助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   签名匹配 的翻译结果: 查询用时:0.017秒
图标索引 在分类学科中查询
所有学科
自然地理学和测绘学
计算机软件及计算机应用
互联网技术
更多类别查询

图标索引 历史查询
 

签名匹配
相关语句
  signature matching
     In this paper, a misuse detection model for IDS based on user trust degree (UTD) is firstly presented. This model improves the architecture of IDS, the strategy of signature matching, and the cooperation and response mechanism.
     本文也首次提出了基于用户可信度的误用入侵检测系统模型,该模型对入侵检测系统框架结构、签名匹配策略、协同及响应机制都进行了改进。
短句来源
     In addition, UTD-IDS takes full advantage of local principle, then reforms the strategy of signature matching, so it improves the efficiency and accuracy of signature matching.
     另外,在用户可信度入侵检测系统中使用了局部性原理,进而改善了签名匹配策略并提高了签名的匹配效率和准确率。
短句来源
     In addition, was reformed full advantage of local principle were taken in UTD-IDS, then the strategy of signature matching, so it improves the efficiency and accuracy of signature matching.
     另外,在用户可信度IDS中使用了局部性原理,进而改善了签名匹配策略并提高了签名的匹配效率和准确率。
短句来源
  “签名匹配”译为未确定词的双语例句
     Then, this dissertation presentsa unifying framework for multimedia digital signature, which can be applied to digitalimages, video and audio sequences, text documents, etc.
     该方法利用PCA在能量集中意义方面最为有效,以及基矢量(特征向量)依赖于数据、不同数据产生的基矢量不同这两个性质,取PCA变换后的基矢量为多媒体数字签名,在签名匹配时用基矢量的夹角余弦值来度量签名的相似性。
短句来源
     This paper introduces a new approach for point to point correspondence finding in handwritten signature verification. Signatures to be compared were firstly processed by special points matching. Then the two signatures were pre segmented at matched special points.
     本文介绍了一种基于函数参量的点—点手写签名匹配映射方法.首先对两个待比较的签名进行特殊点匹配,然后利用得到的对应特殊点序列将两签名分段,接着每一对相应笔段中的点经由点—点的映射算法得到最后的匹配映射结果.
短句来源
     In this paper, a misuse detection model for IDS based on user trust degree (UTD) was firstly presented.
     提出了基于用户可信度的误用IDS模型,该模型对IDS框架结构、签名匹配策略及协同机制都进行了改进。
短句来源
  相似匹配句对
     Mix and Match
     混合和匹配
短句来源
     Online signature verification based on weighted dynamic programming matching
     基于加权动态匹配方法的联机签名鉴别
短句来源
     Signatures of Knowledge
     知识签名
短句来源
     The thesis focuses on the study of matching methods of the signature signal.
     论文侧重签名能量特征匹配方法的研究。
短句来源
     Matching layer of the transducer
     换能器的匹配
短句来源
查询“签名匹配”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  signature matching
The matching process uses five different filters: context matching, profile comparison, similarity matching, signature matching and constraint matching.
      
During signature matching, the Fisher criterion is used to obtain optimal threshold for automatically and universally distinguishing incidental manipulations from malicious attacks.
      
As a result, ignoring file downloaded files during signature matching eliminates the possibility that they become false positives.
      
As above also, the search may use the k-symbol suffix signature matching at the server for the string found, to arbitrarily decrease this probability.
      
Fault Detection in an Ethernet Network Using Anomaly Signature Matching.
      
更多          


This paper introduces a new approach for point to point correspondence finding in handwritten signature verification. Signatures to be compared were firstly processed by special points matching. Then the two signatures were pre segmented at matched special points. Finally, each pairs of corresponding segments are mapped by a point to point matching algorithm.

本文介绍了一种基于函数参量的点—点手写签名匹配映射方法.首先对两个待比较的签名进行特殊点匹配,然后利用得到的对应特殊点序列将两签名分段,接着每一对相应笔段中的点经由点—点的映射算法得到最后的匹配映射结果.

The technology of reuse has been widely applied,of which the construction and administration of the component is the key.This paper discusses the discipline of the classification and matching of the component,and discusses one of the method_signature matching.This paper gives the plan of management of GIS component in the land administration domain. The major impediment to the industrialization of information technology is the enhancement of the quality and the productivity of the software.Software is currently...

The technology of reuse has been widely applied,of which the construction and administration of the component is the key.This paper discusses the discipline of the classification and matching of the component,and discusses one of the method_signature matching.This paper gives the plan of management of GIS component in the land administration domain. The major impediment to the industrialization of information technology is the enhancement of the quality and the productivity of the software.Software is currently considered as the key to the problem.Domain engineering and software architecture are introduced into the development of the GIS research.In the process of the combination with GIS,the following questions are the focus of the software engineers: how to utilize and represent the reusable GIS components efficiently and how to find the wanted GIS components from the large amount of GIS components in the reusable library.The research related to the first question deals with the issues such as GIS component model,stipulations of component,the data modeling of GIS component library and so on.The research related to the latter question deals with the issues such as the query interface of GIS component library,the matching of components,and the arithmetic of index and so on. The current methods of the representation and index of components can be categorized into the following three: the artificial intelligent method,the hypertext method and the indexing vocabularies method.A good classification method should describe the component precisely and be easily understood and utilized with high efficiency.The keyword classification method and the facet classification method have their own problems. The signature matching is pointed out by A.M.Zaremski and J.M.Wing.They named the characteristic information abstracted from the component signature.In the process of indexing,the request of the user should match the signature of the component.There are two classification of signature matching: function matching and module matching. After the domain analysis,we have the corresponding domain model in the domain of the administration of the land information,and build the tree_structure of the GIS reusable component library.In order to describe a GIS reusable component completely and reuse it efficiently,we present our methods which integrate both keyword classification and facet classification to describe a GIS component,and their data structure .The resolution of the query of GIS component library is also presented. There are many standards to justify the method of component indexing,such as efficiency,extension,etc.However,until now,none of indexing methods can satisfy all the requests of all the GIS users completely.A better resolution is to provide more than one indexing methods in a practical GIS system,which will become the important direction of the application of software reusable technology in the specific domain of GIS.The transaction of GIS components between different libraries and the representation and indexing of GIS component in a distributed multi_libraries are the central problems in the future.

讨论了组件分类和匹配原理 ,并对签名匹配法进行了研究 ,把它作为从已知的组件中获取可重用组件的方法。最后提出了在国土信息管理领域中GIS组件库的解决方案。

In this paper, a misuse detection model for IDS based on user trust degree (UTD) was firstly presented. This model improves the architecture of IDS, the strategy of signature matching, and the cooperation mechanism. UTD-IDS presents a means of graded partition that based on UTD whereas there is a lack of graded partition in the architecture of CIDF, so it improves the rationality of the system. The safety level of misuse IDS was defined and the IDS of lower safety level may prevent unknown intrusion from damage...

In this paper, a misuse detection model for IDS based on user trust degree (UTD) was firstly presented. This model improves the architecture of IDS, the strategy of signature matching, and the cooperation mechanism. UTD-IDS presents a means of graded partition that based on UTD whereas there is a lack of graded partition in the architecture of CIDF, so it improves the rationality of the system. The safety level of misuse IDS was defined and the IDS of lower safety level may prevent unknown intrusion from damage by the early-alert principle. In addition, was reformed full advantage of local principle were taken in UTD-IDS, then the strategy of signature matching, so it improves the efficiency and accuracy of signature matching.

提出了基于用户可信度的误用IDS模型,该模型对IDS框架结构、签名匹配策略及协同机制都进行了改进。鉴于通用入侵检测框架CIDF(CommonIntrusionDetectionFramework)结构中缺少对入侵等级划分的机制,提出了基于用户可信度量化的等级划分方法,提高了系统的合理性。定义了误用IDS安全级别,通过预警原理实现低安全级别IDS对未知入侵的预防作用。另外,在用户可信度IDS中使用了局部性原理,进而改善了签名匹配策略并提高了签名的匹配效率和准确率。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关签名匹配的内容
在知识搜索中查有关签名匹配的内容
在数字搜索中查有关签名匹配的内容
在概念知识元中查有关签名匹配的内容
在学术趋势中查有关签名匹配的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社