This was illustrated in the wizard introduced in my previous column.
这一点在前一篇专栏文章所介绍的向导中作了说明。
I wasn't able to discuss the builder in the previous column, so I'll introduce it now.
在前一篇专栏文章中,我无法讨论这一构建器,因此我现在将介绍它。
The followpos function, which was explained in the previous column, was not implemented.
没有实现上一篇专栏文章中解释过的followpos函数。
ContentHandlerExtractor, introduced in a previous column, was helpful in writing this method.
上一篇专栏文章中介绍过的ContentHandlerExtractor有助于编写这个方法。
My previous column focused on frequent misunderstandings in the use of the XML syntax itself.
上一期专栏主要围绕着xml语法本身使用中的一些常见误解进行的。
We worked with the generic form in the previous column, and will continue to explore that form here.
我们在前一专栏中使用的是常规形态,并将在此继续研究这种形态。
In my previous column, I showed you how to analyze a file export to turn it into an RPC request.
在上一篇专栏文章中,我说明了如何分析文件输出,并把它转换成rpc请求。
CreateDFA is a direct implementation of the DFA construction algorithm discussed in the previous column.
createDFA是以前专栏文章中所讨论过的DF a构造算法的直接实现。
Similar to the previous column, we send the SOAP request to the server and parse and display the response.
与上一期专栏类似,我们向服务器发送SOAP请求,然后分析和显示响应。
You might remember from my previous column, "Wrapping up XI," I chose to implement the XMLReader interface.
您可能记得我的上一篇专栏文件“完成XI”,我选择了实现XMLReader接口。
The DFA construction algorithm converts this parse tree into a set of states, as the previous column explains.
如前一篇专栏文章中所解释的,DF A构造算法将该解析树转换成一组状态。
As I wrote in a previous column, the technology could also permit the exchange of other types of digital contracts.
正如我在之前的专栏中所写,这种技术还可以实现其他类型数字合约的交换。
There are no fields in HCNode, as introduced in the previous column, to store what to do upon successful recognition of an XPath.
在上一篇专栏文章中所介绍的HCNode中没有一些字段来存储在成功识别XPath时该做些什么。
As discussed in the previous column, a model is a simplified description of a system that can assist in calculations and predications.
上一期已经指出,模型是帮助计算和预测的系统简化描述。
I covered the background on this in a previous column, and I also showed two Perl implementations, one that bred bytes and another that bred words.
我在前一篇专栏文章中介绍了有关的背景知识,而且还演示了两个Perl实现,一个实现产生字节而另一个实现产生单词。
We've already covered one common mistake, buffer overflows, in a previous column (see Resources for links to previous installments of Secure programmer).
以一个先前的专栏中我们已经论及了一个常见的错误:缓冲区溢出(参阅以获得安全编程先前部分的链接)。
It expects the front end (reread previous column for more on the front end and back end) to return a parse tree that contains all the XPaths to recognize.
该算法期望前端(请重新阅读上一篇专栏文章以了解更多有关前端和后端的信息)返回一个包含所有要识别的XPath的解析树。
In my previous column, I described how simple and complex archetypes (see the sidebar What are archetypes?) may be used to simplify and streamline your XML schema designs.
在前一篇专栏文章中,我描述了如何使用简单和复杂原型(请参阅侧栏什么是原型?)来简化和使XML模式设计有效率。
Expect, the subject of the previous column, and Practice, will both make appearances in future installments, and it'll be best to start off with clear understandings of them.
Expect是上一个专栏的主题,它和Practice都会在未来部分中出现,并且,在开始阅读未来部分之前,最好先透彻地理解它们。
In a previous column, I discussed how valuing a startup is more driven by market conditions, comparable companies, exit potential, future capital needs and many other factors.
在前面我讨论过评估初创公司的价值时需要考虑市场环境、同类公司情况、退出的可能性、未来资金需求以及其他的因素。
But that previous column leads one to question whether a session bean is necessary at all, introducing the possibility of using entity beans and their Home methods instead of session beans.
但上期专栏介绍了使用实体Bean及其Home方法代替会话Bean的可能性,从而使人们对会话Bean是否真的是必需的产生了疑问。
After wrapping up my discussion of XI in my previous column, I decided it was time to revisit XM, the simple XML content management and publishing solution with which I kicked off this column.
在前一篇专栏文章中结束了对XI的讨论后,我觉得是重新讨论XM的时候了,这是一个简单的XML内容管理和发布解决方案,本专栏的第一篇文章就是对它的介绍。
In our previous column, we discussed software security analysis at a high level, introduced a methodology for assessing software security, and explained the key characteristics of a risk analysis.
在上一专栏中,我们从较高层次讨论了软体安全性的分析,介绍了软体安全性的方法,并且说明了风险分析的关键特性。
The previous installment in this column identified some common input data types and how to check them.
本专栏的前一期文章指出了一些常见的输入数据类型以及检查它们的方法。
Several of these have been explored in previous issues of this column.
在本专栏前面的讨论中已经探讨了一些这样的接口。
In Table 1 below, which you should recognize from previous installments of this column, we map business requirements to specific patterns for e-business.
在下面的表1中(您应从这个专栏的前几篇专栏文章中熟识),我们将业务要求映射到特定的电子商务模式。
In the previous article in this column I looked at ways of using workflow to raise hurdles for spammer robots, ideally without undue inconvenience to legitimate users.
在本专栏前一期文章中,我介绍了如何使用工作流对付垃圾信息机器人程序,并且最好不会给正当使用的用户带来任何不便。
In some ways, a generator is like the closures which were discussed in previous installments of this column discussing functional programming (see Resources).
在某些方面,生成器就象本专栏前面文章讨论的函数型编程中的“终止”(参见参考资料)。
In some ways, a generator is like the closures which were discussed in previous installments of this column discussing functional programming (see Resources).
在某些方面,生成器就象本专栏前面文章讨论的函数型编程中的“终止”(参见参考资料)。
应用推荐