助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   remain uncorrupted 的翻译结果: 查询用时:0.008秒
图标索引 在分类学科中查询
所有学科
更多类别查询

图标索引 历史查询
 

remain uncorrupted
相关语句
  相似匹配句对
     On the Right to Remain Silent
     略论沉默权
短句来源
     On the Right to Remain Silent
     浅议沉默权制度
短句来源
     On the Construction of Uncorrupted Government Culture and the Socialist Harmonious Society
     廉政文化建设与社会主义和谐社会的构建
短句来源
     The responsible government is necessary for democr acy and the rule of law, and for the efficiency and uncorrupted governments.
     责任政府是民主政治和法治国家的必然要求 ,也是实现政府高效廉洁的基本保障。 然而 ,责任政府不会自然生成 ,它的确立基于完善的民主监督体制、健全的法律监督制度和良好的政德监督机制。
短句来源
     The aim of image restoration is to recover the original uncorrupted images from noisy, blurred ones.
     图像复原的目的是将原始图像从观测到的降析图像中恢复出来.
短句来源
查询“remain uncorrupted”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
没有找到相关例句


Though firewall and IDS (Intrusion Detection System) are generally used to filter the accessing traffic for network security, they still cannot ensure protecting the key files of network system from being corrupted by advanced and sophisticated attack, such as hacker's stealthy penetration and worm's wide spread by attaching itself to E-mail. Fig.1 presents the framework of an automatic-recovery security model based on what we call allied backup of key files; it ensures that the network system can deliver essential...

Though firewall and IDS (Intrusion Detection System) are generally used to filter the accessing traffic for network security, they still cannot ensure protecting the key files of network system from being corrupted by advanced and sophisticated attack, such as hacker's stealthy penetration and worm's wide spread by attaching itself to E-mail. Fig.1 presents the framework of an automatic-recovery security model based on what we call allied backup of key files; it ensures that the network system can deliver essential services despite being attacked because it monitors key files and recovers corrupted files automatically and quickly. Section 3 explains in considerable detail how to recover a corrupted file quickly. Subsection 3.1 explains how to build and maintain an uncentralized allied group: through the emission of probing messages by each ally periodically, each ally is always aware of the "heartbeat" of every other ally. Subsection 3.2 explains how to recover a corrupted file quickly through locating one ally whose file corresponding to that corrupted file remains uncorrupted and using that uncorrupted file to implement quick recovery. Simulation results, as summarized in Table 1, show preliminarily that our automatic-recovery security model based on allied backup of key files is effective and efficient and can meet the requirements of intrusion tolerance and survivability.

为了提高网络入侵容忍能力和存活性 ,提出了一种基于联盟备分的自动恢复安全模型。联盟组中的成员互相通过定期发送使用随机数标识并经过加密的消息来探测彼此的“心跳”( Heartbeat) ,从而实时维护自己的联盟成员列表并形成一个无中心控制的联盟组。恢复文件时 ,使用由“选举”( Voting)得到的被恢复文件的可靠数字签名来确定恢复样本。基于 FAM检测文件的实验结果表明 ,文件受到攻击后能够快速恢复 ,该模型具有重要的实用价值。

 
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关remain uncorrupted的内容
在知识搜索中查有关remain uncorrupted的内容
在数字搜索中查有关remain uncorrupted的内容
在概念知识元中查有关remain uncorrupted的内容
在学术趋势中查有关remain uncorrupted的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社