图5显示了侦听的调用序列。
在确认之后,应用程序开始调用序列。
Following confirmation, the application begins the call sequence.
图3显示了调用序列。
图6显示了客户端上的此场景的调用序列。
Figure 6 shows the sequence of invocations for this scenario on the client side.
API调用序列如下。
查看器允许您按调用序列的相关层次关系查看记录。
The viewer lets you view the records by their correlated, hierarchical relationship of the call sequence.
红线指示组合应用程序的特定用例所遵循的调用序列。
The red lines indicate the invocation sequence that is followed by a specific use case of the Composite Application.
您希望可以随意更改元素类型或调用序列。
You want the freedom of changing the element type or calling sequence.
图14显示了用于recvmsg系统调用的调用序列。
Figure 14 shows the sequence of calls for the recvmsg system call.
如果在许多地方调用了一个函数,可以使用堆栈跟踪检查调用序列。
If a function is called from many places, use the stack backtrace to determine the specific calling sequence.
一个异常的系统调用序列就是一个程序有漏洞或受到攻击的确凿证据。
An aberrant system call sequence would be a dead giveaway that the program has a bug or is being attacked.
您需要安全地让编译器强制执行相同元素类型和调用序列。
You want the safety of having the compiler enforce the identical element type and calling sequence.
如果正在使用基于用户ID/密码的身份验证插件,则API调用序列如下
The following is the API calling sequence if a user ID/password-based authentication plug-in is in use
本文主要讨论使用应用级语言库调用序列作为特征在应用级检测入侵。
In this paper we discuss the possibility of detecting intrusion at the application level by using sequences of language library calls as signatures.
典型的TCP客户机和服务器应用程序通过发布tcp系统调用序列来获取某些函数。
A typical TCP client and server application issues a sequence of TCP system calls to attain certain functions.
在复合变换中,颠倒单个变换顺序的一种方法是颠倒方法调用序列的顺序。
One way to reverse the order of individual transformations in a composite transformation is to reverse the order of a sequence of method calls.
实际上最后两个调用序列在大多数场景下是个不错的替代方案,这要归功于它们的数据一致性保障。
Actually the last two call sequences are good alternatives in most cases thanks to their data consistency guarantee.
如果正在使用Kerberos或基于GSS -API的身份验证插件,则API调用序列如下。
The following is the API calling sequence if a Kerberos or GSS-API-based authentication plug-in is in use.
这些信息包括过程所在位置、标识方式、调用序列和返回类型以及它所使用的字符串字符集。
This information includes where the procedure is located how it is identified its calling sequence and return type and the string character set it USES.
某些类(如Socket和InetAddress)需要一个复杂的方法调用序列,以便正确交互。
Some classes (such as Socket and InetAddress) require a sophisticated sequence of method invocations for proper interaction.
这些信息包括过程所在位置、标识方式、调用序列和返回类型以及它所使用的字符串字符集。
This information includes where the procedure is located, how it is identified, its calling sequence and return type, and the string character set it USES.
清单1显示了OpenIdRegistrationPage中提交窗格和执行调用序列所用的代码。
Listing 1 shows the code for the OpenIdRegistrationPage that submits the form and makes this call sequence.
在大多数情况下,要找出错误的起因,需要进行某种类型的跟踪,以便通过跟踪来揭示导致错误的调用序列。
In most cases, to find out the cause of the error you need to take some type of trace that will show the sequence of calls that lead up to the error.
例如,如果问题是死循环,UM l序列图将会显示您在重复调用序列,统计表也会显示方法花费了很长的时间。
For example, if the problem is an endless loop, the UML sequence diagrams show you repeating sequences of calls, and statistical tables show methods that take a long time.
以下的消息传递场景说明了RMSource和 RM Destination中不同组件的调用序列。
The following messaging scenario explains the sequence of invocations of different components in RM Source and RM Destination.
通过观察访问器方法调用序列,您或许已经猜到,其中部分调用有效地为嵌入的类型签名组件打开了一个新的上下文。
As you might guess from looking at the sequence of visitor method calls, some of these calls effectively open a new context for an embedded type signature component.
通过观察访问器方法调用序列,您或许已经猜到,其中部分调用有效地为嵌入的类型签名组件打开了一个新的上下文。
As you might guess from looking at the sequence of visitor method calls, some of these calls effectively open a new context for an embedded type signature component.
应用推荐