1) Intrusion-resilient signature
入侵可恢复
2) invading restore
入侵恢复
1.
we can solve the server secrity based on Win2k from the system installment, the invading examinationand the invading restore.
我们可以从系统的安装配置、入 侵检测、入侵恢复等方面解决基于WIN2K的服务器安全问题。
3) Intrusion containment and recovery
入侵限制和恢复
4) income restoration
收入恢复
1.
Methods for determining target value of income restoration of reservoir-induced resettlers;
水库移民收入恢复目标值的确定方法与探讨
5) recoverability
[ri,kʌvərə'biliti]
可恢复性
1.
This article clarifies the differences between ellipsis and substitution through five principles of ellipsis,explains the recoverability of ellipsis.
以省略的五大原则介绍省略与替代的区分 ,阐述省略的可恢复性 ;从而解释省略的存在范围。
2.
This article abstractly analyses the IMS system ,introduces its advantages,analyses its architecture,constructs its model structure,proves its recoverability and analyses its mechanisms of system recovery.
对IMS系统进行了抽象地分析,介绍了IMS系统的优势,建立了IMS系统的模型结构,并深入分析了IMS的可恢复性以及系统恢复机制。
6) restorability
可恢复性
1.
Based on the research of canal temperature state before and after lowering the intake water temperature,the restorability degree of lowering temperature has been forecasted.
由此定义并推导了可恢复性的准则关联参数φ与判定准则β,以及最小渠程与最大温降的关联式。
2.
The scheme integrates the dynamics of call admission,VP bandwidth allocation,and logical spare capacity assignment for maximizing network throughput while ensuring full traffic restorability.
提出了一种基于ATMVP/VC技术的动态带宽分配和网络自愈机制,该方案在确保网络业务的可恢复性前提下,将呼叫接纳控制、VP带宽分配、网络逻辑空闲容量分配集成一起,使网络吞吐量最大化。
补充资料:大海入侵
法国著名科幻小说家儒勒。凡尔纳的名著
内容提要:法国一家海外公司决定开凿一条运河,将地中海海水引入撒哈拉沙漠,形成一个新海,这就是大海入侵计划。人们亲眼目睹了灭顶之灾,各种各样的动物拼命的逃窜,成百上千的人被卷入汹涌的波涛之中,横七竖八的骑手和马转眼就消失了。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条