The IXAND access request element directs the optimizer to use index anding to access a table.
IXAND访问请求元素要求优化器使用indexanding访问表。
Interush reserve the right to charge a reasonable fee for the processing of any data access request.
我们保留权利收取要求索取任何资料的合理手续费用。
When a host wants to access a storage device on the SAN, it sends out a block-based access request for the storage device.
当主机要访问SAN存储设备,它发送一个基于块的存储设备的访问请求。
Based on certainty and possibility reasoning, an algorithm to determine whether an access request is authorized is proposed.
结合确定性推理和可能性推理,描述了如何判定访问请求的算法。
The JPA application holds no reference to the detached objects between the first access request and the subsequent change request.
JPA应用程序在第一个访问请求和后续修改请求之间并没有保持分离对象的引用。
According to the PDPO, the Company has the right to charge you a reasonable fee for the processing of any data access request.
根据《个人资料(私隐)条例》,本公司有权就处理任何查阅资料的要求收取合理费用。
The Company reserves the right to charge you a reasonable fee for complying with a data access request as permitted by the PDPO.
按照条例,本公司保留权利就有关的查阅资料要求向阁下收取合理的费用。
AIA has the right to charge costs which are directly related to and necessary for the processing of any personal data access request.
友邦保险有权就因处理任何查阅个人资料的要求收取需要和直接相关的费用。
In one embodiment, the method includes the detection of a data access request to VDD memory implemented within volatile system memory.
在一个实施例中,所述方法包括检测对在易失性系统存储器之内实现的VDD存储器的数据访问请求。
In accordance with the terms of the Ordinance, the Group has the right to charge a reasonable fee for the processing of any data access request.
根据法例的相关规定,集团有权向要求查阅资料者收取合理的处理费用。
To illustrate the various XACML components, I'll show you how to take a specific access request and create all the XACML components required to process it.
为了说明XACML的不同组件,我们将以一个具体的访问请求为例,创建所需的全部 XACML 组件。
The Company reserves the right to charge you a reasonable fee for complying with a data access request as permitted by the Personal data (Privacy) Ordinance.
按照个人资料(私隐)条例,本公司保留权利就有关的查阅资料要求向阁下收取合理的费用。
Next, processing logic processes the access request by looking up the physical address represented by the virtual local memory address (processing block 602).
随后,处理逻辑通过查找虚拟本地存储器地址所表示的物理地址来处理存取请求(处理框602)。
Referring to Figure 6, the method begins by processing logic receiving a memory access request to a location in graphics virtual local memory address space (processing block 600).
参照图6,该方法通过处理逻辑接收对图形虚拟本地存储器地址空间中的位置的存储器存取请求开始(处理框600)。
If your application will be transmitting protected user data, the usage string in your access request should clearly inform the user that their data will be uploaded to your server if they consent.
如果您的应用程序将传输保护用户数据,使用字符串在你访问请求应该清楚地通知用户,他们的数据将被上传到您的服务器,如果他们同意。
The model use the model detector decision-making the new request to decide whether to allow the access request, this goal is to accurately distinguish between legitimate requests and illegal requests.
模型中需要通过决策检测器对新的请求进行决策,以决定是否允许执行访问请求,这样做的目的就是来准确地区分合法请求和非法请求。
Fear not, you'll still have access to the raw mongrel request if you want to do fancy stuff like streaming or deferred rendering outside the mutex.
不用害怕,如果您想在互斥以外做一些奇特的事情,比如流处理或延迟呈现,您仍然可以访问原始的mongrel请求。
The attacker cannot access all the packets of a request and cannot decipher what message was sent.
攻击者不能访问一个请求中所有的包,也就不能破译发送的消息。
To access private data, the application must request and the user must grant to the application permissions to do so.
要访问私有数据,应用程序必须请求权限,并由用户对应用程序授予权限,才能进行访问。
SOA consumers request a service that requires access to information from multiple heterogeneous sources.
soa使用者请求需要访问来自多个异构数据源的信息的服务。
XACML builds on SAML by providing the actual semantics used to define access control policy and authorization request and response messages.
XACML构建于SAML之上,提供了用于定义访问控制和授权请求及响应消息的实际语义。
To access private data, applications must first request the user's permissions, which are called extended permissions.
要访问私有数据,应用程序必须首先请求用户的权限(被称之为扩展权限)。
JACC provides uniform access to request parameters so a JACC provider can use parameters (but not results) in the permission decision process.
JACC提供对请求参数的统一访问,因而JACC提供程序可在权限决定过程中使用参数(而不是结果)。
Generation of the request to access the target resource and the subsequent response granting or denying access falls under the domain of SAML.
访问目标资源请求的生成,以及后续的允许或拒绝访问响应,都属于SAML的范围。
First, we cover creating an infrastructure or an object model that starts with a request, access definition, and column maps for data extraction.
首先,我们创建一个基础或者对象模型,从分析需求、访问定义,以及数据提取的列映射开始。
In short, locking is the means by which data integrity can be maintained when two or more application processes simultaneously request access to the same data.
简而言之,锁定是一种方法,通过该方法,当两个或多个应用程序进程同时请求访问同一数据时,可以保持数据完整性。
For all tables listed in a FROM clause, there can be, at most, one access or join request with the 'FIRST' attribute.
对于from子句中列出的所有表,最多有一个访问或计划可以带有“FIRST”属性。
For all tables listed in a FROM clause, there can be, at most, one access or join request with the 'FIRST' attribute.
对于from子句中列出的所有表,最多有一个访问或计划可以带有“FIRST”属性。
应用推荐