Simpler coding than the fixed-size buffer approach
比固定大小的缓冲区方法更简单的代码编写
When this approach is in use, hashed rows destined for a given partition are placed in a buffer and sent to that partition as a group instead of one at a time.
如果使用了这种方法,定向于某个给定分区的散列行首先会进入一个缓冲区中,然后成组地发送到那个分区,而不是一次发送一行。
Unfortunately, this approach itself can become a performance bottleneck if the size of the data requested is considerably larger than the kernel buffer size.
不幸的是,如果所需数据量远大于内核缓冲区大小的话,这个方法本身可能成为一个性能瓶颈。
Clearly, all three solutions present limitations and the conventional buffer memory management approach is not a good mechanism for coding large-scale interacting software.
显而易见地,这三种解决办法全都存在局限性,因此传统缓冲区内存管理方法并不是适合编写大规模交互软件代码的机制。
This is a useful approach, but note that this does not protect against buffer overflows overwriting other values (which they may still be able to use to attack a system).
这是一种有用的方法,不过要注意这种方法无法防止缓冲区溢出改写其他值(攻击者仍然能够利用这些值来攻击系统)。
This paper presents an efficient approach to buffer overflow attacks.
本文针对缓冲区溢出攻击提出了一种有效的抵御方法。
At the present time, the most realistic approach is to use fiber delay line as optical buffer.
目前,在光域比较现实的还是采用光纤延迟线作光缓存。
The basic approach used to build up these names is to create a string buffer and recursively get the operation name for the parent statistic, then add the name afterwards.
用于构建这些名字的基本方法是,创建一个字符串缓冲区并递归地得到父统计的操作名,然后在后面加上这个名字。
In general, one useful approach is to pass a length to the 'counted string' function one smaller than the size of the buffer and then explicitly assign zero to the last character in the buffer.
通常,一种有用的方法是,向“计数字符串”函数传递比缓冲区大小小一的长度,然后将零显式赋给缓冲区中的最后一个字符。
In many application systems, using the buffer storage technology is an effective approach for improving the function of data inquiry.
在许多应用系统中,使用缓存技术是提高数据库查询性能的有效途径。
In this paper, first analyzes the shortcomings of run-time defenses of buffer overflow attacks, and then presents an approach and a tool to statically detect buffer overflow vulnerabilities.
文中分析了防止缓冲区溢出攻击的运行时方法的不足。介绍了一种静态检测缓冲区溢出漏洞的方法及工具。
In this paper, first analyzes the shortcomings of run-time defenses of buffer overflow attacks, and then presents an approach and a tool to statically detect buffer overflow vulnerabilities.
文中分析了防止缓冲区溢出攻击的运行时方法的不足。介绍了一种静态检测缓冲区溢出漏洞的方法及工具。
应用推荐