| 1. | Real - time operating system . an operating system designed specifically for use in real - time systems 实时操作系统。一种被特殊设计来用在实时系统中的操作系统。 |
| 2. | A generalized database management and multi - user operating system designed for the business environment 一种为商业环境而设计的通用数据库管理和多用户操作系统。 |
| 3. | In proc . the 2nd symposium on operating systems design and implementation , seattle , wa , usa , oct . 1996 , pp . 245 - 259 一些平台现在能够提供i o存储管理单元,它们可以保护主存免受设备驱动程序dma的影响。 |
| 4. | While some of the basic security functionality has since been added to this line of product , certain aspects of the operating system design make it 虽然已经将某些基本安全性功能添加到这一产品系列中,而操作系统设计的某些方面 |
| 5. | Daacm is conformant to the requirements of the secure operating system design of structured protection level , and will be used to the practical system design Daacm符合论文中给出的《结构化保护级》安全操作系统设计的需要,并将实际应用于该系统的设计之中。 |
| 6. | This faq is aimed at hobbyist programmers who just want to play around at creating an os , actual theory on operating systems design and implementation is ignored ^ _ ^ 本faq的对象是那些打算创建一个操作系统来玩玩的编程狂们,实际的操作系统设计与实现理论都被忽略了^ _ ^ 。 |
| 7. | Apple and ibm signed a pact to form a jointly owned software company that would create a new operating system designed for the risc ( reduced instruction set computer ) processor 1991年7月3日,苹果公司和ibm公司两大软件公司,签定了建立新的联合软件公司的合同。联合公司将为risc (精简指令集计算机)处理器开发一个新的操作系统。 |
| 8. | 5 weiser w , welch b , demers a , shenker s . scheduling for reduced cpu energy . in proc . the 1st usenix symposium on operating systems design and implementation , monterey , ca , november 1994 , pp . 13 - 23 与半导体技术的发展速度相比电池技术发展慢的多,未来的移动设备必须在有限能源供应下发挥更大的效能,这对系统功耗提出了很高的要求。 |
| 9. | One of the most passionate arguments i had with my operating systems design lab partner in college was whether the " hump case " for example , " onetwo " is better than the underscore as in " one two " for naming computer symbols 我和我大学时代研究操作系统设计实现的同学争论最激烈的一点是,在命名计算机符号时“首字母大写” (比如“ onetwo ” )是否比下划线(如“ one _ two ” )好。 |
| 10. | Sixth , we introduce some helpful investigations about some key technologies of high level secure operating system design , such as covert channel analysis and trusted path , and describe their coarse - gained implementation in the real system 第六,对高等级安全操作系统设计的其它几个关键问题,包括隐蔽通道分析处理、可信路径等做了有益的探索,给出了其在系统中实现的大致方案。 |