Another way of assignment problem is given by using network model.
用网络模型的方法,给出指派问题的又一种解法。
The Methods to Represent and Analyze Organizational Knowledge by Using Network Model;
象征用形象、形式或模型来表示;
The qualitative and quantitative description was taken out by using network evaluative system.
利用网络评价系统,以获得定性和定量的结果描述。
The mutual impedance matrix of the circular array is also studied by using network theory and MOM.
利用网络理论和矩量法对圆阵互阻抗矩阵的计算进行了研究。
Station computer interlocking monitoring system can be accessed remotely by using network technology.
本文采用网络技术,实现远程登录访问车站微机联锁的监测系统。
The state inspection module was built up with device driven programming, hardware system is called by using network driven program with NDIS library.
系统采用设备驱动程序编程构造状态检测模块;网络驱动程序通过NDIS程序库对调用硬件系统。
By using network interceptor and system call interceptor, it resists all kinds of protocol attacks, operation system attacks and application attacks.
通过网络截获器和系统调用截获器,对各种各样的协议攻击、操作系统攻击和应用程序攻击进行防范。
Based on the present monitoring technique, it is possible to realize long distance real time monitoring and two-way data transmission by using network communication.
根据目前的技术状况,利用网络通讯,研究和开发地质灾害远程实时遥控、遥测与数据双向传输已成为可能。
Through this system the integrated system platform is set up by using network technique which combines data processing, verification, browse and inquiry of the zonation test all in...
通过此系统应用网络技术搭建一个厂及油田公司各采油矿、队使用的分层测试数据处理、审核、浏览、查询功能为一体的综合系统平台。
By using a tool that provides some of the processing, you can simplify the process of decoding network data.
通过使用实现某些处理的工具,您可以简化解码网络数据的过程。
One way to counter this is by using a fully redundant path to access external SAN (storage area network) devices-in this way, you can reduce failures caused by storage subsystem access problems.
解决这个问题的一种方法是使用全冗余路径来访问外部SAN(存储区域网)设备—通过这种方式,可以减少因存储子系统访问问题导致的故障。
Using a network of computers (dubbed zombies) controlled by a single master machine, the hacker tries to overwhelm a website's servers.
利用一个由单一主机控制的电脑网络(称为僵尸网络),黑客竭力地颠覆一个网站的服务器。
Virtual I/O lowers costs and enables simplified server management by using fewer cards, cables, and switch ports, while still achieving full network I/O performance.
由于使用更少的卡、线缆和交换机端口,虚拟I/O可以降低成本并简化服务器管理,同时仍然实现出色的网络 I/O 性能。
Regarding the network compression statistics, we ran the tests using FTP as a control, to determine how the network was affected by a transfer of data.
对于网络压缩统计数据,我们使用FTP运行该测试以进行控制,确定数据传输如何影响网络。
Once the system or service has been made unavailable, legitimate clients are blocked from using the network service hosted by the system under attack (See Figure 2).
如果系统或服务不可用,合法用户就无法使用受攻击系统上的网络服务(见图2)。
Therefore, by using these workloads, you can get more realistic information (CPU, disk, memory, and network) for deployment planning than with prior workloads.
因此,与以前的工作负载相比,这些工作负载能够为部署计划提供更真实的信息(CPU、磁盘、内存和网络)。
DHL says it will bite back by using the savings from the UPS deal and from reconfiguring its ground network to offer a cheaper alternative to services from UPS and FedEx.
敦豪方面说它肯定会反咬一口的,反咬的方式是利用它和联邦联合快递合同的收入,还有就是通过重新设计其地面快递网络以此来提供更加便宜的服务,这将是联邦联合快递和联邦快递服务替代品。
To start, first you need to create a binary record of the packets going past on the network by writing out the data to a file using either snoop or tcpdump.
要开始处理,您首先需要使用snoop或tcpdump将数据写到一个文件,而创建一个通过网络的数据包的二进制记录。
Kerberos is a network authentication protocol originally developed by MIT that provides mutual authentication using symmetric keys.
Kerberos是一种网络认证协议,最初由MIT开发,使用对称密匙实现相互认证。
Overall, the system redesign minimized network traffic by using session beans that were deployed with entity beans.
总之,通过使用与实体bean一起部署的会话bean系统重新设计使网络流量最小化。
By using objects that move around the network, Jini architecture means the network as a whole, along with each of its individual services, will be adaptable to change.
通过使用在网络中移动的对象,Jini体系结构意味着整个网络(连同其中每个单独的服务)将可适应于变化。
Ensure that there's a route out to the target host by using route get (see Listing 7), verifying with the network administrator that this is the correct gateway to use.
使用routeget查明路由(见清单7),检查网络管理员是否使用了正确的网关,从而确认有到目标主机的路由。
The ntop command displays a list of hosts that are currently using the network and report information about the traffic generated and received by each host.
ntop命令显示当前使用网络的主机列表,并报告关于每个主机生成和接收的通信流量的信息。
You can test the network by using ping and specifying the remote IP address you set in the if-up script.
可以通过使用ping并指定if - up脚本中设置的IP地址来测试网络。
The system, being developed by HP, detects threats using proactive technologies and by monitoring fluctuations in network traffic to improve real-time analysis as well as visualization.
HP开发的该系统采用proactive技术来探测威胁,并通过监视网络流量的波动以改进实时分析以及可视化。
The application servers in n-tier architecture host remotely accessible business components. These are accessed by the presentation layer web server over the network using native protocols.
N级结构中的应用服务器负责提供可远程访问的业务逻辑组件,而表现层网页服务器则使用本网协议通过网络访问这些组件。
When using a normal VPN solution, routing between VPN Client 1 and VPN Client 2 would only be possible by routing all of the network traffic through the VPN Host.
使用常规VPN解决方案时,VPNClient1和VPN Client2之间的通信只能通过VPNHost来路由所有网络流量才可能实现。
It may be cheaper for the carrier to modify its network than to modify its devices, especially if customers are using devices not supplied to them by the carrier.
对电信公司来说,调整网络的费用可能比调整设备更低,尤其是在用户所用设备并非由该电信公司提供的情况下。
Using hot swap hardware facilities: Hardware recovery time can be minimized by using hot swap hardware facilities such as disks, network cards, and so on.
使用热插拔硬件设备:硬件恢复时间可通过使用磁盘、网卡之类的热插拔硬件设备来达到最小化。
You can reduce the network serialization/deserialization overhead by using a custom serialization approach.
您可以使用一个自定义序列化方法减少网络序列化/反序列化开销。
应用推荐