1.
The Research on Trojan Detection Technology Based on Memory Integrality;
基于内存完整性的木马检测技术研究
2.
Several conditions exist that may pose a threat to ingredient integrity.
存在威协原料完整性的一些条件。
3.
Ensure the quality, relevance, and integrity of the content
确保内容的品质、相关性和完整性
4.
There is insufficient memory or disk space. The list may be incomplete.
内存或磁盘空间不足,列表可能会不完整。
5.
Inbox is critically low on memory, and needs to exit to preserve the integrity of your data. Inbox will exit when you tap OK.\0
“收件箱”内存严重不足,需要退出以保证数据的完整性。点击“确定”后将退出“收件箱”。\0
6.
Inbox is critically low on memory, and needs to exit to preserve the integrity of your data. Inbox will exit when you tap OK.
“收件箱”内存严重不足,需要退出以保证数据的完整性。点击“确定”后将退出“收件箱”。
7.
Tasks is critically low on memory and needs to stop to preserve the integrity of your data. Tasks will stop when you tap OK.\0
任务的内存极为不足,因而需要终止以保持数据的完整性。点击"确定",将终止任务。\0
8.
Tasks is critically low on memory and needs to stop to preserve the integrity of your data. Tasks will stop when you select OK.
任务的内存极为不足,因而需要终止以保持数据的完整性。点击"确定",将终止任务。
9.
Tasks is critically low on memory and needs to stop to preserve the integrity of your data. Tasks will stop when you select OK.\0
内存严重不足,应停止任务以保持数据的完整性。如果选择“确定”,任务将停止。\0
10.
The Voice Application is critically low on memory, and needs to exit to preserve the integrity of your data. The Voice Application will exit when you tap OK.
该语音应用程序的内存极为不足,为了保证数据的完整性应退出。点击"确定"应用程序将退出。
11.
An Efficient Algorithm for Minimizing Tree Pattern Queries in the Presence of Integrity Constrains
存在完整性约束时最小化树模式查询的算法
12.
Integrity Processing of Data in Flash ROMs of Embedded Systems
嵌入式系统中闪存数据完整性处理方法
13.
Loss and Repairing of the Survival Integrity of Humanunder Single Economy Goal;
单一经济目标下人类生存完整性的缺失与修复
14.
The comparison of the different preservation of DNA in cultured cells
不同保存条件下培养细胞中DNA完整性分析
15.
Research on Integrity Checking of Data Based on Outsourced Storage
基于外包存储的数据完整性检验的研究
16.
Endothelial dysfunction plays an essential role in initiation and progression of atherosclerotic diseases.
内皮功能完整性的维持需要通过细胞间不同的机制调整其活性。
17.
A new approach of kernel integrity protection based on Xen
基于Xen虚拟技术的内核完整性保护方法
18.
"Analysis destroys wholes.
“分析破坏完整性。