Filtering rules are not the same thing as the normalization rules that aim at reducing data redundancy.
筛选规则与针对减少数据冗余的标准化规则不是一回事。
At this point, you have created the filtering rules and prepared syslog to record logs of rejected packets.
到此为止,您已经创建了过滤规则,并准备好了syslog以记录被拒绝包的日志。
The extended tuple space introduced a concept of interaction channel and added the triggering and filtering rules.
这种扩展的元组空间引入了交互通道的概念,增加了触发和过滤规则。
The filtering rules should also include automatic purging or backup of aged data and a mechanism to expire large XML files sooner.
筛选规则还应该包括对旧数据的自动清除或者备份、以及使大的XML文件不久后过期的机制。
After analyzing the excessive filtering rules, a solution to increase the performance of network access control equipment is proposed.
分析过量规则对网络访问控制设备性能的影响,讨论针对这一问题的解决方法。
The block shown in Listing 2 effectively does nothing at this point, but gives you a baseline for making quick changes to the filtering rules.
清单2中的代码块实际上未执行任何操作,但是为您提供了快速修改过滤规则的基本方法。
It analyses the information transported in application layer protocol and controls the forwarding of the information based on the filtering rules.
它对应用层协议中传输的信息进行分析,并根据过滤条件,控制信息的转发。
The authors analyze the essence of some existing algorithms of junk E-mail filtering rules and give the way to represent an E-mail as a transaction.
该文对现有电子邮件系统中存在的安全性、垃圾邮件、邮件分类、信箱命名资源等问题进行了分析。
It analyses the information transported in application layer content protocol and controls the forwarding of the information based on the filtering rules.
它对应用层内容协议中传输的信息进行分析,并根据过滤条件控制信息的转发。
Even if you don't intend initially to do much with the events that are generated, you have the flexibility down the road to do so by just adding some filtering rules and patterns.
即使你最初不想处理太多的事件,也可以通过添加一些过滤规则和模式来灵活处理。
The logic is primarily based on filtering rules that may be applied on the message content, message header, service requester, and so on to decide the best service provider at run time.
该逻辑主要基于筛选规则,可以将这些筛选规则应用于消息内容、消息头、服务请求者等等,以在运行时决定最恰当的服务提供者。
Now you've learned how to build basic rules and chains and how to add or remove them from the packet filtering tables.
现在,您已经学习了如何建立基本的规则和链以及如何从信息包过滤表中添加或删除它们。
Filtering based on portal access control or personalization rules would be more efficient here.
此处根据门户访问控制或个性化规则进行筛选会更为有效。
Using a filtering system on your server or client also means that you can take advantage of simpler rules to dispose of spam that gets through the spam filters.
在服务器或者客户端中使用过滤系统,还意味着您可以利用比较简单的规则来处理垃圾邮件过滤器无法识别的垃圾邮件。
After the rules are built and chains are in place, the real work of packet filtering starts.
建立规则并将链放在适当的位置之后,就可以开始进行真正的信息包过滤工作了。
A table is a packet filtering table that contains rules and chains dealing with specific kinds of packets only.
表是包含仅处理特定类型信息包的规则和链的信息包过滤表。
These areas included rules for enabling remote services, IP security filtering, and more granular control for startup files, which included inittab, rc.tcpip, and inetd.
这些领域包括启用远程服务的规则、IP安全性过滤和对启动文件,包括inittab、rc.tcpip 和inetd 的更细粒度的控制。
Once the rules have been calculated, the data can be explored using the SPSS Modeler filtering tools (see Figure 3).
一旦计算出了规则,就可以使用SPSSModeler过滤工具浏览数据(参见图3)。
These rules are stored in special-purpose packet filtering tables integrated in the Linux kernel.
这些规则存储在专用的信息包过滤表中,而这些表集成在Linux内核中。
These engines include filtering, rules, and recommendations engines, or combinations of all three.
这些引擎包括筛选、规则和建议引擎,或所有这三种引擎的组合。
This method includes the "bi-gram" probabilistic model, the statistical algorithm, the rich rules and rule-based algorithm for word filtering.
该方法包括高效的“二元语法”统计模型、统计算法、统计选词策略、丰富的规则知识和规则过滤算法。
Nowadays, anti-spam measurements often include black or white list technique, manual rules and keyword based content filtering.
目前,常用的包括黑名单与白名单技术、基于关键词搜索以及设定过滤规则等方法。
This article analyzes the source of SPAM, putting forward the method of filtering SPAM, establishing the filtering rule, and proves the rules' validity by experiment.
通过分析垃圾邮件的来源,提出了过滤垃圾邮件的方法,建立了相应的过滤规则,并通过实验证明了该规则的有效性。
This article analyzes the source of SPAM, putting forward the method of filtering SPAM, establishing the filtering rule, and proves the rules' validity by experiment.
通过分析垃圾邮件的来源,提出了过滤垃圾邮件的方法,建立了相应的过滤规则,并通过实验证明了该规则的有效性。
应用推荐