English translation for "扫描策略"
|
- scanning strategy
Related Translations:
安全策略: safe strategysafety strategysecurity policysecurity strategy 先行策略: look ahead strategylook-ahead strategy 整体策略: whole strategywholistic strategy 谈判策略: chapter six negotiation strategiesnegotiating strategiesnegotiation strategies 采办策略: acquisition strategy 讨好策略: ingratiation tactics 推理策略: inference strategyinferential strategy
- Example Sentences:
| 1. | By the analysis of it ' s strategies and methods , we have known the principle of the technology 对其扫描策略和扫描方法进行了详细地分析,为设计和实现安全漏洞扫描系统打下了基础。 | | 2. | With the multi - thread technique , the policies of disordering the port number , sending data simultaneously , adjusting the control time and so on , the secret , accuracy and speed of scanner have been increased 采用多线程技术、内部端口乱序扫描策略、并行发送策略、过滤查询方法、动态调整控制时间等优化技术,提高了探测的隐蔽性、准确性和扫描速度。 | | 3. | Effective scanning line algorithm was designed ; divided scan path was used , and extract scanning line vector to area filling . it can be concluded that this algorithm increases manufacturing velocity and accuracy 文中设计了有效的扫描线与多边形边的求交算法,保证了交点的正确配对;采用分区域扫描策略,提取同区域的扫描矢量完成了扫描,使成型速度与精度都有所提高。 | | 4. | Our proposed approach is to split the dataset sample into two parts and change the strategy of scanning datasets into two loop , the inner loop and the outer loop . the scan of the dataset will become the outer loop and the scan of the draws from the posterior distribution 该算法对数据集进行划分,改变mcmc对数据集的扫描策略,将其分开为内、外两个循环过程,外循环中扫描数据集,内循环扫描分布函数的抽样值。 | | 5. | Due to the agent distributed characteristics , it can be amply adapted to the detection of dispersive vulnerability . in this paper , the details of system model are introduced . the makeup of scanner agent and details of every aspect of agent are alse introduced and designed 系统地论述基于分布式的安全漏洞检测系统逻辑模型、整个系统的逻辑实现,并给出扫描代理的构成与各部分的较详细的论述,讨论了代理扫描策略设计方案及其概要性实现。 | | 6. | And more than 70 % hardware are tested during microcode self - test since the execution of micro program can cover other data paths . boundary scan is designed according to ieee1149 . 1 , and some other instructions such as degug , runbist are provided to support internal fault testing , online debugging and built - in self - test besides the several necessary insructions . internal scan is implemented by partial scan , through this the boundary of logic component and user - cared system registers can be selected to be scanned Bist用于测试cpu的微码rom ,其它ram则利用微码rom中的微程序进行测试,而微程序的运行则可以顺带覆盖其它数据通路,从而使高达70 %的硬件得到测试;边界扫描按ieee1149 . 1标准设计,除必备的几条边界扫描指令外,还提供了debug 、 runbist等指令以支持内部故障测试、在线调试及内建自测试;内部扫描采用部分扫描策略,选择逻辑部件的边界及用户关心的系统寄存器进行扫描,从而实现了硬件逻辑划分,方便了后续的测试码产生和故障模拟,并为在线调试打下了基础。 | | 7. | The simulation results suggest that , at the end of the scanning line , the dissymmetric temperature field and the great temperature gradient result in the balling phenomenon and great thermal stress , which could lead to the destruction of the sintering samples in this region . because of the coupling effect between scanning lines , the balling phenomenon is increased as the increase of the scanning lines , thus the over short scanning lines should be avoided in the sintering process . different scanning strategies have significant influence on the sintering 模拟结果表明,扫描端点温度场的不对称及较大的温度梯度造成了端点球化现象,并在端点处产生较大的热应力,使烧结成形试样易在此处破坏;激光扫描线间的耦合作用使端点球化现象随扫描线的增加而逐渐显著,烧结时应避免过短的扫描线;不同扫描策略对烧结成形有很大影响,交替扫描会影响烧结试样的质量,实际制造时应采用单向扫描策略。 | | 8. | Generally , the disassembly strategy can be divided into the liner - scanning strategy and recursion - scanning strategy based on control flow . through researching on the recursion - scanning strategy based on control flow and instruction sets of many processors , this essay proposes a kind of disassembly strategy based on the static program flow traversal graph , and makes use of six strategies to pick up the hidden program sections from the data sections , thereby raising the precision of the disassembly result 反汇编策略大体可以分为线性扫描策略和基于控制流的递归扫描策略,该文通过对基于控制流的递归扫描策略以及多款处理器指令系统的研究,提出了一种基于程序静态流程遍历图的反汇编策略,使用6种策略将隐匿于数据段中的程序段提取出来,提高了反汇编结果的精确度。 | | 9. | The paper introduces the definition of worm according to the history of worm , analyses the worm ’ s function module , attacking mode , scanning regulation and the typical worm - sasser , then brings forward a worm - detecting algorithm based on packet statistics , by analyzing the detecting algorithm in existence 本文结合蠕虫发展的历史提出了蠕虫的定义,分析了蠕虫的功能结构,攻击手段,扫描策略,并对sasser蠕虫进行了剖析。简述了现有的蠕虫检测算法,并分析了其优缺点,提出了基于数据包统计的蠕虫检测算法。 |
- Similar Words:
- "扫描部分" English translation, "扫描部件" English translation, "扫描参数" English translation, "扫描残迹" English translation, "扫描操作数" English translation, "扫描测定钎焊或焊接电触点组件的粘接性" English translation, "扫描测量" English translation, "扫描测量仪" English translation, "扫描测试" English translation, "扫描产生器" English translation
|
|
|