So I have n operations log n times, n log n there we go, n log n. Took us a long time to get there, but it's a nice algorithm to have.
所以我log,n遍的n次操作,就得到了,虽然花了不少时间得到了这个结论。
By default, the toolbar, Layer Manager, Navigate window, and Operations Log are docked in the Main window, but you can undock them or hide them.
默认情况下,工具栏,图层管理器,浏览窗口,操作日志在主窗口中的,但你可以释放他们或隐藏他们。
Therefore, your operations on the application under test might be a success, but they might not be clean because of the exceptions or warnings in the log file.
因此,您对测试程序所做的操作可能是成功的,但是它们可能并不是简洁的,因为日志文件中有例外情况及警告的存在。
This is because these update operations require synchronous writing to the database log.
原因是这些更新操作都要求同步地写到数据库日志。
Encapsulate a request as an object, thereby letting you parameterize clients with different requests, queue or log requests, and support undoable operations.
将请求压缩为对象,使您能用不同的请求,队列或日志请求,参数化客户机,并支持可撤销的操作。
Thus, the read operations compete with log writing and the write operation for data pages from the buffer pool.
因而,读操作与日志写和缓冲池中的数据页的写操作之间存在竞争。
Recall that a journaled file system keeps a log (journal) of the file operations.
日志式文件系统通常维护一份关于文件操作的日志。
If, for instance, log records are input to statistical analysis, a low number of failed log operations might be tolerated.
例如,如果日志记录只是用来进行统计分析,少数几次失败的日志操作将是可以接受的。
We set the number of secondary log files to 10 to avoid potential issues during the spatial import operations.
我们将辅助日志文件的数量设为10,以避免在空间导入操作期间可能发生的问题。
Auditing enables the database server to log sensitive operations performed by users and administrators for analysis and identifying system misuses.
审计功能允许服务器记录用户和管理员执行的敏感操作,以便进行分析并识别系统误用。
Log operations can be treated as well as other updates to participate in atomicity.
可视为其它更新一样参与原子事务的日志操作。
Increasing the level of logging will cause performance to degrade because of the additional I/O operations that need to be coordinated to write to the log files.
提高日志级别会导致性能降级,因为需要协调额外的I/O操作,以便将它们写入日志文件。
It encapsulates a request (a method call on some object) as an object, which lets you parameterise clients with different requests, queue or log requests, and support un-doable operations.
它将请求(某个对象上的方法调用)作为对象封装,这使您能够通过不同的请求(队列或日志请求)确定客户机的参数并支持无法执行的操作。
The canonical example is of logging; typically, services will connect to and start writing to a log service during start-up and other operations.
经典的例子就是logging:通常,服务在启动和做其他操作的时候,就要连接并开始写日志了。
For the slow alter, alter fragment, or clustered index creation operations, the alter operation replay position is moved to the current log position before performing the operation.
对于slowalter、alter fragment或集群索引创建操作,在执行alter操作之前,alter操作的重放位置被移动到当前的日志位置。
The red-black tree is O(log n) in time for most operations, while the previous scheduler employed O(1), using a priority array with a fixed number of priorities.
对于大多数操作,红黑树的执行时间为O(logn),而以前的调度程序通过具有固定优先级的优先级数组使用 O(1)。
After those operations, Enterprise Replication does not recognize the logical log records related to the original partition Numbers.
这些操作过后,EnterpriseReplication不认识与初始分区号相关的逻辑日志记录。
The log directory holds the database-specific log files that let Derby record the operations that occur during a set of database operations (a transaction).
log目录保存特定于数据库的日志文件,这些文件允许Derby记录在一组数据库操作(一个事务)期间发生的操作。
Write operations that cycle through the error queue too many times are dumped into a log for manual inspection.
如果写操作在错误队列里运行了太多次,这些操作会被导入一个日志文件,由人工处理。
Used by applications to perform backup, copy, and restore operations and associated clean-up tasks for a log shipping configuration without running the backup, copy, and restore jobs.
应用程序可用其执行日志传送配置中的备份、复制和还原操作以及相关的清除任务,而无需运行备份、复制和还原作业。
Large - scale index operations, performed offline or online, can generate large data loads that can cause the transaction log to quickly fill.
脱机或联机执行大范围的索引操作,会生成大型数据负载,这些负载会造成事务日志快速填充。
The Command Pattern: encapsulates a request as an object, thereby letting you parameterize other objects with different requests, queue or log requests, and support undoable operations.
命令模式:将“请求”封装成对象,以便使用不同的请求队列或者日志来参数化其他对象。命令模式也支持可撤销的操作。
Encapsulate a request as an object, thereby letting you parameterize clients with different requests, queue or log requests, and support undoable operations.
将一个请求封装为一个对象,从而使你可用不同的请求对客户进行参数化;对请求排队或记录请求日志,以及支持可撤销的操作。
The term "other operations" as mentioned in these Operating Rules refers to the feedback of doubtful information, check of log inquiries, statistical analysis, and system management, etc.
本操作规程所称其他操作是指疑义信息反馈、核查日志查询、统计分析、系统管理等操作。
You can estimate transaction log size based on database operations.
您可以估计基于数据库操作的事务日志的大小。
The present invention improves the performance of a logging system by reducing the size of log records and by allowing parallel execution of recovery operations.
本发明通过减小日志记录大小并允许恢复操作的并行执行,改善了日志系统的性能。
Security audit system can record the user's actions and block the user's illegal operations in a timely manner. The log information can provide evidence for the computer forensics.
安全审计系统能够及时地将用户操作以日志的形式记录下来,并且对违规操作进行阻断,日志信息可以为事后取证提供证据。
In FSCA, all operations of managers are recorded in system log, and digital watermark technology is used to ensure authoritativeness, accountability, integrity of the log.
采用数字水印日志技术。FSCA系统严格记录管理员的操作日志,并且。
The log grows continuously as logged operations occur in the database.
随着数据库中记录的操作的增多,日志也不断增大。
The log grows continuously as logged operations occur in the database.
随着数据库中记录的操作的增多,日志也不断增大。
应用推荐