In addition to their use in designing new systems, sequence diagrams can be used to document how objects in an existing ( call it "legacy") system currently interact. 序列图除了在设计新系统方面的用途外,它们还能用来记录一个存在系统(称它为“遗产”)的对象现在如何交互。
So, create a Flow activity in which two sequence activities run in parallel, and each Sequence activity prepares the call, invokes the Web service of the supplier, and processesnot the result. 因此,创建Flow活动,两个序列活动将并行运行,且每个Sequence活动都准备好调用,调用供应方的Web服务,并处理结果。
To a large degree, the return sequence of an XQuery function depends exclusively on the parameters with which you call it. 在很大程度上,一个XQuery函数的返回序列只取决于调用该函数时使用的参数。
In this article, review and study detailed information about the TCP call sequence, including references to FreeBSD and important function calls that occur in the TCP stack after a system call at the user level. 在本文中,将回顾和学习关于TCP调用序列的详细信息,其中包括对FreeBSD的引用,以及在用户级进行系统调用后在TCP堆栈中发生的重要函数调用。
When checking a long sequence of expectations, you can capture the results or arguments of one method call and compare it to the value passed into another method call. 在检查一系列预期时,可以捕捉一个方法调用的结果或参数,然后与传递给另一个方法调用的值进行比较。
The sequence in which these phases are called also tells you something about when you shouldn't call them. 调用这些阶段的次序还向您透露一些信息,即什么时候不能调用它们。
It stores information as a sequence of chemical building blocks ( nucleotides) we call A, C, T, and G ( for adenine, cytosine, thymine, and guanine in DNA, and uracil replacing thymine in RNA). 它将信息存储为化学基本成分序列(核苷),我们将其称作A、C、T和G(表示DNA中的腺嘌呤、胞嘧啶、胸腺嘧啶和鸟嘌呤,以及RNA中的尿嘧啶代替胸腺嘧啶)。
At an overall level this is an asynchronous sequence, since the first attach() method call goes in one direction. 从全局层次上来看,这其实是一种异步序列,因为开始的attach()方法调用是朝着一个方向的。
All that remains is to set up a key sequence(; s in this example) to call the ToggleSyntax() function 剩下的工作就是设置一个关键的序列(本例中为;s)来调用ToggleSyntax()函数
This way, when a drag-and-drop sequence ends, you can call the restore() function to put things back the way they were before the drag-and-drop sequence started. 这样一来,当拖放过程结束后,就可以调用restore()函数,恢复到拖放过程开始之前的状态。
The term dial peer is sometimes used in reference to a program that matches a specific dialed sequence of digits to an addressable call endpoint. 拨号点这个术语有时也是指一个程序,其特定的拨号数字序列与一个可寻址呼叫端点相匹配。
A stack probe is a sequence of code the compiler inserts into every function call. 堆栈探测是编译器插入到每个函数调用中的代码序列。
How to extract sequence patterns of system calls is an important research topic of system call based intrusion detection approaches. 在基于系统调用的入侵检测研究中,如何提取系统调用序列模式是一个重要问题。
From this bird's eye view, you can understand that this time span is composed of a sequence of what many on your planet call Grand Cycles. 从这个鸟的眼睛视图中,可以明白,这时间跨度是一个什么样的星球上的许多呼叫大循环序列组成。
Shows call context: In the sequence diagram when the mouse is hovered over a call, the tooltip shows the call context-the call argument and the return value. 显示调用上下文(callcontext):在序列图中,当鼠标在调用(call)上悬停的时候,就会弹出提示框,显示出调用上下文&调用方法的参数和返回值。
The controlled system is described by a Markov chain whose statistical property depends on the sequence of decisions that we call a policy. 我们称决定序列为决策。
Sequence analysis to system call sequences is an important method in intrusion detection, for most of the system intrusions are conduced by illegimate or irregular system calls to operation system. 大多数的入侵行为是由于一系列操作系统内部的非法或异常调用引起的,因此对系统调用序列进行分析是入侵检测的一个重要方法。
The system has several main characteristics: modular design, taking full advantage of the computer's interfaces, offline programming and control online, arranging process sequence automatically, remote procedure call of robot functions. 系统主要特点:模块化设计、充分利用计算机接口、离线编程在线控制、自动编排加工顺序、机器人函数的远程过程调用。
The technique of intrusion detection based on sequence of host system call mainly focused on the data set of host system call, which is the kernel function of an operating system. 基于主机系统调用序列的入侵检测技术,是针对主机系统调用数据进行监测的一种安全技术。
Since the hacker's behavior is completed by process calls, and a sequence of system calls gives a stable signature for a Linux process, behavior of the processes can be explored by analyzing the system call sequences; 由于入侵者在目标主机中的任何行为都是通过进程的执行来实现的,而Linux进程可以由一系列的系统调用短序列来表征,通过分析其系统调用短序列可以了解进程的行为模式;
According to rough set a detection model is built based on short call sequence and used to detec call sequences of sendmail program. 利用粗糙理论,建立了系统调用短序列的检测模型并应用于sendmail调用序列检测。
This cognitive sequence coincides with cognitive economy, which I will call cognitive preference. 这种认知顺序可称之为认知优先选择。
Due to the host intrusion detection using the system call sequence as dataset, it is important to analyze the cross-correlation of this system call sequence. 由于基于系统调用的入侵检测系统的数据源是系统调用序列,所以应用序列的一些特性来分析这些看似无规律的数据有重要意义。
Different with sequence analysis of system call, user behavior analysis mainly related to legitimate users of illegal or misuse operation mode. 与系统调用序列分析不同的是,用户行为分析主要涉及到合法用户的非法或误操作模式。
In the sequence chart, we can see the call module class and the information returned. 在时序图中,可以看到调用模块类以及返回的信息。