• Listing 9 shows the traceback.

    清单9给出了相应的跟踪。

    youdao

  • This list of functions is called a traceback.

    这个一系列函数列表,就是一个追溯了

    youdao

  • Finally, you construct an actual LCS using the traceback.

    最后回溯的方式构建实际lcs

    youdao

  • Without any argument, it does a traceback for all processes.

    若不带任何参数所有进程执行回溯

    youdao

  • Listing 13 shows the traceback code specific to needleman-wunsch.

    清单13显示特定于Needleman - wunsch算法的回溯代码

    youdao

  • The bta command does a traceback for all processes in a particular state.

    bta命令对处于某种特定状态所有进程执行回溯

    youdao

  • If no address is provided, it takes the current registers to traceback the stack.

    如果没有提供地址那么它采用当前寄存器回溯堆栈

    youdao

  • IP traceback is an important way to defend against distributed denial of service attack.

    IP追踪防御分布式拒绝服务攻击重要方法

    youdao

  • For example, on an i386 machine, the % ebp register can be used to traceback the entire stack.

    例如i386机器上,%ebp寄存器可以用来回溯整个堆栈

    youdao

  • You continue in this fashion until you finally reach a 0. Figure 6 shows the entire traceback.

    继续使用这种方式直到最后到达0

    youdao

  • The traceback element may write, decode, and trace stored trace bits to decode the encoded signal.

    回溯跟踪部件可以对所存储跟踪比特进行写入解码跟踪,以便编码信号进行解码。

    youdao

  • This system has three functions: misused detection, anomaly detection, and attack source traceback.

    系统实现了误用检测异常检测、攻击追踪三个方面的功能

    youdao

  • The BTP command takes a process ID as an argument and does a stack traceback for that particular process.

    btp命令进程标识作为参数这个特定进程进行堆栈回溯

    youdao

  • If the test method does not run as anticipated, we will get an error (and a traceback describing the error).

    如果测试方法没有预期运行我们得到一个错误(以及描述这个错误的回溯)。

    youdao

  • The order of the functions in the traceback is the same as the order of the frames in the stack diagram.

    追溯函数顺序排列方框顺序一样的。

    youdao

  • Otherwise, it assumes the provided address as a valid stack frame start address and attempts to traceback.

    否则假定提供的地址有效堆栈起始地址设法进行回溯。

    youdao

  • The large number of attacking machines and the use of source IP address spoofing make the traceback impossible.

    大量攻击机器使用地址欺骗使得现有跟踪是不可能的。

    youdao

  • As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.

    攻击使用IP欺骗隐藏自己真实地址,因此人们开始研究IP源回溯技术

    youdao

  • Probabilistic Packet Marking for IP Traceback was proposed to defend against distributed denial-of-service attacks.

    数据包抽样标记技术是为了应对分布式拒绝服务攻击而提出的一种IP追踪技术。

    youdao

  • You need to add a flag to run run -e so that you can avoid getting a traceback to the unittest module in the IPython shell.

    需要添加一个标记运行 run-e这样一来,您就可以IPython Shell 中避免回溯单元测试模块

    youdao

  • Probabilistic packet marking (PPM) is a practical and effective method for IP traceback of denial-of-service(DoS) attack.

    随机数据包标记PPM拒绝服务攻击进行IP回溯一种实用有效方法

    youdao

  • The preceding part of the error message shows the context where the exception happened, in the form of a stack traceback.

    错误信息前半部分以堆栈形式列出异常发生位置

    youdao

  • In general it contains a stack traceback listing source lines; however, it will not display lines read from standard input.

    通常堆栈中列出了源代码然而来自标准输入的源码不会显示出来。

    youdao

  • Finally, in the traceback, you start with the cell that has the highest score and work back until you reach a cell with a score of 0.

    最后回溯时候,得分最高单元格开始,回溯得分为0的单元格为止。

    youdao

  • Slightly more sophisticated is to catch wider spans of code, but to use a language's introspection capabilities to report traceback information

    稍微复杂一点解决方案捕获代码的范围更宽一些,使用语言内省能力报告追溯信息

    youdao

  • On the basis of analysis about advanced marking scheme (AMS), a reverse-validation IP traceback scheme is proposed, which no longer requires the too strong assumption of AMS.

    分析高级随机包标记算法(AMS)基础上提出种基于反向确认的攻击源追踪模型,模型不再需要AMS假设前提

    youdao

  • If the CONFIG_FRAME_POINTER option was set during kernel compilation, the frame pointer register is used to maintain stacks and, hence, the stack traceback can be performed correctly.

    如果内核编译期间设置了CONFIG_FRAME _ POINTER选项,那么指针寄存器维护堆栈从而可以正确地执行堆栈回溯

    youdao

  • Errors, on the other hand, are unexpected problemssince we do not know in advance what can go wrong, we need to examine the traceback in the actual test run to diagnose such problems.

    一方面,错误意外的问题——因为我们事先知道哪里出错,我们需要分析实际测试运行中的回溯诊断这种问题。

    youdao

  • Also, your local alignment doesn't need to end at the end of either sequence, so you don't need to start your traceback in the bottom-right corner; you can start it in the cell with the highest score.

    而且局部比对需要到达任何一个序列末端所以需要右下角开始回溯可以得分最高单元格开始回溯。

    youdao

  • Also, your local alignment doesn't need to end at the end of either sequence, so you don't need to start your traceback in the bottom-right corner; you can start it in the cell with the highest score.

    而且局部比对需要到达任何一个序列末端所以需要右下角开始回溯可以得分最高单元格开始回溯。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定