研究了基于非正规LDPC系统码的非理想中继协作通信系统。
The performance of irregular systematic LDPC-coded non-ideal relay cooperative communication system is studied.
分析了红外遥控发射器所发出的波形特点,并测定出系统码和发射器上每个键的键值。
This article analysed the features of waveform which was transmited by the infared ray remote control sender.
这些访问码的价格通常在每门课程80美元到155美元之间不等,学生需要通过这些访问码才能在线使用麦格劳·希尔和培生等教育公司开发的系统。
The codes—which typically range in price from $80 to $155 per course—give students online access to systems developed by education companies like McGraw Hill and Pearson.
这个感叹号是换码符,允许您从交互输入模式或批处理模式发出操作系统命令。
The exclamation mark is an escape character that lets you issue operating system commands from either interactive input mode or batch mode.
一旦该认证码被获得并输入到系统中,这个流程应该从何处重新开始或继续呢?
Once such authorization number is obtained and entered into the system, at what point should this process be restarted or continued?
更妙的是,这一系统已经证明其在抵御攻击方面比其他类型的验证码具有更加卓越的性能。
Even better, the system has proved to be far better at resisting attacks than other types of CAPTCHA.
它也允许我们在部署期间执行广泛的优化,即潜在地扫描字节码和优化代码路径,而不会影响在线系统。
It also allows us to perform extensive optimizations during deployment, potentially scanning byte code and optimizing code paths, without impacting online systems.
而验证码系统被破解倒也未尝不是一件好事,因为这标志着机器视觉取得突破,或许,自动书刊扫描系统将由此变得远比现在精准。
But if CAPTCHAs are broken it might not be a bad thing, because it would signal a breakthrough in machine vision that would, for example, make automated book-scanners far more accurate.
人们买药时撕掉贴在包装上的一个标签,就会得到一串码,然后通过短信形式把它发送到一个计算机系统,通过这个系统可以在数据库中查询到相关信息。
People buying medicine scratch off a panel attached to the packaging. This reveals a code, which they can text to a computer system that looks it up in a database.
注意:如果系统试图指派一个不可用的维度码(由于链接的结构,等),它会默认将值指派给维度列表中第一个可用的代码。
NB - If the system tries to post to a dimension code that is not available (due to linked structure, etc) it will default to Posting value to the first available code in the dimension list.
信用卡数据可由卡片上的磁条或芯片读取。芯片系统在英国和爱尔兰称为芯片和个人身份认证码系统,习惯性地叫EMV卡。
Data from the card is obtained from a magnetic stripe or chip on the card; the latter system is called chip and PIN in the United Kingdom and Ireland, and is implemented as an EMV card.
使用单条内嵌汇编操作码在单处理器系统上可能不会有什么问题。
Using a single inline assembly opcode will probably work wonderfully on a uni-processor machine.
后三类加速器能够缓存和优化字节码,这为系统提供了更多的速度提升。
The latter three cache and optimize the byte code, providing for even greater speedups.
XP系统要求用户在网上使用他们的50位激活码激活系统,或者
XP required users to activate their copy with a 50-number code over the web, or by ringing Microsoft.
为了避免这种情况,敏捷项目“执行”并再利用预构建好的二进制码,并且只有再必要时重新构建整个系统(例如,每夜或每周)。
To avoid this situation, agile projects typically "stage" and re-use pre-built binaries, and only rebuild the whole system when necessary (for example, nightly or weekly).
这意味着验证码的设计者们不能仅靠增加文字扭曲程度来打击攻击验证系统的人。
This means designers of CAPTCHAs cannot simply increase the amount of distortion to foil attackers.
我们通过分析所有的字节码和与之相应的源码,建立了一个软件特征系统(软件DNA图谱)。
We parse all of the bytecode and the corresponding source code to build up our representation of the software system (our software DNA map).
芯片系统在英国和爱尔兰称为芯片和个人身份认证码系统,习惯性地叫EMV卡。
the latter system is called Chip and PIN in the United Kingdom and Ireland, and is implemented as an EMV card.
此外,transreption可以让系统将信息从低效形式转化为高效可处理的形式,例如,将源代码转化为字节码。
In addition, transreption allows the system to move information from inefficient forms into efficiently processable forms, for example, source code to byte code.
对于JRuby来说,新的IOAPI意味着我们可以支持更多的跨平台文件系统操作,而不用生成原始码。
For JRuby, the new IO APIs will mean we can support more filesystem operations across platforms without resorting to native code.
通过切换命令码的状态,系统可分别工作在信标和应答状态下。
Switching the state by the order code, the system can be in the state of beacon or response.
vonAhn博士说:“如果一个司盘客获取一个邮箱账号得到的钱少于千分之三美元,那么验证码系统的效果就恰到好处了。”
“If the benefit a spammer is getting from obtaining an e-mail account is less than $3 per 1,000, then CAPTCHA is doing a perfect job,” says Dr von Ahn.
从技术的角度看,BlueRuby用parsetree来生成BRIL代码(ABAPVM的字节码),用桥和虚拟文件系统来保证安全。
On the technical side, Blue Ruby is using parse tree to produce BRIL code (ABAP VM bytecode). Blue Ruby takes care of security using a bridge and a virtual file system.
一些对特定系统架构上的堆叠实施摧毁的利用指令码
Some exploit scripts that carry out stack-smashing attacks on particular architectures
系统内核所使用的内存空间通过特权码(privileged code,2级或者更低)来标记,以防止用户模式的程序访问到内核空间而发生页面错误。
Kernel space is flagged in the page tables as exclusive to privileged code (ring 2 or lower), hence a page fault is triggered if user-mode programs try to touch it.
系统内核所使用的内存空间通过特权码(privileged code,2级或者更低)来标记,以防止用户模式的程序访问到内核空间而发生页面错误。
Kernel space is flagged in the page tables as exclusive to privileged code (ring 2 or lower), hence a page fault is triggered if user-mode programs try to touch it.
应用推荐