Moreover, when A is a nondegenerate, symmetric and copositive plus matrix, the sequence converges to a solution of the problem.
此外,当矩阵为非退化对称双正加阵时,该序列收敛。
SMP, or symmetric multiprocessing.
即对称多处理(symmetricmultiprocessing)。
Nature doesn't need a symmetric structure.
大自然不需要对称结构。
For symmetric cyphers, 128 bits is sufficient.
对于对称密码,128位就足够了。
More consistent, symmetric operator overloading.
更一致的、对称的操作符重载。
The graph to the left, this is the s orbital, symmetric.
在左边的图是对称的S轨道,对称的。
Using keys that were previously exchanged (symmetric encryption).
使用预先交换的密钥(对称加密)。
If we can do that, we'll end up with a symmetric nonpolar molecule.
如果我们能这样做,我们就能得到那些对称非极性的分子。
A two-phase process using both symmetric and asymmetric algorithms.
使用对称算法和非对称算法的两阶段过程。
Hence good and bad stand in an a - symmetric relation Nietzsche says.
因此好坏均在一个A对称,的关系中,如尼采所说。
For symmetric encryption algorithms, you can use either AES128 or AES256.
对于对称加密算法,您可以使用AES128或AES256。
SymmEncr: Require symmetric encryption using a client-generated secret key.
SymmEncr:需要使用一个客户端生成您的密钥进行对称加密。
This is a parabola, so it's completely symmetric about the vertical, about p.
这是个抛物线,因此关于P点轴对称。
The symmetric key itself is encrypted by one or more asymmetric keys (public keys).
这个对称密匙本身又由一个或多个非对称密匙(公共密匙)加密。
Two token-exchange endpoints: REST with symmetric key and REST with SAML extension.
两个令牌互换端点:一个是带对称钥匙的REST,另一个是带SAML扩展的REST。
The CA evolution in Figure 3 happens to be symmetric, but not all CA evolutions are.
图3中CA 的进化碰巧是对称的,但是并不是所有 CA进化都是对称的。
A symmetric key is dynamically created and used for encrypting a database backup image.
为数据库备份映像加密时,将动态创建并应用一个对称密匙。
The POWER4 architecture was the first 64-bit symmetric multiprocessor, released in 2001.
POWER4 是首款 64位对称多处理器,于 2001 年发布。
You need a symmetric key to do the encryption, and the key must be managed independently.
必须有对称密钥才能解密,而且密钥必须单独管理。
Now, it's not going to be symmetric is it, because there's two fluorines and two chlorines.
现在,它将不会对称,因为有两个氟原子和两个氯原子。
In the absence of any air drag, I would get a nice parabola which will be completely symmetric.
在没有阻力的情况下,会得到一条抛物线,非常均衡的。
Note that you get the same result whether you use left - or right-bias, because rule 150 is symmetric.
注意使用左或者右方式得到同样的结果,因为150规则是对称的。
SPKM is a GSS-API mechanism which is based on a public key rather than a symmetric key infrastructure.
SPKM是一种GSS - API机制,其基于公钥而非对称密钥基础设施。
Algorithm Type defines whether the cryptography algorithm is symmetric, asymmetric, or a message digest.
算法类型定义加加密算法是对称的、非对称的还是消息摘要。
But first, in next month's installment, I'll discuss using symmetric encryption with regular WS-Security.
但在下个月的专栏中,我们将首先讨论使用对称加密及常规WS - Security。
Note that the left - and right-bias versions of the mappings are different, because rule 60 isn't symmetric.
注意左右方式的映射是不同的,因为60规则不是对称的。
In-band (often called symmetric) virtualization sits between the host and the storage device allowing caching.
可控制的(常常称作对称的)虚拟化位于宿主与存储设备之间,并允许缓存。
Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.
对称算法非常有效,并且可以与用于加密和解密计算的单一密钥一起使用。
Likewise, you can use SignedObject for data verification, and again the symmetric key must be managed independently.
同样,也可以将SignedObject用于数据验证,并且对称密钥也必须单独管理。
Use the key that was previously generated to encrypt the sensitive data within the SOAP message (symmetric encryption).
使用以前生成的密钥加密SOAP消息中的敏感数据(对称加密)。
应用推荐