在UNIX或Linux上,主要原因是程序以二进制模式传输。
The main reason on a UNIX or Linux system is that the program was transferred in binary mode.
首次提出将局部二进制模式(LBP)应用到掌纹识别中。
This paper first presents a new method of palmprint identification by using Local Binary Pattern (LBP).
因此,在文件系统中编校文档时,该文档必须在二进制模式下打开。
Therefore, the files must be opened in binary mode when redacting documents in a file system.
在不同编码页面中数据向二进制模式的映射帮助无损的交换国际数据。
The mapping of data into bit patterns in various code pages helps interchange global data without data loss and character corruption.
图2中的每个箭头表示以不同二进制模式体现的不同字符组成的数据流。
Each arrow in Figure 2 represents data flow consisting of graphic characters represented in different bit patterns.
在写完所有数据之后,关闭文件并重新打开文件进行读取,还是使用二进制模式标记。
After you've written all the data, you close the file and reopen it for reading, again using the binary mode flag.
数据项既可以字符串地形式出现,也可以占据整个字节或字的二进制模式出现。
Data items exist as either strings of characters or binary fit patterns occupying whole bytes or words.
全球化的数据使用经过编码的字符集来体现,叫做编码页面,在该页面中数据被映射到二进制模式。
Globalized data is represented using coded character sets called as code pages where the data is mapped to bit patterns.
把这个keytab (indus52.keytab)文件以二进制模式复制到AIXKerberos客户机。
Copy this keytab (indus52.keytab) file to the AIX Kerberos client (indus52.in.ibm.com) in binary mode.
当以二进制模式使用审计时,会以二进制格式写入数据。如果希望长期收集并保存审计事件记录,该模式一般是首选方式。
When audit is used in bin mode data, it is written in binary format and is generally considered the preferred way if you want to collect and keep the audit event records over a long period.
如果你把一个文本文件以二进制模式从一个UNIX系统传送给一个MS -DOS或Macintosh系统,此文件拷贝成ascii模式。
If you transfer a text file in binary mode from a UNIX system to an MS-DOS or Macintosh system, this file should have been copied in ASCII mode.
如果你使用FTP在两台相同类型的计算机之间传送文件的话,例如从一个UNIX系统传送到另一unix系统,你应当使用二进制模式进行所有的文件传送。
If you are FTPing files between two computers of the same type, such as from one UNIX system too another, you can and should do all your transfers in binary mode.
磁盘上这些模式化的带电小粒子代表了计算机使用的二进制数字系统中的单个数据位。
A patterned series of these tiny charged berries on the disk represents a single bit of data in the binary number system used by computers.
如果应用了 XOL包或其它二进制XML模式,这些标准会更高效。
They can work more effectively only if the XOL package or other binary XML schema is applied.
如果确认注释XML模式有效,则提取映射信息并把它以可用的二进制格式存储在编目表中。
If the annotated XML schema is deemed valid, mapping information is extracted and stored in catalog tables in a ready-to-use binary format.
表面看来,基于XML的模式本应比基于二进制的慢,但它并不像表面那么简单。
On the surface, it seems that an XML-based scheme would be intrinsically slower than that of a binary-based model, but it's not as straightforward as that.
i386应用程序的二进制接口规定这个大小是96位,因此- m96bit - long - double在32位模式中是默认值。
The i386 application binary interface specifies the size to be 96 bits, so -m96bit-long-double is the default in 32-bit mode.
在创建file对象时,通过把'b'添加到文件模式中,可以很容易地用 Python 处理二进制数据,如清单7 所示。
You can easily do so in Python by appending 'b' to the file mode when you create the file object, as shown in Listing 7.
如果检查后发现带注释的XML模式有效,那么映射信息将被提取并以即用型(ready - to - use)二进制格式存储在编目表中。
If the annotated XML schema is deemed valid, the mapping information is extracted and stored in catalog tables in a ready-to-use binary format.
现在已经有了一个二进制文件,其中包括XMLGrammarPool实例的Xerces-C++表示,缓冲池中包含应用程序用到的所有模式文档。
Now you have a binary file on disk that contains a Xerces-C++ representation of the XMLGrammarPool instance containing all the schema documents of interest to your application.
AIX审计可以配置为三种模式:流、二进制或者流和二进制。
AIX audit can be configured to operate in three modes: stream, bin, or stream and bin.
这种模式只能宿主于Linux,在这种模式下,可以启动不同体系结构的二进制文件。
In this mode, which can only be hosted on Linux, a binary for a different architecture can be launched.
Eclipse既支持自动build模式,也支持手动build模式。两种模式都能创建桥所必需的二进制文件。
Eclipse supports both automatic and manual build modes, both of which can build the necessary binary files for the bridge.
但是,当您运行一个脚本时,内核不会将其看作是一个Linux二进制程序;它发现脚本附带有一个解释程序路径,当尝试加载解释程序时,它将不再运行于模拟模式之下。
But when you run a script, the kernel doesn't see this as a Linux binary; it sees a script with an interpreter path, and it's no longer running in emulation mode when it tries to load the interpreter.
部署在模式中时,可扩展节点部件创建一个虚拟机实例,其中只有WebSphereProcessserver二进制代码。
When deployed in a pattern, the Extendable nodes part creates a virtual machine instance where only the WebSphere Process Server binaries exist.
信号量是又一种以两种风格出现的基本方法:二进制和计数模式。
Semaphores are another type of synchronization primitive that come in two flavors: binary and counting.
将该安全模式在计算机病毒检测中进行了应用,实现了一个简单的基于二进制编码的计算机病毒检测模拟系统。
The security model carried on an application in the detection of computer virus, for this purpose, we also developed a simple simulation program based on binary coding.
如果我用查看器打开它-它不包含任何可识别的模式,只是一些二进制内容。
If I open it with a viewer - it doesn't contain any recognizable patterns, just some binary content.
如果我用查看器打开它-它不包含任何可识别的模式,只是一些二进制内容。
If I open it with a viewer - it doesn't contain any recognizable patterns, just some binary content.
应用推荐