message transport meaning in Chinese
消息传输
信息转送
Examples
- After many cries of political maneuvering behind its earlier intentions to develop a messaging transport protocol specifically for ebxml , ebxml . org recently made the decision to adopt soap in ebxml
在建立该连接之后,在后端开始了一个事务,并使用它来建立可供查询的模型对象。首先,只要查看一下模型中的语句的数目。 - Ibm s overall soa solution will be in the form of an enterprise service bus , a combination of websphere application server runtime support for message transport , and transformation with esb " endpoint " support provided in existing server environments
Ibm的整个soa解决方案将以企业服务总线( esb )的形式出现,它是支持消息传输的websphere application server运行时的合成体,也是现有的服务器环境中提供的“端点”支持的转换体。 - Secondly , this thesis studies three types of models of was cluster message transport : pub / sub model , constant peer - to - peer model and temporary peer - to - peer model . it implements the optimized multicast based on cluster cooperation and uses sliding windows to fulfill flow - control
其次,本文研究了web应用服务器集群消息传输的三类模型: pub sub模型、恒定点一点传输模型和临时点一点传输模型,实现了基于集群协作的优化可靠多播,利用滑动窗口进行流控制。 - First , xml technique is adopted to express message as xml documentation to satisfy the requirements of c / s network communication system , a message transport protocol is brought forward for package and transport of all the data over a steady tcp socket , which is applied to asynchronous , secure and reliable communications
首先,在综合分析客户机服务器模型中通信系统整体要求的基础上,引入了可扩展标记语言,制定了一个适用于异步、低可靠网络环境的跨平台消息传输协议,用以封装所有传输在tcp ip套接字上的数据。 - Persons can visit on net conventionally through net but also can attack , stole messages or destroy systems on net the electronic business is increasing , some messages are protected by the way of encryption , but in traditional method there is something trouble that the messages transported on net have the same key to encrypt data and decrypt data such as des . in this case how to distributed a secret key securely on net has n ' t a perfect solutioa while the technology of pki can solve it through distributing certificates and provide the vary net applications confidentiality , integrity , authentication and non - repudiation
随着internet以及电子商务的发展,人们对信息安全的需要越来越迫切,于是出现了依靠加密的手段保护敏感信息在网络上的安全,虽然在?定的程度上杜绝了网上传输信息的被窃取和破坏,但是依靠传统的加密手段本身就存在着安全隐患,比如说des对称加密算法)由于加密和解密采取了同一的密钥,怎样安全的分发密钥就成了难以解决的问题。