助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   secure 在 计算机硬件技术 分类中 的翻译结果: 查询用时:0.158秒
图标索引 在分类学科中查询
所有学科
计算机硬件技术
互联网技术
电信技术
计算机软件及计算机应用
工业经济
企业经济
金融
铁路运输
安全科学与灾害防治
更多类别查询

图标索引 历史查询
 

secure
    很抱歉,暂未找到该词条在当前类别下的译词。您可以查看在所有学科下的译词。
相关语句
  “secure”译为未确定词的双语例句
    Interface Design between Secure Digital Card and LPC2210
    Secure Digital Card(SD卡)与LPC2210的接口设计
短句来源
    Study of Secure Computer Architecture Based on Explicit Authorization Method
    基于显式授权方法的计算机体系结构的研究
短句来源
    In the paper,a new project for forming the cluster environment by SSH(Secure Shell)technology,the primary functions of PC-cluster system environment and network parallel software:PVM and MPI are analyzed,and their advantages and disadvantages are pointed out.
    文中给出了一个利用SSH(Secure Shell)技术组建机群环境的新方案,并分析了PC机群的系统环境和网络并行软件PVM和MPI的主要功能,指出了各自的优缺点。
短句来源
    So how to secure the quality of software as well as designing and developing reliable software are our urgent task.
    因此,如何保证软件质量,设计并开发出可靠的软件已经成为当务之急。
短句来源
    So the secure communication systems that apply the chaotic signal have strong anti-decryption and long unpredictability.
    混沌加密通信系统具有很强的抗破解能力和长期不可预测等许多优点。
短句来源
更多       
查询“secure”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  secure
A secure model for mobile agent based on encrypted circuit construction
      
A dynamic, secure, and efficient group key agreement protocol
      
The key challenge of dynamic peer communication is how to realize secure and efficient group key management.
      
The protocol is proven secure against passive attack by using indistinguishable method.
      
By checking whether these variables are influenced by outside inputs, the database operations are proved to be secure or not.
      
更多          


In this paper, the development of self-checking technique for logical circuits is reviewed. All of this and other fault-tolerant techniques are formally defined in a unified way, their differences and relations are also discussed. The discussion is cenfered on the intimate relationship between the secure failure set Fs and the self-testable failure set Ft in the realization of self-checking. A possible approach of setting up a reliable digital system by means of self-checking technique is suggested. Finally,...

In this paper, the development of self-checking technique for logical circuits is reviewed. All of this and other fault-tolerant techniques are formally defined in a unified way, their differences and relations are also discussed. The discussion is cenfered on the intimate relationship between the secure failure set Fs and the self-testable failure set Ft in the realization of self-checking. A possible approach of setting up a reliable digital system by means of self-checking technique is suggested. Finally, the trend of self-checking to the LSI circuit production is pointed out.

本文综述了逻辑电路自校验技术的形成过程。将其与其它容错技术归纳作了统一的形式化定义,指出它们之间的关连和区别。文章着重论述了在自校验实现中安全故障集Fs和可自测故障Ft之间存在着的密切关系。提出自校验作为超可靠性数字系统的一种可能途径。最后指出由于大规模数字集成电路工艺的发展,近年来自校验研究的背景和重点正在转向为电路生产服务的动向。

in this paper, the author has introduced the process of hard disk system'sboot,and analysed the reason that the system become unbootable. Several repairing methods that hard disk boot failure are introduced. Repairing hard disk's roam hoot sector by means of INT13H in ROM BlO is fully detailed in the paper, this is a very available and secure method.

本文介绍了计算机硬盘系统自举引导的过程,并分析了造成引导失败的各种原因。然后介绍了几种硬盘引导失败的修复方法。其中,比较详细的介绍了用ROMBIOS中的INT13H直接恢复或修复硬盘主引导扇区,这是一种十分有效且稳妥的方法。

Security is one of the most important areas in the development andapplication of distributed systems.It provides very important functions in distributedsystems,like the protection and integrity of resources and applications,authenticationand authorization of users and reliable network operations,it also provides additionalfunctionality in the form of rernote user authentication,electronic signatures,arbitrationschemes,etc. This paper gives an overview of kerberos and discusses the secure applica-tion in...

Security is one of the most important areas in the development andapplication of distributed systems.It provides very important functions in distributedsystems,like the protection and integrity of resources and applications,authenticationand authorization of users and reliable network operations,it also provides additionalfunctionality in the form of rernote user authentication,electronic signatures,arbitrationschemes,etc. This paper gives an overview of kerberos and discusses the secure applica-tion in distributed systems. First it discusses what secure services should be provided indistributed systems,then gives the solution to thesecurity problems that really appear innetworks,how they work and what they really accomplish.

安全是分布式系统开发和应用的最重要领域之一,它为开放的分布式系统提供了相当重要的服务,如保护资源和应用的一致性、完整性,为用户和可能的网络操作做认证和授权,为远地用户提供认证、电子签名仲裁等等。本文以Kerberos为例,综合讨论分布式系统的安全应用,首先讨论在分布式系统中应提供哪些安全服务,然后讨论问题的解决方法以及它们是如何工作的,实际是如何实现的。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关secure的内容
在知识搜索中查有关secure的内容
在数字搜索中查有关secure的内容
在概念知识元中查有关secure的内容
在学术趋势中查有关secure的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社