应该使用元数据完整性分析和域分析来评估哪些源属性适合确定的目标属性。
The metadata integrity analysis as well as the domain analysis should be used to assess which source attributes fit with the identified target attributes.
在测试过程中,使用各种自动化的技术来启用压力/负载测试、内存泄漏分析、数据完整性测试,和回归测试。
Various automation techniques were employed to enable stress/load testing, memory leak analysis, data integrity testing, and regression testing throughout the test effort.
通过这些分析的结果,可以洞察支持SOA解决方案的已有数据的价值和完整性。
The results provide insight into the value and integrity of the existing data that will support the SOA solution.
通过这些分析的结果,可以洞察支持SOA解决方案的已有数据的价值和完整性。
The results provide insight into the value and integrity of the existing data that supports the SOA solution.
日志分析是DB 2RecoveryExpert的一个强大组件,可帮助您在保持数据完整性的情况下维护高可用性和完全控制。
Log analysis is a powerful component of DB2 Recovery Expert that helps you maintain high availability and complete control over data integrity.
关系分析以之前的域完整性分析和结构分析为基础,旨在发现共同的键或数据元素和域。
Relationship Analysis builds off of previous domain integrity and Structural Analysis to find common keys or data elements and domains.
目前基桩低应变完整性检测数据的后期处理有很多方法,但分析中人为干预较多。
There are many methods for analyzing the data of low strain integrity testing on foundation piles, but there are a lot of the artificial interferences in the data processing.
充分利用三维实体数据的完整性,实现各层次二维图形的自动生成和结构力学分析所需的数据模型的自动建立;
Making full use of integrity of 3D model information, the system automatically generates various kinds of 2D drawings and constructs the data model for structural analysis.
分析和仿真结果表明,通过在设计中运用信号完整性分析方法,本文设计的超高速数据采集系统能满足工作时序的要求。
The timing analysis and si simulation results show that the UHDA system can satisfy the system timing requirements with the help of the si analysis technique discussed in this thesis.
该文提出了一类数据库系统所特有的隐通道一利用引用完整性约束传送信息的隐通道,分析了它们的带宽,并提出了处理这类隐通道的方法。
This paper presents a class of specific covert channels in database system-the covert channel using referential integrity. We compute their bandwidth and propose the methods to handle them.
在介绍了内存数据库的组织形式之后,本文重点分析了索引HASH算法以及数据完整性和一致性保护。
After introducing the organization form of the memory database, it focuses on the HASH arithmetic of index and protection of integrity and consistence of the data.
本文介绍了射频识别技术的基本原理、结构、特点及其相关的基础理论知识,分析了射频识别技术在应用中的关键技术:数据传输的完整性和安全性。
We introduce principium, configuration, characteristics and some relatively basic theory about RFID system, and analyze the key technologies that are data integrity and data security.
模拟成功的关键在于输入项目和数据的完整性和准确性以及以敏感性分析为基础的输入数据调整试验。
The key to a successful simulation lies in the completion and precision of the input items and data, and in the adjustments and experiments of the inputs, based on sensitivity analysis.
模拟成功的关键在于输入项目和数据的完整性和准确性以及以敏感性分析为基础的输入数据调整试验。
The key to a successful simulation lies in the completion and precision of the input items and data, and in the adjustments and experiments of the inputs, based on sensitivity analysis.
应用推荐