• Because component tests deal with multiple layers of an architecture, they often deal with databases, file systems, network elements, etc.

    由于组件测试处理一个架构多个层次,所以它们经常用于处理数据库文件系统网络元素

    youdao

  • The operational architecture artifact represents a network of computer systems that support some of the performance, scalability, and fault tolerance (among others) requirements of the solution.

    操作体系结构构件表示计算机系统网络这些系统支持解决方案某些性能可伸缩性容错需求

    youdao

  • Services include system of systems engineering and integration, network and interoperability engineering, architecture development and information assurance.

    服务内容包括系统工程集成网络工程和互操作性体系研发信息保障系统

    youdao

  • These are intertwined in the network architecture in a plethora of service adjuncts, each with its own systems for operations, provisioning and maintenance.

    这些交织在一起,纠缠着网络架构每个部分都单独的运行服务、维护系统

    youdao

  • Representational State Transfer (REST) is a style of software architecture for distributed network systems that takes advantage of the technologies employed by the Web.

    Representational StateTransfer (REST)分布式网络系统软件结构一种形式,它利用网络所采用技术所带来的优势。

    youdao

  • Embedded in the Derby Network server the Derby engine is running in a standard client-server architecture like most other database systems.

    嵌入Derby NetworkServer中的Derby引擎一个标准客户机-服务器架构运行,这大多数其他数据库系统一样的。

    youdao

  • Architecture of the data center (physical systems and network connections).

    数据中心(物理系统网络连接)结构

    youdao

  • The advantages of using P2P architecture in collaboration systems are analyzed, the details of the design and implementation of a P2P NetWork for collaboration system.

    文章分析了协同工作系统采用P 2 P架构具有优点,并提出一个用于协同工作系统的分组P 2 P网络设计实现方案

    youdao

  • This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.

    本文描述AT M网络中的信息安全可能受到的威胁、安全结构系统之间鉴别技术

    youdao

  • In this paper, the architecture and the detection principle of adaptive model generation systems are studied, then the adaptive model for intrusion detection of computer network is established.

    本文介绍模型体系结构对其工作原理进行了分析,在此基础上建立自适应入侵检测模型。

    youdao

  • In order to protect these systems, we need to construct layered network security guarantee architecture, and IDS is one of the most important components of the architecture.

    为了保障系统安全我们需要构建层次网络安全保障体系入侵检测技术就是网络安全层次结构一个重要组成部分。

    youdao

  • With more application systems joining unified identity authentication serve, this system will play a more important role in the CERNET info security architecture. And network management is simpler.

    随着更多应用系统加入到统一认证服务系统将会在教科网信息安全体系发挥重要作用而且网络管理更加简单。

    youdao

  • With more application systems joining unified identity authentication serve, this system will play a more important role in the CERNET info security architecture. And network management is simpler.

    随着更多应用系统加入到统一认证服务系统将会在教科网信息安全体系发挥重要作用而且网络管理更加简单。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定