While most of these encounters were reported as appearing like surveillance, in some instances, the UFOs actively engaged in tampering with missile systems.
与此同时,这样的遭遇被作为新发现像监督一样报道。在一些例子中,不明飞行物活跃地干预导弹系统。
Other users would then be prevented from tampering with any objects created in the schema.
这样就可以防止其他用户篡改在这个模式中创建的任何对象。
The model minimizes the risk of tampering with the authorization data so that servers do not spend more time in verifying the data.
这个模型将篡改授权数据的风险降至了最低,因此服务器不用花费大量的时间来验证数据了。
Different images, such as those used in the image above in the 3.0 splash screen, are assigned their own layers, making it easy to work on those images without tampering with other areas of the image.
不同图像,比如那些用在3.0版载入画面的图像,是在分布各自的图层上,使得在不干预图像其他部分的情况下编辑部分图像变简单。
The bank’s officials have argued, in increasingly hysterical tones, that any tampering with Greek debt, even a modest extension of maturities, would be a catastrophe.
欧中中央银行的官员们以一种歇斯底里的语调争论道,任何对于希腊债务的改变,即便是对到期债务的一丁点延期,都将导致一场灾难。
The bank's officials have argued, in increasingly hysterical tones, that any tampering with Greek debt, even a modest extension of maturities, would be a catastrophe.
欧中中央银行的官员们以一种歇斯底里的语调争论道,任何对于希腊债务的改变,即便是对到期债务的一丁点延期,都将导致一场灾难。
WS-Security USES XML signature to ensure that data has not been tampered with in transit, because any tampering would invalidate the signature.
WS - Security使用XMLSignature确保数据不会在传输中被篡改,因为任何窜改都会导致签名失效。
But fears have been raised about the safety of tampering with the brains of babies in such a fundamental way.
但是,对于这种从本质上干预婴儿大脑的安全性问题引起了大家的担心。
In the experimental phase, image with watermark has been attacked in several ways, such as cropping, scaling, noise, JPEG compression and tampering.
在实验阶段,对嵌有水印的图像进行了剪切、缩放、噪声干扰、JPEG压缩和篡改等攻击实验。
Papers completed the watermark embedded in it after the attacks of the anti-testing, to determine how to tamper with the regional and tampering with the type of semi-fragile watermarking method.
论文在完成水印的嵌入之后对它的抗攻击性进行检测,讲述了如何确定篡改区域和篡改类型的半易损水印的方法。
Papers completed the watermark embedded in it after the attacks of the anti-testing, to determine how to tamper with the regional and tampering with the type of semi-fragile watermarking method.
论文在完成水印的嵌入之后对它的抗攻击性进行检测,讲述了如何确定篡改区域和篡改类型的半易损水印的方法。
应用推荐