您要查找的是不是:
- file access pattern 文件访问模式
- Expects a single file access type. 需要单一的文件访问类型。
- Access pattern mining module fulfills the FAP-Mining algorithm. 访问模式挖掘模块实现了本文第四章提出的FAP-Mining算法。
- A remote file access protocol that is used by Windows clients. 供Windows客户端使用的远程文件访问协议。
- A remote file access protocol that is used by most UNIX clients. 大多数UNIX客户端使用的远程文件访问协议。
- In practice though you'd want better file access times than that! 在实践中尽管你更希望快的文件访问时间。
- File access is based upon the same administrative credentials. 文件访问基于相同的管理凭据。
- Enumeration defines constants used to set file access modes. 枚举定义用于设置文件访问模式的常数。
- DAFS is the emerging protocol of file access and management. DAFS是目前新出现的一种文件访问和管理协议。
- Experiments show that the algorithm outperforms the DHP algorithm and web access pattern(WAP),which is based on main memory in execution efficiency. 实验表明WDHP算法不仅优于DHP算法;而且也优于典型的基于内存的WAP算法.
- Group data with different data access patterns into separate pools. 将有不同数据访问模式的数据统一放到不同的缓冲池中。
- For capturing individual user's access pattern, we design and implement an access pattern collection server to conduct data mining in the Web. 为了撷取个别使用者存取模式,我们设计且实做了存取模式蒐集伺服器去实施全球资讯网资料探勘。
- The invention uses the object storage technology by expanding access pattern attribute value and improves the efficiency of Reading lock visit. 本发明利用对象存储技术,采用扩展的访问模式属性值,提高读锁的访问效率。
- Which adds an entry for a device in the system tables, does not check file access permissions. 但是,为设备在系统表中添加项目的。
- Visual Studio source control supports both shared and exclusive file access, and file merging mechanisms. Visual Studio源代码管理支持共享和独占两种方式的文件访问和文件合并机制。
- Do not allow users the option of specifying a path for any file access in your application. 不要让用户指定在应用程序中进行文件访问的路径。
- File access must begin at byte offsets within the file that are integer multiples of the volume's sector size. 文件的存取开头的字节偏移量必须是扇区尺寸的整倍数。
- File access security and permissions can be used to restrict access to sections of configuration settings. 文件访问安全和权限可用于限制对配置设置节的访问。
- And the veracity of prefetching is high on normal access patterns such as sequential pattern and strided pattern. 该机制根据访问模式的变化在动态PBL算法和ISG算法之间切换,对常见的访问模式如顺序和跨度访问模式都可以进行较为正确的预取。
- This limits security to the file access security provided by the operating system for the current user. 这将限制操作系统为当前用户提供的文件访问安全性的安全性。