A student who learns to handle Numbers mentally can focus on how to attack a problem and then complete the actual calculations easily.
学会心算的学生能把注意力集中到如何解题上,然后轻而易举地完成实际运算。
They say the man seen as "a fixer" and often resorts to medical language to describe his tactics, stressing that he is not afraid to attack a problem.
他们说罗格是个“代理人”,他经常借助医药语言描述其策略,并强调他不害怕处理问题。
If there are other users of your test machine, they must be aware of your test plans — otherwise they may think they are experiencing some severe problem such as a denial-of-service attack.
如果您的测试计算机上有其他用户,则他们必须知道您的测试计划——否则他们可能认为他们遭遇某种严重的问题,例如拒绝服务攻击。
Attacks on Internet sites and infrastructure, and the compromise of secure information, pose a particularly tricky problem because it is usually impossible to trace an attack back to its instigator.
因为通常不可能追踪到攻击者,对互联网站和网络基础结构的攻击,及其对安全信息的危害,是一个异常棘手的问题。
When small fish face an extremely difficult problem-an attack, say, from several predators at once-they deal with it by forming a school.
当小鱼面临极其困难的问题时,比如说,突然遭到几个捕食者的袭击,他们会立刻形成鱼群。
Did you encounter any situations last year that could have been prevented or less painful if you had a better handle on how to attack the problem?
您去年是否遇到过任何这样的情形:如果更好地了解如何攻克问题的话,原本可以防止问题或者使问题不那么棘手?
"I was waiting for the time to attack Vettel - maybe the last 10 laps - but suddenly he had a car problem and we had a chance to overtake him earlier than we expected, " Alonso said.
阿隆索说:“我此前一直在等待时机对维特尔发起攻击-也许可能要等到最后10圈,但是突然他的车子出现了问题,所以我能在比预期更早的时候找到机会超过他。”
As I prepare to attack an unfamiliar problem with mounting schedule pressures and dire consequences for failure, I've been on the edge of a similar cliff more times than I care to mention.
在我准备解决一个不熟悉的问题时,如果进度压力越来越大,而且失败将带来可怕的后果,我也曾踏上一个类似的悬崖边缘,这种情况不胜枚举。
The attack confirms that Boko Haram has entered a new phase, one in which its activities are a truly national problem.
袭击确认博科圣地已经进入了一个新时期。在这个新时期中他们的行动是全国性的问题。
GWT provides a high level of obfuscation that mitigates the problem to a degree, but a secondary point of attack remains: any HTTP traffic that travels between your GWT client and its services.
GWT提供了高层次的混淆,从而可以将这个问题降低到一定程度,但是仍然存在次要攻击点:GWT客户机及其服务之间的HTTP通信量。
In excess, the effects can be deadly by causing a heart attack, stroke or other cardio-vascular-related problem.
用量过度可以致命:它还可以引发心脏病、中风或其他与心血管相关的疾病。
Such a problem can also provide solutions; at the very least, energy researchers looking to make improvements on net carbon dioxide emissions have a clear picture of their point of attack.
这样的问题也提供解决方案;至少,能源研究者在寻找净碳排量的进步上有清楚的攻击点。
The researchers found that people who had trouble falling asleep almost every day had a 45 percent increased risk of a heart attack, compared with those who had no problem going to sleep.
研究人员发现,几乎每天都很难入睡的人心脏病发作的可能性比睡眠好的人多45%。
While it's easy to point to one or two key measures for the prevention of the SQL injection attack, it's best to take a layered approach to the problem.
尽管采取一两项关键措施预防SQLInjection攻击是很容易的,但最好是对问题采用分层方法。
This is yet another example of the attribution problem we face when addressing the complex issues that arise when trying to discover who is really behind a cyber attack.
这是我们在发现谁是真正的网络攻击者时面临的归属难题的另一个例证,这是一个复杂的问题。
It's a serious problem that at the moment we don't have a solution to, because our inability to attribute the source of the attack fundamentally undermines our efforts at deterrence.
目前问题很严重,我们没有应对办法,因为我们无法追查到这些攻击的源头,这从根本上让我们的努力干预做了无用功。
In the modern air-defense system, it has been a key problem to the air-defense radars whether they have the abilities of countering anti - radiation weapon attack.
在现代防空系统中,是否具有抗反辐射武器攻击的能力已成为关系到防空雷达生死存亡的问题。
The distribution of the weight among the ingredients is a key problem in network attack effect evaluation.
网络攻击效果评估中指标之间权重分配是进行评估的一个关键问题。
But in the existing threshold signature scheme, conspiracy attack is still a problem which is difficult to solve.
但在现有的门限签名方案中,合谋攻击一直是一个难以解决的问题。
Aiming at the self-beneficial attack problem in layered multicast protocol, a secure layered multicast protocol is presented. The congestion state related access control algorithm is designed.
针对分层组播协议存在的自利型攻击问题,提出了一种安全分层组播协议,设计了基于拥塞状态的访问控制算法。
One problem that many players have faced in other games, is the ability to gather together to attack or defend against other players on a large scale.
许多玩家在游戏中要面对一个问题就是,召集起来大规模进攻或者防御。
Feral cats are a problem in New Zealand, especially because the country takes pride in its rare birds, many of whom are under attack from other species.
野猫是新西兰的心头之患,新西兰以拥有稀有鸟类而自豪,但它们会遭到其他物种的攻击。
Aiming at the problem of collocating missile weapon system to attack multi-objective, a new collocating method based on fuzzy multi-objective decision making theory is studied.
针对导弹武器体系攻击多目标时的武器配置问题,利用模糊多目标决策理论研究了多种配置方案的优选,提出了一种新的基于效能的导弹武器配置优化算法。
Bioterrorism, the existent problem of a long time, has not just attracted extensive concern until the anthrax spores attack after the "9.11" affairs in the United States.
生物恐怖问题由来已久,但直到美国“9.11”事件后的炭疽芽孢袭击才引起人们广泛关注。
Linear cryptanalysis with multiple approximations is a generalization of linear cryptanalysis, and how to attack DES efficiently by multiple linear cryptanalysis method is still a problem.
多重线性密码分析是线性密码分析方法的一种推广,如何利用多重线性密码分析方法来攻击DES一直是人们关注的焦点。
I need advice how to attack this problem the expected results is to have a list with 10-20 groups of very similar names, and may be further adjust the sensitivity for more results.
我需要建议如何攻击这个问题的预期结果是列表10- 20组非常相似的名字,并可能进一步调整灵敏度结果。
No amount of improvement in computer hardware will ever make such a problem tractable. The only hope is an enormous, and unlikely, conceptual breakthrough in how to attack the question.
计算机硬件方面再多的改进也不足以解决这个问题,只能寄希望于庞大的,不大可能的关于如何解决问题的概念性突破。
In this paper, a routing strategy that can adapt to the extension of network is proposed to attack the problem of blind routing in P2P search.
针对现有P 2 P检索的路由盲目性问题,论文给出了能够适应网络可扩展性的路由查询机制。
In this paper, a routing strategy that can adapt to the extension of network is proposed to attack the problem of blind routing in P2P search.
针对现有P 2 P检索的路由盲目性问题,论文给出了能够适应网络可扩展性的路由查询机制。
应用推荐