网站首页  词典首页

请输入您要查询的英语单词:

 

单词 Data access
例句
1. SmartStream provides data access, distribution, presentation and development functions for managing purchasing, asset management and manufacturing systems.
2. Data access is the least volatile of all.
3. NET data access technology to provide services to client.
4. VDAM? Virtual Data Access Method?
5. This wizard automatically creates a columnar data access page.
6. Packet Data Access point will be displayed, press Select.
7. The data access domain model of methods for external data usage.
8. Applying the Data Access Object (DAO) pattern throughout the applications enabled us to separate low-level data access logic from business logic.
9. Data access developers who develop these data-oriented applications can attest to the fact that it typically requires wrapping DML (data manipulation language) statements in a fair amount of code.
10. After analyzing the data access characteristics of LSB, we present a Segmental Hybrid Data Layout (SHDL) scheme to be used in multi-node video servers.
11. This is the data access method that provides transactional integrity -- updates, deletions, and insertions are coordinated with the rest of the message flow.
12. Applications that follow this data access pattern are well-suited for SDO.
13. Based on the policies of spatial data access control to construct the model of spatial data access control.
14. Often, data access APIs such as JDBC and JPA provide only very generic information about the exception condition, and do not allow the specific cause to be effectively identified.
15. NET ( A data access model ), XML ( Data exchanged technology standard ) and Microsoft Message Queue Service mechanism.
16. General data access engine as an extension of ADO. NET.
17. Yet there are reservations about this approach to data access.
18. Aim at the characters of spatial data access control, the concept of spatial region access control based on spatial index was proposed.
19. You always need to persist (or store) data in an enterprise application, and writing data access and retrieval code is a pain.
20. I can build a simple stub that has an array list as a property, then implement some simple data access methods quickly, as Listing 2 shows.
21. For updates to and news about OLE DB, see the Universal Data Access site at.
22. If it is not practical in your application to use data source controls, you can code data access yourself using ADO. NET classes.
23. Figure 7 shows the critical portion of our example Data Access Object (DAO) code, demonstrating how to retrieve and reconstitute ACL information from strings stored in a properties file.
24. Since PDQ priority uses more threads to process a query than the normal way, it will shorten data access time.
25. The Company shall be entitled to charge a reasonable fee for processing of data access request.
26. The first two articles of this series described in detail how to use inline methods and how to use data access object interfaces (DAOs) to access the database.
27. This paper describes the system's speech function, dialogue management and data access.
28. BasicAclProvider : Retrieves access control lists ( ACL ) entries for domain object instances data access object ( DAO ) .
29. Using the service primitive defined in WIM provision, the interface of data access out of WIM enabled IC card can b...
30. In the application shown in Figure 2, the GUI relies on an abstraction -- a data access object or DAO.
31. Placing the data manipulation logic into a data access service or procedure makes the business logic less dependent on the source of the data.
32. The change to any of these parameters will only impact the data service code and will not force every single consumer to change their data access logic.
33. Using the service primitive defined in WIM provision, the interface of data access out of WIM enabled IC card can be designed. Depending on ...
34. This paper describes in detail two commonly used methods of network data access: Server Message Block (SMB) and Network File System (NFS). It also makes a comparison between them.
35. Data access technologies should be amenable to this separation of concerns.
36. We'll begin with a review of the Data Access Object pattern.
37. Part 3 is particularly important because, when combined with this article, it illustrates round-trip data access between relational databases and XML.
38. Crack open example 4, which shows a CommandLineView object with a property for a RentaBike store, which eventually becomes the data access object for this application.
39. This data access object is extremely simple; it does not connect to any external resources (such as relational databases) to obtain Test instances.
40. Integrating with firewall, IDS and IP tunnel, the system constructs secure environment of data access control and data transmission.
41. At the same time, this service uses the lightweight persistence service as server-side data access method, thus the lightweight character is kept, which satisfied the mobile client's requirement.
42. OPC applies OLE (Object Linking and Embedding) technology into Industry Process Control Fields, and provides a kind of standard data access method.
43. The tool includes five modules: data access module, metadata management module, data superaddition module, task management module and data transform, loadable module.
44. The model has been successfully applied to the Scientific Instruments Sharing Service Platform of Yunnan and greater data access control capabilities are achieved.
45. The authorization and access request rules and constraints of spatial region access control were defined, and the method of spatial data access control was described in detail.
46. NET data access, object - oriented software development methods and three layers architecture etc.
47. This paper illustrates several data access method such as ADSL /VDSL, Ethernet, IP WLL, LMDS, Wireless mobile etc and also makes some analysis and comparison of their characteristics.
48. Demo . DataAccessLayer - the library containing the data access implementation code.
49. The concept of a consistent data access strategy certainly opposes the notion that each business requirement needs to be matched to an optimal data access method.
50. The product has a two-pronged goal: decrease the data access request time as well as the load on DB2 from Java access.
51. pureQuery can help you code data access in a way that helps optimize performance.
52. Finally, the writer expects the market trends and the predictive of statistical analysis system of wireless data access, and puts forward development proposals.
53. The alternative is to develop a Universal Data Access solution.
54. In addition(Sentencedict), it provides a simple mapping and API layer that lets developers quickly develop data access code.
55. Use a Data Access Object (DAO) to abstract and encapsulate all access to the data source.
56. This paper describes a lightweightauthorization service developed to solve this problem in the project requirements: data access control service (DACS).
57. Programmers can work transparently with data from these various sources, relying on DB2 II's global query optimizer to select an efficient data access strategy for such work.
58. The system structure is a multilayer system structure with five layers. They are user interactive layer, system program interface layer, mining core service layer, data access layer, database layer.
59. Grid-oriented data visualization shares geographically distributed data sources, analysis facilities and visualization facilities, and also supplies transparent data access capabilities.
60. Batch and query applications typically do a lot of sequential processing, while data access for OLTP tends to be more random in nature.
61. RDBMS designers concentrated on optimizing I/O and tried to align the data access patterns with the block structure imposed by the drives.
62. It provides strongly-typed LINQ data access experience over relational databases, including direct, efficient access to SQL Server.
63. The third part is of vital importance in query tuning, because it provides us with a great deal of useful information, such as the data access method and the join method that the query used.
64. In contrast, a unified data access mechanism provides an application programmer with a single point of connection to all of the enterprise's data assets.
65. What step should you take to speed up the data access?
66. The real - time database and history database are both provide open data access interface for other processes.
67. DAFS can make it possible to shorten data access path effectively through RDMA technology, make data access faster and improve the access speed performance in NAS appliance.
68. To enhance performance of discontiguous data access, a new high performance I/O method has been created: the user-defined file view and combination I/O requests.
69. In one embodiment, the method includes the detection of a data access request to VDD memory implemented within volatile system memory.
70. If the application uses a DAO (data access object) with dynamic SQLs and stored procedures, the value object that is passed to DAO can be declared as a cloud resource using annotations.
71. Another unique architectural feature is the memory system which allows an instruction fetch and at the same time a data access by each individual core at every single clock cycle .
72. The techniques involved in implementing an EAz data access object to persist and retrieve permissions.
73. Assume slower random data access rather than fast sequential access.
74. Therefore, as DB2 Connect acts as a federation layer, it can perform predicate push-down or branch-tree elimination to speed up data access.
75. Data Access Object (DAO) and Session Facade are both good ones to use.
76. Any product selected should maximize a data mart's potential for amplifying the impact of direct data access by providing the greatest degree of effortlessness.
77. This special architecture greatly promotes execution efficiency of boundary-crossed and block data access operations often found in multimedia processing.
78. I encourage you to check out the Morphia Google Code project for information about its data access object (DAO) support, validation, and manual mapping capabilities.
79. Figures 1, 2, and 3 show how easy it is to create a pureQuery data access layer for the credit card table on Oracle.
80. It can reduce data redundance and improve data access efficiency.
81. Create a data access page by specifying the record source, controls, and control properties.
82. SQL ( Structured Query Language ) is a standard data access language used to interact with relational databases.
83. A data access object (DAO) that uses JPA is packaged with a persistence.xml that defines persistence context for the JPA EntityManager used by the application.
84. Meantime,() the basic conditions of the used CPLD chip are introduced too. In the end of the main routine for the data access based on the CPLD design is presented.
85. The data access method you choose may very well impact other aspects of your site or list implementation.
86. Some problems such as real-time data access, history data compression and enterprise information organization are solved in the system.
87. A Java return type for each method declaration which indicates the desired object format or type for the pureQuery runtime to return data access results to the caller.
88. XQJ is a generic XQuery data access framework, which provides a uniform interface on top of a variety of different XQuery implementations.
89. With this architecture, DSL gets invoked for every data access operation or transaction initiated by a business service.
90. For those developers who want to use the data access layer generation capabilities pureQuery provides, pureQuery includes support for the standard Data Access Object (DAO) pattern.
91. For example, the transfer object, business object, and data access object templates may be applied to each entity in the PIM.
92. If your storage requirements are rapidly outpacing your IT budget, you probably need to simplify your data access strategy while holding the line on staff.
93. Under IDMS, the access to system products is controled by means of a data dictionary, and data access is controled by subscheme, so as to protect IDMS data base accessed from unauthorized users.
94. Part of that leap is due to the fact that RAM simply provides faster data access than hard disk drives.
95. Multiple file servers can be mapped to the same name, thus providing redundancy and locality of data access.
96. Filter By Selection: A technique for filtering records in a form, datasheet, or data access page in which you retrieve only records that contain the selected value.
97. Data access module utilizes storing process to visit database which return error code or XML file.
98. Physical class and attribute structure of system interfaces (which will equate to database structures where direct data access is the best or only option).
99. While in content addressable memory (CAM)(/data access.html), data access is based on data itself.
100. In this thesis, we illustrate the intractability of several fundamental problems related to peer-to-peer data access in wireless ad-hoc networks, even under a rather simplified scenario.
101. Through on-site survey, interviews, data access, quantitative and qualitative analysis of the ideological and moral status graduate.
102. Free-form Data Access: The free-form data access pattern is used to persist CMP beans to a datastore not supported by any of the templated patterns described above.
103. The goal of the Data Access Object pattern is to provide a single point of contact to a particular data source.
104. Using the service primitive defined in WIM provision, the interface of data access out of WIM enabled IC card can be designed. D...
105. A new data access method based on the file system of the OS is described in the paper.
106. The cryptography technology based on the private or public key can be used to control the data access and change the straightforward information into the baffling cryptograph information.
107. The numerous overloads for each data access method have been reduced.
108. You can refactor the code to isolate the data access functions into a separate file as homework.
109. This provides a callback mechanism to surround generated data access code with specialized processing.
110. DSL includes data control layer ( DCL ) , data expression layer ( DEL ) and data access layer ( DAL ) .
111. Using the service primitive defined in WIM provision, the interface of data access out of WIM enabled IC card can be designed.
112. SDAI is the standard data access interface of STEP. It defines a functional interface between an engineering application and one or more collections of data described using EXPRESS.
随便看

 

英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。

 

Copyright © 2000-2024 Suppus.net All Rights Reserved
更新时间:2025/3/14 16:07:11