computing terminal

英 [kəmˈpjuːtɪŋ ˈtɜːmɪnl] 美 [kəmˈpjuːtɪŋ ˈtɜːrmɪnl]

网络  计算终端

计算机



双语例句

  1. Auto-adapted Design about Multi-way Information Transmission of Mobile Computing Terminal
    移动计算终端多途径自适应的信息传输设计
  2. Since the computing power and storage space of mobile handle terminal were very poor, this paper introduced a mobile payment system based on elliptic curve cryptosystems.
    针对移动手持设备处理能力和存储空间较弱的限制,提出了一种基于椭圆曲线密码体制的移动电子支付系统。
  3. Model of Computing Terminal Information Entropy in the Application of Anti-warship Missiles
    反舰导弹作战过程中终端信息熵计算模型
  4. Mobile terminal is an important part of pervasive computing terminal.
    移动终端是普及计算终端的重要内容。
  5. Reliability preserving reduction method for computing K terminal reliability of networks used in this paper is one of method of computing networks reliability.
    可靠性保护缩减的方法是计算网络可靠性的常用手段之一,而且关心哪类网络的可靠性存在线性时间算法。
  6. A Method of Computing Input and Output Resistance ( or Impedance) in Two Pairs Terminal Network Containing Controlled Sources
    含受控源四端网络输出和输入电阻(阻抗)的一种计算方法
  7. The PoweR Management Technology of Pervasive Computing Terminal
    普及计算终端设备的电源管理技术研究
  8. The dissertation points out that Web based Browser/ Server computing model will be the trend of applied software on the ground of the analysis and comparison of computing models of Terminal/ Host, Client/ Server and Browser/ Server.
    本文在对基于终端/主机、客户机/服务器和浏览器/服务器计算模型分析比较的基础上,指出基于Web的浏览器/服务器计算模型应是应用软件开发的主流。
  9. In order to meet the demand, this paper researched and designed production supervisor control system configuration based on Web Services distributed computing technology in digital gas field, which combined mobile-terminal, remote-web with remote production centralized supervisor control in effect.
    为此,进行了WebServices分布式计算技术在数字气田生产监控系统结构中的研究设计;
  10. With higher computing speed and stronger storage ability, the development trend of 3G terminal will be the application of more abundant data services such as video communication, on-line browsing, instant communication, interactive game, high-speed downloading etc.
    3G终端的发展趋势将主要支持如视频通信、在线浏览、即时通信、互动游戏、高速下载等更多种类和更丰富的数据业务应用,计算速度更快,存储能力更强。
  11. A K-Tree Algorithm for Computing K-Terminal Reliability in Networks
    计算网络K-终端可靠性的一种K-树拆法
  12. By computing its terminal value, the model gives a fair price of European option-Black-Scholes formula independent on every investor 'risk aversion.
    公式,给出了期权价格满足的BlackScholes方程,通过求解BlackScholes方程的终值问题,给出了一个独立于每个投资人风险偏好的欧式期权的公平价格BlackScholes公式。
  13. A Progressive Geometry Simplification Method for Mobile Computing Terminal
    面向移动计算终端的渐进几何简化方法
  14. At the time of information, the Internet has already become a necessary part of our lives, but the following problem is the security of Internet, this paper introduces a kind of Trusted Computing Terminal based on TCG.
    信息时代,Internet已经成为我们生活工作不可或缺的组成部分,而随之而来的就是Internet的安全问题,本文介绍一种基于TCG构建的可信计算终端。
  15. Through the introduction of the concept of connector layer, the mobility of computing terminal is shielded.
    通过引入接入代理层的概念,屏蔽了计算终端的移动性;
  16. Because of the energy consumption limitation of modern embedded computing terminal, the reasonable policy for the dynamic power management ( DPM) must be used.
    由于功耗的严格约束,现代嵌入式计算终端必须采用科学的动态功耗管理策略。
  17. Trusted computing technology can provide terminal device authentication, data integrity verification, hardware protection of critical information, data encrypted storage and some other security features.
    但现有信任模型仍然存在一些不足。可信计算提供了终端设备认证、数据完整性校验、重要信息的硬件保护、数据的加密存储等一些安全功能。
  18. With the study on Trusted Platform and TPM, Trusted Computing technology can be used in PMAS terminal.
    通过对可信平台、可信平台模块的研究,为可信计算技术在PMAS终端上的应用打下基础。
  19. Then the following problems are investigated: the menace of the collision attack to hash function, the littleness of computing resource in MAS terminal, the group key management in MAS system being suited by concentrated key management, not distributed key management.
    然后针对存在的下列问题展开研究:哈希函数的碰撞攻击威胁;MAS终端计算资源少,MAS系统中的组密钥管理宜采用集中式密钥管理,不适合采用分布式密钥管理。
  20. With the developing of cloud service market, and there are more and more enterprises engaging in cloud computing R& D, service, network infrastructure and terminal equipment manufacturing.
    随着云服务市场的发展,越来越多的企业从事云计算研发、服务、基础网络设施提供和终端设备的制造。
  21. The presentation of trusted computing provides a new solution to the research of wireless terminal accessing security.
    可信计算的提出为无线终端接入的安全性研究提供了一个新的解决思路。
  22. This has important significance in providing intelligent service by solver, controller and computing terminal under diversity conditions. ( 3) The organization and application method of Linked government dataLinked semantic data are widely used in semantic search and personalized recommend intelligent service.
    这对于解决器、控制器和计算终端的多样性条件下提供智能服务具有重要意义。(3)关联政府数据组织的系统架构和数据处理技术关联语义数据广泛应用于语义搜索和个性化推荐等智能服务。
  23. Recent years, trusted computing, regarded as the fundamental resolution to terminal security, is getting interests of all the countries in the world. TCG introduces TPM as the trusted computing base and establishes a series of technical specifications on trusted computing.
    近年来,可信计算技术被视为解决终端安全问题的根本技术出路而备受世界各国的重视。
  24. And trusted computing not only improve the credibility of the terminal computing environments, but also extend trusted environment from operating system to the network, forming a trusted network connection, named TNC technology.
    在可信计算技术的应用中,不仅可以使用它来提高终端计算环境的整体安全性,同时还可以把可信计算技术与网络链接技术相结合,从而形成一种称之为TNC的技术。
  25. The researches on TC in this paper include: Firstly, based on Trusted Computing, a terminal information protecting scheme was proposed.
    本文对可信计算的研究包括以下内容:1.基于可信计算技术,提出了终端平台信息的安全保护方案。
  26. On this premise Trusted Computing Group put forward the concept of trusted computing, trusted computing because it is safe from the terminal to Cut is a solution to the traditional security issues, a new direction.
    在这个前提下可信计算组织提出了可信计算的概念,因为可信计算正是从终端安全来切入,是一个解决传统安全问题的新的方向。
  27. Through the design in security layer from these two aspects, The Trusted Computing in PMAS terminal finally comes true, and the security of PMAS system is ensured from source.
    通过以上两方面的设计,最终实现了PMAS终端的安全可信,从源头上确保了PMAS系统的安全可信。
  28. The new information system architecture based on "Cloud computing center+ broadband network+ multimedia thin client", includes embedded terminal system research, highly reliable cloud computing server cluster building.
    新的信息化模式采用云计算服务器+宽带网络+多媒体瘦客户端的系统构架,包括嵌入式终端系统研发、高可靠云计算服务器集群的建设。
  29. Nowadays, the system architecture of Vehicular Ad-hoc NETwork ( VANET) and is mainly divided into four parts: Sensor Networks ( WSN), wireless communication network, cloud computing platforms and users of vehicle terminal system.
    当今的车联网系统架构主要分为四个部分:传感器网络,无线通信网络,云计算平台和车载终端。
  30. The security features that Trusted Computing provides are: Terminal Authentication, Data Integrity Verification, User Authentication, User Rights Legitimacy, Port Control and Management, Data Encrypted Storage, and Hardware Protection of Critical Information.
    可信计算提供的安全功能有:终端设备认证、数据完整性校验、用户身份认证、用户权限合法性、端口控制和管理、数据的加密存储、重要信息的硬件保护等。