And then explains CAN protocol precisely. According to the media access controlling method of CAN protocol, the reason of delay time was discussed.
然后介绍了CAN总线的协议规范,根据其介质访问控制方法,详细地分析了CAN总线上报文延时产生的原因。
The theoretical research of the dependable database concentrates on the multi-layer safe database, access controlling, database encoding, channel control and so on.
安全数据库的理论研究主要集中在多级安全数据库、访问控制、数据库加密与推理通道控制等领域。
In addition, you can apply fine-grained access control distinctly to each image and each pattern, controlling who can read the asset and who can edit it.
另外,可以对每个映像和每个模式应用不同的细粒度访问控制,控制能够读取资产的用户和能够编辑资产的用户。
Managing users and groups and controlling their access is always a critical task in operating systems.
管理用户和组并控制它们的访问一直都是操作系统中一项关键任务。
The operating system is responsible for deciding which task should be using the processor at a given time and for controlling access to Shared resources.
一个操作系统负责决定哪一个任务在给定的时间将使用处理器,并且控制对共享资源的访问。
When the application server is not controlling all access to system resources, no guarantees can be made about the existence or compatibility of such resources across different server environments.
当应用服务器不在控制所有对系统资源的访问时,无法保证这些资源在不同服务器环境中的存在和兼容性。
Another popular method of controlling access to table data is through the use of stored procedures.
控制对表数据的访问的另一种流行方法是使用存储过程。
Another important aspect of global variables is that when security of the information is an issue, controlling access is possible.
全局变量的另一重要方面是,当考虑到信息安全问题时,可以控制对信息的访问。
This makes it difficult for developers to find, access, manage and reuse assets because most companies do not have centrally managed system for controlling and monitoring them.
这就使得开发人员很难查找、访问、管理和重用资产,因为大部分公司都不具有用于控制和监视这些资产的中央管理系统。
SAML is a mechanism for controlling access to resources for authenticated principals.
SAML是一种控制对已验证主体的资源进行访问的机制。
Governance will be more and more important in the future, since the need for controlling services usage, billing, access and integration will be more and more important.
治理在未来会变得越来越重要,因为对服务使用、结算、访问和集成的控制需要会变得越来越重要。
Another important aspect of global variables is that where security of the information is an issue, controlling access is possible.
全局变量的另一重要方面是,在考虑到信息安全性时,可以对访问进行控制。
Key to realizing that return is controlling who has access to those services, and controlling how those who have access actually use those services.
实现这个回报的关键,一是控制好谁能访问这些服务,二是控制好那些有权使用的人到底是怎样使用服务的。
This single point of access provides a simple way of enforcing service invocation contracts, allowing for controlling and metering the access to the component services.
单一访问入口是确保服务调用契约的一种简单而有效的方式,使能够我们控制和测量队成员服务的访问。
Finally, we covered how schemas can be used as an effective mechanism for controlling access to database objects in multi-user environments.
最后,讨论了在多用户环境中如何使用模式有效地控制对数据库对象的访问。
Controlling access to workbench contributions and SWT controls are important in RCP applications.
控制对工作台内容和SWT控件的访问对于RCP应用程序来说是很重要的。
It will be about promoting human well-being through access to care, controlling epidemics, and improving the quality of life.
工作总规划将涉及通过获取保健促进人类福祉、控制流行病和提高生活质量。
The LBAC feature provides for greater granularity for controlling read and write access to individual rows and table columns.
LBAC特性为控制对各行和各列的读写访问提供了更细的粒度。
Land degradation - controlling access and removing obstacles to mobility on common pastures.
土地退化-控制公共牧场的准入并消除限制牧场迁移的障碍。
Combining these two features produces a native XML data store that is capable of protecting XML documents and controlling access to them on a document-by-document basis.
通过组合这两大特性,可以产生一个原生xml数据存储,这种方式能保护XML文档,并在文档级控制对它们的访问。
JAAS provides a modular mechanism for authenticating users and controlling access to resources.
JAAS提供了对用户进行认证和控制访问资源的模块化机制。
The traditional record-label business model—the one based on controlling access and distribution—is dead.
传统唱片业的销售模式,即仅仅建立在发行渠道的控制和传播上以获得盈利这一模式,已经玩儿完了。
Controlling access to database objects using schemas.
使用模式控制对数据库对象的访问。
Controlling access to the model inappropriately, such that analysts were clashing in their attempts to collaborate.
不合理的对模型的访问进行控制,导致在团队分析协作的过程中发生冲突。
Integrated Credentials functionality is a valuable tool for controlling who in your organization has what type of access to the external data.
IntegratedCredentials功能是一个有价值的工具,用于控制公司内部的人对外部数据具有哪种类型的访问。
Let's look at some of the best practices for controlling system access with sudo while still allowing users to be productive.
让我们来看看利用sudo控制系统访问权限且用户依然能保有效率的一些最佳实践吧。
As a result, one of their requirements is to leverage SAML assertions in controlling access to their web services.
结果,他们的需求之一就是利用SAML断言控制对他们的Web服务的访问。
Label-based access control (LBAC), which provides new ways of controlling access to the sensitive data within the database.
基于标签的访问控制(LBAC),这为数据库中的敏感数据提供新的访问控制方法。
Restrict SSH access by controlling user access.
通过控制用户访问限制ssh访问。
Restrict SSH access by controlling user access.
通过控制用户访问限制ssh访问。
应用推荐