The connections and protocols that show how these participants interact to do so.
表示这些参与者如何相互作用的连接和协议同样如此。
The new support in the primitive lets you querying either a single protocol, all protocols, or the existing behaviour of Web service and SCA endpoints, as show below.
在原语中的新支持让您可以查询单一协议、所有协议或Web服务和sca端点的现有行为,如下图所示。
Analysis results show that it is a secure protocol and more efficient than other protocols.
分析表明,该协议是安全的,并且协商效率优于现有协议。
Both theoretic analysis and simulation test show that, these two protocols can improve the schedulability of hard real-time transactions, and achieve higher processor utilization.
理论分析与仿真测试结果都表明,这两种协议能够改善硬实时事务集的可调度性,并实现更高的处理器利用率。
Results show that the method using symbol model checker can discover replay attacks upon some cryptographic protocols and is effective.
结果表明,利用符号模型检测方法分析并发现密码协议重放攻击的漏洞是一种行之有效的方法。
The simulation results show POR outperforms traditional DTN routing protocols in VSN.
实验结果表明,在车载传感器网络中POR协议的性能优于传统DTN路由协议。
Quantitative analysis and simulation result also show that it's feasible and effective to implement service discovery protocol based on existed route protocols using cross-layer design methodology.
理论分析和仿真实验结果均表明,采用跨层设计思想在现有路由协议的基础上实现的服务发现协议是高效和可行的。
Simulational results show that the clustering scheme provides longer lifetime and higher throughput than the current important clustering protocols in heterogeneous environments.
模拟实验结果显示,与现有的重要成簇方案相比,新的成簇算法在异构网络下提供了更长的网络生存时间和更大的网络有效吞吐量。
Along with the comprehensive application of computers and network, many protocols and software which seem to be safe and correct show serious security problems.
随着计算机和网络的广泛应用,很多貌似安全和正确的协议或软件呈现出严重的安全问题,这些问题来自设计和实现等多个方面。
Along with the comprehensive application of computers and network, many protocols and software which seem to be safe and correct show serious security problems.
随着计算机和网络的广泛应用,很多貌似安全和正确的协议或软件呈现出严重的安全问题,这些问题来自设计和实现等多个方面。
应用推荐