But up to now, there is not a security mechanism and security pattern acceptable to the Northeast Asian countries.
但到目前为止,尚未出台为东北亚地区各国所认同和接受的安全机制和安全模式。
The catalog service example USES patterns such as the WS Response Template pattern (see Resources) and security patterns.
catalog服务示例使用了WS响应目标模式(请参阅参考资料)和安全模式等模式。
0ther patterns — such as a WS-security pattern — that directly impact the service definition would be applied at this layer.
其他直接影响服务定义的模式——如WS - security模式——也可应用于这个层。
The way to design and implement security pattern library is given and it compares the method with other software design methods.
对安全模式库的构建方法进行分析,并与其他软件设计方法进行了比较。
The spatial allocation of land uses is readjusted to improve land use efficiency on the basis of landscape security pattern of different ecological process and land use control zones.
文章提出了景观安全格局的概念及其研究方法,并对其国内外研究现状和应用前景进行了阐述。
Most authors studied vegetation restoration and its effects on soil loss, and provide much valuable information on degraded ecosystem restoration and ecological security pattern design.
更多是从植被恢复及其水土流失效应方面进行了探讨,为退化生态系统恢复和格局设计提供了极其有用的信息。
The set up of "20 nations" mechanism between Russia and NATO didn't stop the second wave of NATO's Eastward Expansion, the US-led NATO still holds a core position in the European security pattern.
俄罗斯与北约“20国”机制建立没有阻止北约第二轮东扩的步伐,美国主导的北约在欧洲安全格局中仍居核心位置。
The service gateway pattern also provides guidance on how to enforce security on service invocations.
服务网关模式还能提供指导,告诉您如何使服务调用强制执行安全性。
This pattern would support a wide range of incoming security protocols while simplifying security in other ESB components.
此模式将支持各种传入安全协议,而且同时能简化其他ESB组件中的安全措施。
Further intelligence automatically constructs high availability messaging, global security, or session persistence as per the pattern definition.
智能进一步根据模式定义自动构建高可用性消息传递、全局安全性或会话持久性。
The ESB architectural pattern improves system security, scalability and availability.
ESB体系结构模式可提供系统安全性、可伸缩性或可用性。
The XS40 XML Security Gateway meets the functional and non-functional requirements to support this pattern.
XS40XMLSecurityGateway可以满足支持此模式的功能性和非功能性需求。
For example, a standard WebSphere Application Server environment pattern with in-memory session persistence and global security can be created.
例如,可以创建一个标准的WebSphereApplicationServer环境模式,其中包含内存会话持久性和全局安全性。
An example of this pattern would be to identify all variables that are declared public and flag them as potential security problems.
该模式的一种范例是识别所有声明为public的变量,并将它们标记为安全性问题。
They're also focused mainly on connectivity and very little on security, which is what initially drove the interest in applying SOA Gateways to this pattern.
此外,它们主要关注联通性,而很少关心安全,这就是当初在ESB模式中引入SOA网关的原因。
The book discusses the Model-View-Controller pattern, unit testing, Web services, security, and many other topics that are critical to building effective Web applications.
该书讨论了Model -View - Controller模式、单元测试、Web服务,安全性和对有效的Web应用程序的构建起关键作用的许多其他主题。
The Participant pattern lets you make the transition from simple aspects to more complex ones such as those for transaction management, thread safety, security, etc.
Participant模式可以将简单的方面转换为更复杂的方面,如负责事务管理、线程安全、安全性等方面。
In order to address those challenges, architects will need to combine the data federation pattern with other security-related patterns.
为了应对这些挑战,架构师将需要把数据联合模式与其他安全相关的模式结合使用。
This pattern can provide an additional layer of security, and limit the attack surface of the system.
这种模式可以提供一个额外的安全层,并限制了对系统的攻击。
In order to reduce the energy consumption and ensure the security in wireless sensor network, the secure data aggregation algorithm based on pattern codes was designed.
为了降低无线传感器网络能耗,保障网络安全,设计了一种基于模式码的安全数据融合算法。
SVM applications, such as pattern recognition, function approaching, time series prediction, fault prediction and recognition, information security, power system and power electronics, are described.
归纳了支持向量机在诸如模式识别、函数逼近、时间序列预测、故障预测和识别、信息安全、电力系统以及电力电子领域中的应用。
Objective to evaluate the security and response rate of short cycle neoadjuvant chemotherapy with dose-dense CAF regime in breast cancer, and to explore which effect on the pattern of surgery.
目的探讨CAF方案在乳腺癌短周期密集新辅助化疗中的安全性、近期疗效以及对手术方式的影响。
And the system has brought our army the independent security in the landing of Russian pattern fighters, with a great military and economic benefit.
该系统的研制成功实现了我国俄式战机进场着陆的自主保障,具有重大的军事意义和经济效益。
The threat-assessment pattern analyzed the threat level to network security through multi-sensor fusion technology with the result of early warning analysis.
威胁评估模块将预警分析的结果(攻击预测)作为输入,利用多属性融合技术定量分析网络安全威胁程度。
On Wednesday, I will present to the Security Council U. S. intelligence showing further evidence of Iraq's pattern of deception.
星期三,我将给安理会提供能进一步证明伊拉克的欺骗模式的美国情报。
Analysed the mainly security protection feature of the digital winch. Proposed some ideas and Suggestions about safekeeping of establishing pattern and the testing method.
对数字式绞车的主要安全保护特性进行分析,对其保护的设置型式和试验方法提出了一些想法和建议。
Chaos synchronization has very important applications in security communication, optimization of nonlinear system performance, modeling brain activity and pattern recognition.
混沌同步在保密通信、非线性系统性能优化、大脑行为建模以及模式识别等领域有着极为重要的应用。
Chaos synchronization has very important applications in security communication, optimization of nonlinear system performance, modeling brain activity and pattern recognition.
混沌同步在保密通信、非线性系统性能优化、大脑行为建模以及模式识别等领域有着极为重要的应用。
应用推荐