• The paper designed tracing evaluation index system in virtual enterprise and established neural network trace evaluation model.

    设计虚拟企业跟踪评价指标体系建立神经网络跟踪评价模型

    youdao

  • The kernel method "the network trace of single pipeline in delimited region" is designed and implemented, offering a radical functions library of manifold analysis methods.

    系统中各种分析方法核心算法“一定区域范围单条管线网络追踪进行了设计程序实现,实现了各种分析功能的底层方法

    youdao

  • Depending on the nature of the network problem you're diagnosing, it's sometimes worth investigating whether the failing application or command has any kind of verbose, trace, or debug options.

    根据诊断网络问题性质有时候有必要了解失败应用程序命令是否详细输出跟踪调试选项

    youdao

  • Notice that the trace has stopped in the middle of a call to the network accept function.

    注意调用网络accept函数过程停止跟踪操作

    youdao

  • The introduction of these technologies enables the creation of the sensor network that provides the basis for the track-and-trace solutions.

    通过引入这些技术就可以创建传感器网络从而为追踪和跟踪解决方案提供基础

    youdao

  • Classes that generate network traffic have been instrumented to output trace information for application debugging and diagnostics.

    生成网络流量进行检测输出用于应用程序调试诊断跟踪信息

    youdao

  • This paper presented an intruder locating system based on network intrusion detection, which can trace back the indirect attack in controlled network environment.

    提出并实现了一个基于网络入侵检测入侵者定位系统

    youdao

  • Finally, analyze the mechanism of trace and discuss how to process the simulating results. The paper is quite useful for how to use NS and network protocol research.

    分析NS跟踪输出格式基础上讨论仿真结果处理对于NS软件的使用网络协议研究具有强的实用价值

    youdao

  • Occurrence and existence of every trace is not isolated but interknitted and interactional with other things and conditions around and is in a relation network point, which spreads across.

    任何一种痕迹发生存在不是孤立的,而是周围的诸事物、诸条件相互联系、相互作用、相互制约着的,纵横交错的联系网络中的个结点。

    youdao

  • Only, in another son-in the network forum Szechwan" river", but you disappear, disappear without a trace.

    只不过另一个狭小的圈子——在网络论坛四川“锦江”里,消失了,消失得无影无踪

    youdao

  • According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.

    通过回溯分析,试图找到发起攻击的攻击者。将状态分析法运用入侵检测,可增强网络抵御IP欺骗攻击的能力。

    youdao

  • According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.

    通过回溯分析,试图找到发起攻击的攻击者。将状态分析法运用入侵检测,可增强网络抵御IP欺骗攻击的能力。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定