Why can't you put that in your paper, or if you want, just publish the paper, which is interesting and then have a postscript in which you attack the... Because that's obviously relevant.
你为什么不把它们写进你的论文里呢,或者如果你想的话,可以先发表这篇论文,这篇很有意思,之后可以有一个补充说明来抨击,因为这显然是相关的。
And I sort of gave him hints about how to attack Irving Singer and his writing and he took me up on that and then what I published was a much less favorable paper.
我给了他很多暗示,怎样抨击欧文·辛格和他的作品,他接受了我的意见,之后发表的那篇论文中不太有利于我。
What's certain is that Bayern's individual class in attack looks strong enough to paper over defensive cracks that can approach Grand Canyon size at times.
可以确信的是拜仁的个人进攻能力足以摧毁多特脆弱的防线。
An emerging threat, first outlined by Amit Klein in a paper in 2004, is the blind XPath injection attack (see Resources).
最近开始出现的一种威胁(最初由AmitKlein于2004年在一篇论文中概述)是XPath盲注攻击(请参阅参考资料)。
So I immediately type up the paragraph, see what it looks like on a clean sheet of paper, and then attack that sheet of paper with my pencil again.
所以我会立刻把写好的一段打印出来,看看它在一张干净的白纸上是什么样子,然后再用铅笔在纸上涂涂改改。
In this paper, the method of reentry maneuver guidance applying to attack the ground fixed target is described by using flight dynamics principle and modern control theory.
本文运用飞行力学原理和现代控制理论,对攻击地面固定目标的飞行器的再入机动制导方法进行了研究。
"Man pages map" a paper for the opposition against the then vernacular, given the tendency to promote retro sharp attack.
《二十四孝图》一文中,作着就对当时反对白话文,提倡复古的倾向给予了尖锐的抨击。
In this paper we take a closer look at botnets, common attack techniques, and the individuals involved.
这里,我们对僵尸网络,普遍的攻击技术以及涉及到的个人做一个更贴近的观察。
The best method, therefore, for calculating what your DPS will be given a gear or talent change, is to be able to predict with certainty your paper doll ranged attack speed and damage spread.
因此,计算由装备与天赋改变对于DPS变化的最好方法,将能准确地预测状态系统中的远程攻击速度与伤害差异。
To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).
针对无线传感器网络自身特殊性和路由协议面临的攻击类型,提出了一个基于灰理论的分布联合的攻击检测模型(GADM)。
The main purpose in the paper is exposing holes in protocols, using them to attack network and giving schemes for defending attacks.
本文主要目的就是揭示协议中的漏洞,如何利用漏洞来进行攻击以及怎样去防范攻击。
After researching theory of fuzzy math, this paper also designs an evaluation model of attack severity based on fuzzy math.
在研究模糊数学理论的基础上,设计了一个基于模糊数学的攻击危害度评判模型。
Using rebuttals of evidence in an argumentative paper can both attack the arguments of your opponents and support your own ones.
议论文写作中,利用反证法常能很好地驳斥对方论点并树立自己的论点。
This paper focuses on discovering the potential attack behaviors by analyzing association rules in audit data.
本文通过对审计数据进行关联规则分析,发现潜在的攻击系统行为。
In this paper, ARP attack on analyzing the problems and gives recommendations to address such attacks.
本文通过对ARP攻击问题的分析探讨,给出了解决此类攻击的建议。
This paper introduces the attack form to IH system model, points out the necessary of adding authentication theory.
文章介绍了对现有信息隐藏系统模型的攻击形式,指出加入认证理论的必要性。
This paper expounds the characteristics of network attack, and puts forward corresponding measures.
本文阐述了网络攻击的特点,并提出网络安全的防范措施。
According to the two attack models, this paper presents a security routing protocol based on Reputation Systems.
针对这两种特殊的攻击方式,本文提出了一个基于声誉机制的安全协议。
This paper introduces the attack tree model, presents a network attack system based on attack tree, which can make attack scenario base on the target's practice and do it.
文章介绍了攻击树模型,提出了一种基于攻击树的网络攻击系统,它可以根据目标的实际情况制定出攻击策略,实施攻击。
A protocol attack description model for attack testing is proposed in this paper, along with the related protocol attack testing algorithms.
本文提出了一个面向测试的协议攻击描述模型,以及相应的协议攻击测试算法。
The different network flow graphs are given according to different attack intensity by changing parameter settings in the paper.
通过调整相关的实验参数设置,给出了在不同攻击强度下被攻击子网的通讯流量图。
By analyzing the principles of Smurf attack, this paper proposes the detection method and defense technology of this attack.
该文在分析了这种攻击实施的原理的基础上,提出这种攻击的检测方法和防范技术。
The paper summarized the method of attack patterns describing and analysis the method's advantage and disadvantage.
本文主要总结攻击模式的表示方法,并对各种方法进行分析。
The paper studies whether the law principle of target selection and attack is practical and how to use it in the complex electromagnetic environment.
文中对海上目标选择与打击的法律原则在复杂电磁环境下是否适用以及如何适用的问题进行了探讨。
The paper discusses the phenomena of the attack by ARP virus and its working principles, proposes testing and treating ways and introduces some currently popular defending methods.
文章讨论了ARP病毒的故障现象和作用原理,给出了用户自检和处理的方法,并介绍了目前比较流行的防御策略。
To improve the security against the counterfeiting attack, this paper proposes a secure dual watermark scheme for image tamper detection and recovery.
为提高可恢复双水印算法抵抗伪造攻击的能力,提出一种用于图像篡改检测和恢复的安全双水印算法。
This paper proposes an improved Statistical Hitting Set attack (SHS-attack) based on MIX anonymity technique and a defence strategy based on dummy packets to counter against this attack.
基于MIX匿名系统模型,提出一种改进的统计命中集攻击算法,并在该算法的基础上给出基于填充包的防御策略。
This paper proposes an improved Statistical Hitting Set attack (SHS-attack) based on MIX anonymity technique and a defence strategy based on dummy packets to counter against this attack.
基于MIX匿名系统模型,提出一种改进的统计命中集攻击算法,并在该算法的基础上给出基于填充包的防御策略。
应用推荐