The paper designed tracing evaluation index system in virtual enterprise and established neural network trace evaluation model.
设计虚拟企业跟踪评价指标体系,建立神经网络跟踪评价模型。
The kernel method "the network trace of single pipeline in delimited region" is designed and implemented, offering a radical functions library of manifold analysis methods.
对系统中各种分析方法的核心算法“一定区域范围内单条管线的网络追踪”进行了设计和程序实现,实现了各种分析功能的底层方法库。
Depending on the nature of the network problem you're diagnosing, it's sometimes worth investigating whether the failing application or command has any kind of verbose, trace, or debug options.
根据要诊断的网络问题的性质,有时候有必要了解失败的应用程序或命令是否有详细输出、跟踪或调试选项。
Notice that the trace has stopped in the middle of a call to the network accept function.
请注意,在调用网络accept函数的过程中停止了跟踪操作。
The introduction of these technologies enables the creation of the sensor network that provides the basis for the track-and-trace solutions.
通过引入这些技术,就可以创建传感器网络,从而为追踪和跟踪解决方案提供基础。
Classes that generate network traffic have been instrumented to output trace information for application debugging and diagnostics.
已对生成网络流量的类进行检测以输出用于应用程序调试和诊断的跟踪信息。
This paper presented an intruder locating system based on network intrusion detection, which can trace back the indirect attack in controlled network environment.
提出并实现了一个基于网络入侵检测的入侵者定位系统。
Finally, analyze the mechanism of trace and discuss how to process the simulating results. The paper is quite useful for how to use NS and network protocol research.
在分析NS的跟踪输出格式的基础上讨论了仿真结果的处理,这对于NS软件的使用及网络协议的研究具有较强的实用价值。
Occurrence and existence of every trace is not isolated but interknitted and interactional with other things and conditions around and is in a relation network point, which spreads across.
而任何一种痕迹的发生和存在都不是孤立的,而是与周围的诸事物、诸条件相互联系、相互作用、相互制约着的,是纵横交错的联系网络中的一个结点。
Only, in another son-in the network forum Szechwan" river", but you disappear, disappear without a trace.
只不过,在另一个狭小的圈子——在网络论坛的四川“锦江”里,你却消失了,消失得无影无踪。
According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.
通过回溯分析,试图找到发起攻击的攻击者。将状态分析法运用于入侵检测,可增强网络抵御IP欺骗攻击的能力。
According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.
通过回溯分析,试图找到发起攻击的攻击者。将状态分析法运用于入侵检测,可增强网络抵御IP欺骗攻击的能力。
应用推荐