| 1. | An " unremarkable " accountant stole ? 9 . 5 million to support 17 lovers , a court in japan heard yesterday 日本一名会计盗窃约合9500万英镑的保险金以包养17个情妇的案件, 3月1日在名古屋一家法院开始接受庭审。 |
| 2. | An " unremarkable " accountant stole ? 9 . 5 million to support 17 lovers , a court in japan heard yesterday 日本一名会计盗窃约合9500万英镑的保险金以包养17个情妇的案件, 3月1日在名古屋一家法院开始接受庭审。 |
| 3. | We use “ qinghua tongfang ” and “ chongqing weipu ” database by means of in full package or pay according to flow 以包库或流量计费方式使用清华同方和重庆维普数据库,已购上海地方志数据库、 《新民晚报》和《文汇报》 (创刊至1999年)全文数据库等。 |
| 4. | Ferrocene entrapped in the carbon paste was used as a mediator of transferred electron . under the catalysis of iaa oxidase containing in the pant tissue , iaa can be easily oxidized 该传感器以包埋在碳糊内的二茂铁作为电子传递媒介,在绿豆芽叶片组织所含酶的催化下,能较好的氧化iaa 。 |
| 5. | Ip communications involves the transmission of information in packets on an as - needed basis . the route a packet of information follows can and does change throughout the transaction , unlike the fixed path of a circuit Ip通信发展到按需求以包的形式进行信息传输,与电路(交换)中固定通道不一样,在一次交易中信息包经过的路由是可以并一定是改变的。 |
| 6. | In this paper , which takes the course of realization of packet filter subsystem as main thread , author analyzed in - depth all kinds of key technologies in packet filter subsystem that is based on personal computer combining the features of windows2000 platform technology 本文以包过滤系统的具体实现过程为主线,结合windows2000平台的技术特点,深入的分析了基于个人主机的包过滤系统中的各种关键技术。 |
| 7. | For the last several decades , communications has existed in three separate universes : voice has gone over reserved end - to - end circuits through telco - switches , data has been delivered in packets over equipment maintained by is staff and video has moved over the ether or half - duplex cable 过去几十年中,通信存在于三个独立的领域:话音通过电话公司交换机在预留的端至端电路上传递,数据以包方式在由信息系统工作人员维护的设备上传输,而视频图像在以太或半双工电缆上传送。 |
| 8. | In this paper , the mechanism , methods of and countermeasures to denial of services attacks are discussed . after that , several packet marking schemes for traceback are reviewed and some improvements to the basic packet marking scheme are given , which reduce the workload and false positive rate in the attack tree reconstruction . knowing that in existing packet marking schemes , router marks packets with fixed probability , which results in that many packets are required in path reconstruction and that attacker could encumber path reconstruction via spoofed marking information 在本文中,我们首先研究了拒绝服务攻击的攻击机制、方法及其对策,并对以包标记的方式追踪拒绝服务攻击的来源的各种方法进行了深入的研究,分析了它们各自的优缺点,并对基本包标记方案作了改进,使得其攻击路径重构时的运算量和重构的误报率在原有基础上大为降低,达到或超过了其他一些方案的水平。 |
| 9. | As the intermittent asynchronous transmission of the internet is based on packets , a realtime av source or an av file stored is broken down into many packets in the course of transmission . and as the network is dynamic , each packet may be routed differently , resulting in different delay at the user end . the packets transmitted first may arrive later 因为internet以包传输为基础进行断续的异步传输,对一个实时av源或存储的av文件,在传输中它们要被分解为许多包,由于网络是动态变化的,各个包选择的路由可能不尽相同,故到达客户端的时间延迟也就不等,甚至先发的数据包还有可能后到。 |