1.
The Research of User Traversal Sequential Patterns Based on Web Log
基于Web日志的用户访问序列模式研究
2.
Mining of Frequent Traversal Sequences in Dynamic Web Clickstreams
动态Web点击流中频繁访问序列的挖掘
3.
The Research of Mining Access Sequential Pattern in WebLog;
序列模式挖掘在Web用户访问序列挖掘中的应用研究
4.
Research on the User Access Sequence of Web Usage Mining;
Web使用挖掘中用户访问序列挖掘技术研究
5.
Research on Frequent Traversal Sequence Mining Based on Web Click Streams;
基于Web点击流的频繁访问序列挖掘研究
6.
Research on the Algorithm for Mining Access Patterns from Web Logs;
从万维网日志中挖掘访问序列模式的算法研究
7.
IM-FTS:high-speed incremental algorithm for mining frequent traversal sequences
IM-FTS:一种快速增量式频繁访问序列挖掘算法
8.
Connections are listed in the order in which they are accessed by network services.
连接按被网络服务访问的顺序排列。
9.
Grant assemblies access to the following sockets:
授予程序集对下列套接字的访问权限:
10.
Grant assemblies access to the following environment variables:
授予程序集对下列环境变量的访问权限:
11.
Grant assemblies access to the following files and directories:
授予程序集对下列文件和目录的访问权限:
12.
Use the Publisher's publication access list for this publication.
对此发行物使用发行程序的访问控制列表。
13.
Grant assemblies access to the following file dialog boxes:
授予程序集对下列文件对话框的访问权限:
14.
You can arrange the order in which this computer accesses information on the network. Providers and other connections are accessed in the order listed.
您可以安排计算机在网络上访问信息的次序。提供程序和其它连接按列出的顺序被访问。
15.
Use the following custom publication access list for this publication
对此发行程序使用下列自定义的发行物访问列表
16.
Do you want to customize an access control list for this publication, or use the Publisher's access control list?
是否需要自定义此发行物的访问控制列表,或是使用发行程序的访问控制列表?
17.
The publication access list contains the logins used by pull and immediate-updating subscriptions to access publications on this Publisher.
发行物访问列表包含接收和立即更新预订使用的登录,以访问发行程序上的发行物。
18.
Research on the Storage & Access of Time Series Data Based on IEC TC 57 s Common Information Model;
基于IEC TC57公共信息模型的时间序列数据存储与访问