| 1. | Data collection : capturing a function call trace 数据搜集:捕获函数调用路径 |
| 2. | These debugging messages are called traces 这些调试消息称为跟踪。 |
| 3. | Viewing an application s call trace in graphical form can be an educational experience 可以将以图形形式查看应用程序的调用过程看作是一个学习经历。 |
| 4. | A new two - layer markov chains anomaly detection model that operated on system call traces was presented 提出了一个两层马尔可夫链异常入侵检测模型。 |
| 5. | The tool prints the number of native instructions executed in each function with the call trace 此工具利用调用跟踪显示在每个函数中执行的本机指令数。 |
| 6. | To gather a function call trace , you need to identify when every function is called in your application 要收集一个函数调用的踪迹,您需要确定每个函数在应用程序中调用的时间。 |
| 7. | Asp . net provides an easy - to - use functionality called tracing that you can use to debug your web applications Asp . net提供了一种叫做“跟踪”的易于使用的功能,可用来调试web应用程序。 |
| 8. | Additionally , a call trace can identify the maximum call depth of user functions , which you can then use to efficiently bind the memory that the call stack uses an important consideration in embedded systems 另外,调用跟踪还可以判断用户函数的最大调用深度,这可以用来对调用栈使用的内存进行有效限制(在嵌入式系统中,这是非常重要的一个考虑因素) 。 |
| 9. | Abstract : the paper introduces various identification methods for tracing the malicious call and calling identification services in spc telephone exchanges , especially describes the malicious call trace methods by using switch boards and " r " key tandem function and telephone set which can display calling subscriber ' s numbers 文摘:介绍了程控电话交换机追查恶意呼叫和主叫用户信息识别业务的各种识别方法,特别是详细介绍了利用话务台和话机上的" r "键转接的功能,以及利用能显示主叫信息的话机来显示主叫电话号码和追查恶意呼叫电话的方法。 |
| 10. | The paper introduces various identification methods for tracing the malicious call and calling identification services in spc telephone exchanges , especially describes the malicious call trace methods by using switch boards and " r " key tandem function and telephone set which can display calling subscriber ' s numbers 介绍了程控电话交换机追查恶意呼叫和主叫用户信息识别业务的各种识别方法,特别是详细介绍了利用话务台和话机上的" r "键转接的功能,以及利用能显示主叫信息的话机来显示主叫电话号码和追查恶意呼叫电话的方法。 |