buffer computer

英 [ˈbʌfə(r) kəmˈpjuːtə(r)] 美 [ˈbʌfər kəmˈpjuːtər]

网络  缓冲型计算器; 带缓冲器的计算机

计算机



双语例句

  1. Study on buffer overflow attack description language of computer network counterwork
    面向网络对抗的缓冲区溢出攻击描述语言研究
  2. A buffer that keeps track of key strokes until the computer is ready to respond to them.
    直到计算机对它们有反映的与键盘敲击保持联系的缓冲器。
  3. This paper analysed the principle of worm virus and buffer overrun, and presented an experimental scheme of worm virus exploiting buffer overrun that aims at the difficulties of experimental teaching of computer virus to students of information security specialty at present.
    摘要分析了蠕虫病毒和缓冲区溢出的基本原理,针对目前在信息安全专业中开展计算机病毒实践教学的难点,给出了一个缓冲区溢出蠕虫病毒的实验设计方案。
  4. All of them are gathered by data interface board in which assembled with the A/ D converter and the data buffer. The output signals of interface board are displayed on the monitoring computer through RS-232C serial interface.
    所有信号汇合到采集接口板,经数据缓冲、A/D转换及RS-232C串行处理后送微机监控显示。
  5. It maps the high-speed double-port RAM to the internal storage of host computer, and makes the double-port RAM become ring buffer. It realizes the parallel operation between the real-time acquisition of high-speed ADC data stream and the processing of the host computer.
    采用将高速双端口RAM映射为主机内存并构造成环状缓冲区的方法,实现了高速ADC数据流实时采集与主机处理的并行操作。
  6. ARP Protocol points to the address mapping of Media Access Control. There is an error in ARP high-speed buffer storage. IP data package may be sent to wrong computer.
    ARP协议指向媒体访问控制的地址映射,ARP高速缓存中有一项不正确,IP数据报就可能被发往错误的计算机。
  7. Buffer, as an important tool that is used to store temporarily the key information and to deal with speed difference, always plays a vital role in computer engineering field.
    缓冲区作为一种缓存关键信息、协调速度差异的重要手段,在计算机工程领域一直扮演着一个不可忽视的角色。
  8. Buffer& Queue Interface Method of Computer Network Layers
    计算机网络协议层次的缓冲区&队列接口方法
  9. Buffer overflow is a technology widely used by hackers to attack computer. In this paper the principle of such kind of attack is analyzed, and the difference of input parameters between in normal case and under attack is also discussed.
    堆栈溢出攻击是目前使用得相当普遍的一种黑客技术分析了这种攻击技术的原理,指出了进行这种攻击时输入参数与正常情况下,的差异。
  10. Finally, use the double buffer technique of OpenGL to display the dynamic cutting process of the workpiece on computer screen.
    最后利用OpenGL的双缓存技术在计算机屏幕上显示工件的动态切削过程。
  11. Setting a "quick enter slow out" RAM, it first write the ADC result to the high speed buffer and then send to the host computer main memory.
    设置一个快进慢出RAM,先将模数转换的结果高速写入这个高速缓存器中,然后再传送到主存储器。
  12. Simulating Analysis on Dynamic Process of Cylinder Buffer with Computer
    液压油缸缓冲装置动态过程仿计算机真分析
  13. The paper evaluates probability distribution of queue length for four kinds of typical buffer fabric with help of computer simulation, and then acquires best placement of buffers under the particular traffic model.
    本文以计算机仿真的手段评估了四种典型缓冲结构的队列长度概率分布情况,进而得出了这种特定业务模式下的最佳缓冲存储器布局。
  14. General formulae for the calculation of differential capacity and integral capacity of buffer have been derived from the condition of charge balance. Based on the formulae, the calculating programme in BASIC was made up and run on the APPLE ⅱ computer.
    从电荷平衡条件出发,推导出微分缓冲容量与积分缓冲容量的计算通式,枢据通式用BASIC语言编制出计算程序,在APPLEⅡ型微机上运行通过。
  15. Considering the uncertain time delay, control quality is good when buffer is used in the local computer which transforms uncertain delay into certain delay.
    对于网络延时的不确定性,在现场控制的计算机内采用了缓冲技术,将不确定延时转化为固定延时,即使在不进行网络延时的预测,也能达到较好的控制效果。
  16. All results from every DSP, such as time and frequency values of strange points and characteristic values presenting the AE signal, are carried by CAN field bus, and finally reach receiving buffer zone of industrial control computer.
    各个信号处理单元的处理结果(信号奇异点处的时频特征和信号波形的各个特征参数)都要通过CAN现场总线进行传送,最后到达上位机的接收缓冲区,由上位机进行接收。
  17. The rotation buffer technique can perform the downloading of data files with any size from principal computer to subordinate computer.
    利用旋转缓冲区技术,实现了上位机和下位机之间任意大小的数据文件下载。
  18. Buffer overflows at run-time can lead to non-deterministic program behavior, which may be used by malicious attackers to compromise a computer, such as to access or corrupt sensitive information, and even worse, to control the computer to attack others.
    程序运行时的缓冲区溢出将导致程序行为异常。恶意用户可以利用服务程序中的缓冲区溢出漏洞,攻击目标计算机系统,窃取或破坏其中的敏感信息,甚至控制该系统向其它主机发动攻击。
  19. Buffer overflow is common software security vulnerability. Malicious users can use the overflow vulnerability of the procedure to attack the target computer systems, or even worse, to control the host system to attack others.
    缓冲区溢出漏洞是常见的软件安全漏洞,恶意用户可利用程序中的溢出漏洞攻击目标主机系统,甚至控制该系统攻击其它主机。
  20. Since simulating chip multi-processor needs vast FPGA resource, we use software memory buffer technique to store data in the host computer, reduce the occupation of FPGA resource.
    片上多处理器的模拟需要大量的FPGA资源,我们使用软件实现的存储缓存机制可以将数据缓存到宿主机器上,有效调节FPGA资源。
  21. Thus, heap-based buffer overflow is concluded to be caused by tampering of the critical data in the heap or injecting malicious code into the heap-based buffer to destroy computer systems.
    总结出堆缓冲区溢出是因为攻击者对堆中的关键数据进行篡改,或向堆缓冲区中注入恶意代码,以破坏计算机系统。
  22. Multithreading synchronous execution and cyclic utilization buffer mode are applied firstly in the image reconstruction of Fourier-domain OCT. In the procedure of image reconstruction, two threads of hardware acquisition and data processing are proceeding synchronously and two buffers with the same size are assigned in computer memory.
    在OCT图像重建过程中,使硬件采集过程与数据处理过程以双线程的方式同步进行,在内存上划分出两个同样大小的缓冲区。