| 1. | Method implementations depend on the default functionality 方法实现依赖于默认功能。 |
| 2. | Although the implementation is dependent on the underlying list s 尽管实现依赖于基础列表的 |
| 3. | The implementation relies on a binary state of the option on or off 实现依赖于选项的二进制状态(开或关) 。 |
| 4. | Visualizer and visualizer object source implementation is dependent upon the hosting debugger 可视化工具和可视化工具对象源实现依赖于宿主调试器。 |
| 5. | The realization of pdm depends on various technologies , including technologies of database , network and system analysis object oriented , etc Pdm的实现依赖各种具体的技术,包括数据库技术,网络技术,面向对象的系统分析等等。 |
| 6. | The implementation of asset securization transaction depend on the following three basic the ories : asset - recombinating , risk - isolating , credit - upgrading 资产证券化交易的实现依赖资产组合、风险隔离、信用增级三大基本原理。 |
| 7. | But the realizement of compensation plan bases on the operation of performance appraisal system . only appraises performance fairly , top executive can get the right pay 然而报酬计划的真正实现依赖于绩效评价系统的运行,只有科学公正地评价管理者绩效,才有可靠的依据执行各种报酬计划。 |
| 8. | Data management exposed as a web service is beneficial to both thin and thick client design by allowing flexibility for financial institutions to implement on either the client or server side depending on security , accuracy of data , and other requirements 允许财政指令的灵活性是在客户端还是服务器端实现依赖于安全性、数据的准确性以及其它需求,从而将数据管理封装为web服务既利于瘦客户端设计又利用胖客户端设计。 |
| 9. | J2ee specification only defines security - related requirement and goal , but how to implement is due to developer . in order to guide the development of security service of j2ee application server , we define a security reference model through referring to corba security reference model and combining characteristics of j2ee application server J2ee规范只定义了相关的安全需求和目标,但具体实现依赖于实现者,为了对j2ee应用服务器的安全服务具体实现提供指导,我们借鉴corba安全参考模型,并且结合j2ee应用服务器的特点,建立了安全参考模型。 |