• 数据查询问题K -匿名隐私保护模型数据可用性问题之一

    How to answer queries under the K-anonymity privacy protection model is one of problems for the availability of anonymized data.

    youdao

  • 确定过载保护模型基础上,本文设计了一个智能型热过载继电器。

    Based on the selected overload protection model, a thermal protector with single-chip is designed in this paper.

    youdao

  • 基于最小特权原理,从分析进程访问权限出发,提出一种防御恶意程序攻击的数据保护模型

    After analyzing the access rights of the processes, this paper presents a data-protection model which will prevent the attack of the malicious processes on the base of minimal privilege principle.

    youdao

  • 应用计算机系统资源保护模型建立进程监控系统,阐述进程监控系统工作原理算法实现过程

    The computer system resources defense model is applied to build a process monitor system, and the basic principle and the arithmetic of the process monitor system are set forth.

    youdao

  • 大规模数据共享隐私保护模型关键技术研究,973前期研究专项, 2013-2016,参与

    2013-2016, Privacy Protection Model and Its Core Techniques for Sharing Large-scale Data, China 973 Program, Co-PI.

    youdao

  • 分析了CHASHIMA核电站测量系统控制保护模型、系统设备设备失效模型辅助系统管网模型

    This paper analyzes models of measuring system, control and protection system, system equipments, equipment failure, and some auxiliary system in CHASHIMA NPP.

    youdao

  • 基于非对称公钥叛逆者追踪方案给出了新的电子软件销售产权保护模型,适用于一类需要安装运行的软件。

    A new model for electronic software distribution and copyright protection based on an asymmetric public-key traitor tracing scheme is designed.

    youdao

  • 常用时限保护特性相比较,保护模型符合负载实际运行规律保护要求测量误差关系进行分析

    Different from the common inverse time characteristic, this model conforms to the load actual operating law and the protection request, and takes the analysis of measurement error into consideration.

    youdao

  • 目前大多数电力系统仿真分析工具缺少继电保护模型系统化描述,无法真实完全反映继电保护元件的控制规律

    Most of power system's simulation tools have not the systematic model of relay system and can not response the control rules of relay system truly and completely.

    youdao

  • 基于保护理念作者提出了相应保护模型CLPM,该模型四个阶段分析壳对数字内容保护过程,针对性的解除不同阶段面临的威胁

    A relevant Content Lifecycle Protection Model (CLPM), which divides the whole lifecycle protection of digital content into 4 phases, is provided to deduce the security threats in each phase.

    youdao

  • 分析PSCAD/EMTDC软件结构,提出了基于PSCAD/EMTDCC语言接口技术定义模型实现方法,用C语言构建了以实际保护装置为原型的数字式距离保护模型

    The program structure of PSCAD/EMTDC is analyzed, and the method of realizing the user-defined model which is based on the interface technique between PSCAD/EMTDC program and C language is presented.

    youdao

  • 研究发酵麦麸是否保护接受右旋糖酐硫酸钠DSS)的模型小鼠免于结肠炎。

    To investigate whether the fermented rye bran can protect the model mice receiving dextran sulfate sodium (DSS) from colitis.

    youdao

  • 由于这些资源要么关键基础架构,要么是向应用程序定义的资源提供默认值模型需要保护它们

    Since these are either critical infrastructure, or models that provide defaults for the resources defined for your applications, you need to protect them.

    youdao

  • 看到各种提供商使用验证模型将讨论隐私性法规遵从性方面出现问题针对拒绝服务威胁提供的保护

    You will see the authentication models used by various cloud providers, and examine the challenges which arise from privacy, regulatory compliance, and protection from Denial-of-Service threats.

    youdao

  • 相反JAAS用户为中心认证模型是以保护世界不受用户影响的思路开发的。

    In contrast, the user-centric authorization model of JAAS was developed with the idea of protecting the world from the user.

    youdao

  • 研究中,研究人员创建了一个数学模型衡量抵御真菌保护效益体温代谢

    In the new work, the researchers created a mathematical model that weighed the fungal protection benefits versus the metabolic cost of high body temperature.

    youdao

  • 为了保护患者隐私PODS设计采用一个多级安全模型

    To safeguard patient privacy, the PODS design USES a multilevel security model.

    youdao

  • 公司用于检测漏洞保护s OA基础结构业务策略中包含用于目标和攻击之间多个SOA深度防御模型

    A defense in depth model with multiple SOAs between the target and the adversary should be part of a company's business strategy for detecting vulnerability and protecting SOA infrastructure.

    youdao

  • 专家,这项进程可能使这种猫成为一种有价值的遗传模型并且很有可能保护自身免受类HIV病毒

    Experts say the advance could make the cat a valuable new genetic model-and potentially protect it from an HIV-like virus.

    youdao

  • 网站一进程(process -per -site)模型不会在网站实例之间提供错误保护

    The process-per site model does not provide failure containment across site instances.

    youdao

  • 目前模型售,有些透明透明屋顶组成,更好地保护隐私起步不到8000欧元

    It's available in a few models, some of which include privacy walls and clear roofs, starting at less than 8, 000 euros each.

    youdao

  • [据防务专家网2010年05月17日报道]IBD开发高级模型装甲保护(AMAPTM)正是实现平衡最佳化生存概念上的一种方法

    GMT, May 17, 2010 AMAPTM (Advanced Modular Armor Protection) is the expression of the system approach for a balanced and optimized Survivability Concept, developed by IBD Deisenroth Engineering.

    youdao

  • 有两种新出现安全模型提供了合理方法保护移动

    Two emerging security models offer reasonable approaches to securing the mobile cloud.

    youdao

  • 此后我们建立模型,描述系统如何提供预订总括信息包括提供购买保护产品等等

    After this we would model how the system presents the summary information on the reservation, including offers to purchase protection products, etc.

    youdao

  • 导入引入公共保护信息操作实体优化模型规模,以更快地载入保存切换

    The import brings in only the public and protected information without operations bodies to optimize the size of the model for faster loading, saving, and navigation.

    youdao

  • 数据模型XML表示之间结构性区别绑定处理即使数据模型随着时间而改变,XML表示通常可以得到保护

    Structural differences between the data model and the XML representation can be handled in the binding, so the XML representation can generally be preserved even as the data model changes over time.

    youdao

  • 总之ACL范围至少保护资源不过,应用程序可以扩展范围,实现设计人员所需授权模型

    To sum up, the scope of an ACL is at least the resource it secures, however the scope can be extended by an application in order to implement a designer's desired authorization model.

    youdao

  • 即使不考虑通过由模型驱动开发基于SOA服务管理所提高的效率业务应用程序保护信息

    Irrespective of the efficiencies brought by model-driven development and SOA-based service management, business applications must continue to secure information.

    youdao

  • 高兰尼的目标CQESTR模型更加好用,因而土地经营者研究人员自然资源保护论者都可以不同方式利用

    Gollany's goal is to make CQESTR more user friendly so land managers, researchers, and conservationists can use it in different ways.

    youdao

  • 高兰尼的目标CQESTR模型更加好用,因而土地经营者研究人员自然资源保护论者都可以不同方式利用

    Gollany's goal is to make CQESTR more user friendly so land managers, researchers, and conservationists can use it in different ways.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定