on complex problem of large number factoring, and factorization algorithms that attack RSA system in use are introduced simply.
RS A密码系统的安全性是基于大数分解困难问题。文中简要地介绍了目前攻击RSA密码系统的常用大数分解算法。
Another common belief is that piranha form large schools for hunting, allowing them to attack larger prey than a single fish could.
人们普遍认为食人鱼聚成一大群是为了捕食,这样相对于单兵作战更易捕猎到较大的猎物。
For cryptologic applications, it is of course highly disirable that the linear complexities of pseudorandom sequences be as large as possible, and the sequences resist the correlation attack.
对于流密码体制中使用的伪随机序列,我们要求它既要有尽可能大的线性复杂度,又要能抗相关攻击。
Israel's air force carried out a large-scale exercise in June that was interpreted by many as a rehearsal for a possible attack on Iran's nuclear facilities.
以色列空军六月进行了大规模的军演,这被许多人理解成是对伊朗核设施有发动攻击之前的彩排。
Although these Numbers seem to be very large, but the speed of SHA-1 destructive attack is still 100 thousand times faster than brute force attacks, which means that the former is indeed feasible.
虽然这些数字看似非常巨大,但SHA - 1破坏性攻击的速度仍然较暴力破解攻击快10万倍,这意味着前者确实具有可行性。
Google said it believes that the attack affected at least 20 other large corporations.
谷歌当时表示,它相信网络攻击影响了至少20家其他大公司。
Moreover, the effect of real gas for small angle-of-attack case results in small downward force moment, whereas that for large angle-of-attack case results in small upward force moment.
此外,小攻角时真实气体效应产生小低头力矩,而大攻角时产生小抬头力矩。
Moreover, the effect of real gas for small angle-of-attack case results in small downward force moment, whereas that for large angle-of-attack case results in small upward force moment.
此外,小攻角时真实气体效应产生小低头力矩,而大攻角时产生小抬头力矩。
应用推荐