design vt. 1.计划,企图,立意要…。 2.指定,预定;留给,留着。 3.设计,草拟,拟定,筹划;起草,画草图,打(图)样。 design an attack 计划进攻。 design one's son for [to be] a soldier 立意要儿子做军人。 design a room for one's library 指定一间屋子做某人书房。 vi. 计划;打样,打图样 (for)。 n. 1.计划;企图;目的,意图,野心,阴谋。 2.(小说等的)提纲,结构,构想,情节。 3.设计,图案,图样。 by design and not by accident 是故意不是偶然。 have a design on 对…有野心,企图。 have designs upon [against] sb.'s life 拟加害某人。
Completed the protocols design and assemble of the interface between dsp and pci by language realization , as well as the interface between dsp and fpga 4 .完成了dsp模块与pci接口部分、 dsp模块与fpga模块的接口协议的编制和汇编程序实现。
However , ip multicast is generally unreliable , disordered and with redundant copies , and there is no reliable multicast protocol designed for multicast - based conference control 但是由于组播传输是不可靠的,所以难以实现基于组播的会议控制。
We are getting better at protocol design : none of our protocol classes had to be changed , and neither will have to change until the end of the tutorial 我们在协议设计方面变得更好了:没有一个协议类需要修改,并且直到这个教程的结束两个都不需要修改。
Ssl and tls are not java - specific protocols , but rather network - layer protocols designed to maintain the integrity and privacy of traffic across a socket Ssl和tls不是特定于java的协议,它们是为维护通过套接字的数据的完整性和私密性而设计的网络层协议。
Dos attack is a very important network attack meanings , mainly using the bug of network protocol designing , it can make much loss in the other side it is hardly prevented Dos攻击作为网络攻击中的一个重要手段,主要是利用网络协议设计上的漏洞,造成的损失大,并且难以防范。
One of the outcomes from the funding was a set of protocols designed to make clairvoyance a more scientific process , and minimize as much as possible session noise and inaccuracy 其中一些发现的效果是一系列决定是否让透视方法变得更有科学性的草案协议,尽可能地把会议的噪声和错误最小化。
We select rubin logic to formally analyze the authentication and key exchange protocol designed for this transmission platform utilized , and the analysis result indicates that this authentication and key 对于传输平台所使用的认证和密钥交换协议,本文选择rubin逻辑对其进行形式化分析,分析结果表明该认证和密钥交换协议具有一定的严密性。
In application layer protocol design , the paper improved conventional static priority schemes and introduced dynamic priority schemes , and practiced them in vdr project development with good results acquired 在协议的制定中,论文改进can总线传统静态优先级机制,引入动态优先级晋级机制,并根据工程的实际情况进行了灵活的运用和实践。
Traffic monitoring is a direct approach to get the characteristics of network and application behaviors , it has been applied widely in areas such as protocol design , network plan , anomaly monitor , traffic engineering 流量监测是获得网络与业务行为特征的直接手段,在协议设计、网络规划、异常监测、流量工程与性能提升等方面都得到大量应用。
The concept of the qos appears in the docsis v1 . 1 . both ieee802 . 14 and docsis , focus in mac protocol design on the upstream channels , i . e . sharing the upstream channels , dealing the services and resolving the contention 无论是ieee802 . 14还是docsis两者mac层协议的设计重点都放在上行信道上,即上行信道的分配,服务调度以及冲突解决等。