• The examples query the order details based on the input order IDs.

    这些示例将根据输入订单ID查询订单详细信息

    youdao

  • Files are protected based on user IDs and thus accessible only to the owner application, which has the same user ID.

    文件基于用户ID保护,因而所有者应用程序是可访问的(此应用程序具有相同的用户ID)。

    youdao

  • The lookup stage caches the query result and performs the lookup operations on the cached order details based on the order IDs from the OrderID input link.

    查找工作台将缓存查询结果根据OrderID输入链接中的订单ID缓存的订单详细信息执行查找操作

    youdao

  • The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.

    ObjectAuthorityManager (oam)中定义授权策略可以基于用户ID组成员身份进行访问控制

    youdao

  • Work items are managed by the authorization manager, based on the lists of associated user IDs provided by the staff support service, using the respective staff resolution plug-in.

    工作授权管理员基于人员支持服务所提供关联用户ID列表使用各自的人员解析插件来管理

    youdao

  • For example, if DB2 is configured with an operating-system-based authentication mechanism, users need valid operating system user IDs and passwords.

    例如如果DB 2使用一个基于操作系统验证机制配置,则用户需要验证操作系统用户ID密码。

    youdao

  • An er domain consists of IDS servers that can replicate data between themselves based on user-defined criteria (this criteria is explained in later sections).

    一个er包含几个IDS服务器可以基于用户定义标准(将稍后介绍)在这些服务器之间复制数据

    youdao

  • With ssh host-based authentication, hosts must establish a trust relationship, and then all user IDs on the configured hosts will be allowed to login as the same user ID on any other configured host.

    对于ssh 基于主机认证主机必须建立一个信任关系然后配置主机所有用户ID都将可以相同的用户ID任何其他已配置主机登录

    youdao

  • IDS 11 provides a sound solution to these situation in Label-Based Access Control.

    IDS11通过基于标签的访问控制(Label - Based Access Control)这些情况提供良好的解决方案

    youdao

  • Data Web services (DWS) is the next generation solution to significantly ease the development, deployment, and management of Web services-based access to DB2 and IDS database servers.

    DataWebServices (DWS)下一代解决方案,对于基于Web服务DB2IDS数据库服务器访问,该解决方案可显著简化开发部署管理

    youdao

  • The caching capability is provided by defining caching policies and constructing cache-ids based on the following.

    高速缓存能力根据下列因素定义高速缓存策略构造cache - id提供的。

    youdao

  • Engagements can be set-up to allow client based surveys with IBM hosting the tool and providing access ids.

    可以建立基于客户调查(engagement),由IBM托管CAT工具提供访问ID。

    youdao

  • A PHP-based Web browser administration tool, OAT for IDS provides the ability to administer multiple database server instances from a single location.

    基于PHP的Web浏览器管理工具能够单一位置管理多个数据库服务器实例

    youdao

  • Part 1 of this series introduced the IDS OAT, a Web-based interface for administering IDS, supported on IDS 11.10 and later. OAT offers many advantages.

    系列第1部分介绍IDSOAT这是IDS 11.10更高版本上支持基于WebIDS管理界面

    youdao

  • For example, using the sample data in Figure 1, the following index idx1 would be useful for look-ups and joins based on author IDs across all documents in the XML column bookinfo of the table books.

    例如使用1中的示例数据,可以根据author id使用下面索引idx 1books的xmlbookinfo中的所有文档进行查找连接

    youdao

  • Starting in Version 11.1, IDS contains cluster-based replication functionality.

    version 11.1开始IDS包含了基于集群复制功能。

    youdao

  • With the Open Admin Tool, a PHP-based open source tool, and administrative SQL APIs, administration of IDS is minimal.

    由于使用OpenAdminTool(这是一个基于PHP开放源码工具SQLAPI 进行管理IDS管理非常简便。

    youdao

  • Based on this thought, we propose an IDS alert correlation model based on description logics.

    思想基础上,进一步提出基于描述逻辑IDS告警关联模型

    youdao

  • This thesis presents data mining aided signature automatic discovery algorithm for network based IDS and detection rule creation algorithm.

    提出基于数据挖掘网络入侵检测规则特征自动发现算法规则自动生成算法。

    youdao

  • IDS based on data mining has the functions of self -learning and self -completing, it can detect the know and unknown intrusion activities.

    基于数据挖掘入侵检测系统具有一定自学习性完善性,可以检测已知或未知入侵行为

    youdao

  • In this paper, a detection-oriented attack classification method, based on data that IDS can collect directly, is proposed.

    该文提出一种ids直接收集数据为基础、面向检测的攻击分类方法

    youdao

  • It combines the network based IDS and host based IDS into a system, and provides detection, report and response together.

    基于网络基于主机入侵检测系统有机地结合在一起,提供集成化的检测报告响应功能。

    youdao

  • This thesis constructs an IDS based on RBF neural network, which gives the basic thinking of design and the arithmetic, the method of collection and beforehand disposal way of the sample data.

    本文主要构建了一种基于RBF神经网络入侵检测系统给出基本设计思想算法,以及样本数据的收集预处理方法

    youdao

  • It proposes an effective IDS that improves the modeling time and performance with only considering the events of privilege flows based on the domain knowledge of attacks.

    通过仅仅考虑基于攻击知识特权事件来缩短建模时间并提高性能,从而使系统更加高效

    youdao

  • The running and monitor problems of many system key programs in the system are researched and IDS prototype is put forward based on process behavior classifier.

    研究系统多个系统关键程序运行监控问题提出了一个基于进程行为分类入侵检测系统原型

    youdao

  • This paper presents an IDS model based on mobile agents, which adopts the research results from two fields: the distributed IDS and the mobile agent(MA).

    本文提出了一种基于移动代理IDS模型综合两个领域研究成果分布式IDS移动代理MA)。

    youdao

  • This paper applies distributed data mining algorithm to IDS, takes some research on distributed pattern extraction which is based on distributed association rules algorithm.

    论文分布式数据挖掘算法运用入侵检测系统研究基于分布式关联规则算法的分布式模式提取

    youdao

  • The existence and construction of resilient functions in Encryption and the intelligentized improvement based on Machine Learning in IDS are the focus of information security.

    密码技术弹性函数存在性构造问题入侵检测技术中基于机器学习智能化改进目前信息安全领域中的研究热点。

    youdao

  • Traditional IDS systems based on packet level with capturing, reassembling and matching can't follow the desire of efficiency.

    基于报文级别捕获还原匹配传统入侵检测系统效率无法满足要求

    youdao

  • Traditional IDS systems based on packet level with capturing, reassembling and matching can't follow the desire of efficiency.

    基于报文级别捕获还原匹配传统入侵检测系统效率无法满足要求

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定