网站首页  词典首页

请输入您要查询的英语单词:

 

单词 Descriptor
例句
1. Good descriptors for any able library media specialist, too, are they not?
2. In all cases the module descriptors are free-standing with clear indications of entry level.
3. Terminology Several descriptors are typically used in evaluating neural network implementations.
4. Cigar Box: Another descriptor for a cedary aroma.
5. Together this information forms a segment descriptor.
6. Each field descriptor is preceded by a ':' character.
7. The Security Descriptor Propagator has successfully terminated.
8. Describe the purpose and semantics of the deployment descriptor.
9. The Security Descriptor attribute could not BE read.
10. The EJB deployment descriptor is complex and error prone.
11. The length of data currently represented by a descriptor.
12. To share connections, set the res-sharing-scope deployment descriptor shareable.
13. The Security Descriptor attribute could not be read.
13. is a sentence dictionary, on which you can find good sentences for a large number of words.
14. There is only one parameter block descriptor for every parameter block.
15. The length of descriptor is set to reflect the new data.
16. An invalid QOS flow descriptor was found in the flow descriptor list.
17. Geologists seem to stumble on some of the really oddball animals, assigning them delightful descriptors.
18. To avoid receiving a huge list, the user should use good word descriptors to narrow the scope of the search.
19. Look at the various categories with them and show them the lines where they can add their own descriptors. 4.
20. Immortalized by the soldiery in the war of 1914-18, Fred Karno's Army lives on as a descriptor of chaotic organization.
21. The nature of the variable is best explained by reference to the relevant descriptors in Table 8.2.
22. This information base is then manipulated using a font descriptor file to generate a particular font.
23. Centres should ensure that assessment procedures being used are valid and reliable and in accordance with the information contained within each module descriptor.
24. For every one hundred or so lines of Java code, you can expect to generate at least three times as much supporting J2EE descriptor code to get the job done.
25. We studied the problem about the design of disturbance decoupling observer with LTR based on non-regular descriptor linear systems with unknown inputs.
26. As one of the two information retrieval languages, it consists of keyword language, system of subject heading, descriptor indexing.
27. With this method, texture feature vector cloud is generated backward after fuzzily processing descriptor of textures.
28. Each of the disks in the volume group has management data, including a volume group descriptor area and a volume group status area.
29. For this, you use the service element already introduced in the persistence bundle's Blueprint descriptor.
30. It can, however, be passed as an argument type for functions which need to both modify and access descriptor data.
31. Gross shape features as well as corresponding edge-set of individual object are stored in an object record that acts as an object level descriptor.
32. When you install LILO using the /sbin/lilo command, it automatically generates this file, which holds the descriptor table (among other things).
33. Shares the memory descriptor and all Page Tables ( see Chapter 9 ).
34. In the deployment descriptor file web.xml, shown in Listing 10, you map the URIs with relative root path /* to the Wink servlet org.apache.wink.server.internal.servlet.RestServlet.
35. A reference was made to a segment not present in memory (one in which the Segment-Present flag of the Segment Descriptor was cleared).
36. Hand area is segmented based on skin color model, then the hand contour is described by use of Fourier descriptor.
37. In place of interrupt vectors, protected mode used a set of 256 interrupt descriptors that are stored in an interrupt descriptor table (IDT).
38. J2EE application components can use this deployment descriptor element to indicate whether a connection to a resource manager is shareable or unshareable.
39. The MDB only handles messages that have the JMSType header field set to package_received (this is defined in the MDB's deployment descriptor).
40. For the sake of using the research of normal systems easily, descriptor systems are changed into normal systems by using Jordan decomposition of matrixes and their observability is hold on.
41. In the shape analysis of stress surface contour of 3D footprint, the consistency of datum plane cannot be strictly controlled, so a descriptor insensitive to perspective transform is needed.
42. The destination name in the deployment descriptor serves as an overriding mechanism.
43. This paper discusses robustness analysis for a class of nonlinear descriptor systems.
43. try its best to collect and create good sentences.
44. A file descriptor would be signalled when new data were inserted to awaken the X server, and the X server could also directly examine the queue indices which were stored in the shared segment.
45. With dnotify, the file descriptor pins the directory, preventing the backing device to be unmounted, a particular problem with removable media.
46. In this paper, a method for objects shape description based on chain code and Fourier descriptor is proposed and its properties are explained and verified by experiments.
47. Notice that the only symbol definition that is exported globally is the official procedure descriptor.
48. For example, there is one layer of default preferences defined by the portlet deployment descriptor.
49. A word, symbol, or number used as a descriptor for retrieval of information from a collection, especially in a coordinate indexing system.
50. All the securable resources have a better than null security descriptor.
51. A field descriptor specifies the exact type of a field defined within a class.
52. The length of descriptor is changed to reflect the extra data.
53. A new method for CBIR based on shape Fourier descriptor is presented.
54. The circular region F-norms in low frequency band of wavelet transform is used as color feature of the image and the energy ratio of high frequency band is used to form texture descriptor.
55. If you specify NULL value, the event object is created with default security descriptor.
56. This paper presented spatial relation descriptor based on metric matrix's eigenvalue which was invariant under translation, scaling and rotation.
57. The eagle-eyed reader may have spotted that we supplied an image descriptor directly to the action.
58. A non-data descriptor is, in a sense, often a fancy name for a method -- but the particular method returned by descriptor access could be determined at runtime.
59. A security descriptor is not in the right format ( absolute or self - relative ).
60. Security descriptor should be in the self - relative mode.
61. Gets a custom type descriptor for the given type and object.
62. Technique based on shape identification is using geometry constants, fourier descriptor, wavelet descriptor and so on.
63. Fourier descriptor based digital watermarking method is proposed for 2-dimensional Engineering drawings.
64. A 3D model similarity matching algorithm based on spherical harmonics descriptor is proposed in this paper.
65. You can obtain the statistics from the table descriptor of the table node in the underlying access path graph.
66. A single selector and segment descriptor can be placed in the global descriptor table that identified the first 1M byte of memory as that interrupt segment.
67. Fourier descriptor is an important method used in shape analysis and recognition.
68. A V2 message descriptor is generally equivalent to using a V1 message descriptor and prefixing the message data with an MQMDE structure.
69. HttpRequestHandlerServlet represents the only servlet used by Blether from the perspective of the Web descriptor.
70. It also decreases the likelihood that a maintainer will insecurely use the file name (they need to use the file descriptor instead).
71. We use the term descriptor, for the " value part of the symbol table element ".
72. Theoretically, every known odorant molecule could have an agreed descriptor.
73. The concepts of event, event descriptor,(http:///descriptor.html) and trace are defined.
74. As one of the two information retrieval languages language , system of subject heading, descriptor indexing.
75. The maximum length of data that a modifiable type descriptor is capable of holding.
76. Firstly, the contour of each texture primitive is extracted from an image and its Fourier descriptor is calculated.
77. This creates duplicates that appear when selecting a build descriptor to generate Java or COBOL code.
78. Another change is the introduction of TLS (Thread Local Storage) system calls, which allow for the allocation of one or more GDT (Global Descriptor Table) entries that can be used as thread registers.
79. To use a given segment descriptor, its value is loaded into one of the segment registers.
80. Sets up a provisional Interrupt Descriptor Table ( IDT ) and a provisional Global Descriptor Table ( GDT ).
81. The Security Descriptor Propagator is waiting for a propagation event.
82. They declare the parameter with the same global name in their portlet.xml deployment descriptor.
83. Each time a segment selector is loaded on to segment registers, the corresponding segment descriptor is loaded from memory into a matching non-programmable CPU register.
84. The stabilizability problem for descriptor systems by static output feedback is studied.
85. The only exceptions are spells and spell-like abilities that have the force descriptor and abjuration spells that affect ethereal beings.
86. It also discusses opening queues, the message descriptor, and techniques for controlling message retrieval.
87. A blank field descriptor is a descriptor to make blank on output.
88. The broker type is selected through a configuration parameter set in the Web deployment descriptor file, web.xml.
89. A singular linear quadratic problem for discrete - time descriptor systems is studied.
90. The problems of regularization, freeness of impulse, stability and pole-placement of general descriptor systems(GDS) are studied by using dynamic compensation.
91. This hash map associates the field descriptor string for a generic class without any parameter types to the GenericTemplate for that class.
92. However, you are free to also specify the JNDI name of the destination, in which case, the destination name you specify in the deployment descriptor overrides the one in the activation specification.
93. For example, the addition of Message descriptor extension (MQMDE) starting with V5, and Embedded PCF header (MQEPH) starting with V6.
94. In protected mode, which register references the descriptor for the stack segment?
95. Moreover, compared with classical spatial relation descriptors such as geometric method and map matching method, this descriptor could describe image better with lower computation.
96. The transaction-attr, isolation-level, run-as-mode, and re-entrant are taken directly from Sun_s XML EJB deployment descriptor format.
97. After setting up the deployment descriptor, you can deploy the Books service to Tomcat.
98. Based on the notion of generalized regularity, the generalized inverse form of a rectangular descriptor system is proposed.
99. Other than segment descriptor numbers, the contents of these registers are inaccessible to all software.
100. A recipient matched more than one of the recipient descriptor structures and MAPI_DIALOG was not set.
101. The Security Descriptor Propagator has been notified of waiting propagation events.
102. Call instruction calls the method indicated by the method descriptor passed with the instruction.
103. The code in bold in Listing 1 shows how the portlet deployment descriptor code is modified by the event wizard.
103. Wish you can benefit from our online sentence dictionary and make progress day by day!
104. Problem loading the descriptor table, most likely due to a corrupt descriptor table.
105. As the behavior of digital system can be fully described by the register transfer level (RTL) behavior descriptor, so RTL synthesis has become the mainstream design method in EDA domain.
106. The J2EE specification defines a deployment descriptor attribute that specifies the transaction isolation level for a given EJB method.
107. In order to update a segment register, the corresponding segment descriptor must be modified in kernel memory and then reloaded into the segment register.
108. You later discovered that lsof shows the file descriptor of a process and the associated file name.
109. A segment including the default Local Descriptor Table (LDT), usually shared by all processes (see the next section).
110. Gets a custom type descriptor for the given type or object.
111. To get a color descriptor that is robust to illumination and has the color constancy function is very important for the entire computer vision system.
112. Save the deployment descriptor for the Web service client implementation module.
113. order -- enforces execution order in an environment where multiple descriptor files are present; each extension generator and extension handler can have an execution order associated with it.
114. The extent of the regions was determined by the descriptor basicity.
115. Based on the investigation, the vector descriptor is fit to characterize the structure of dipeptides and predict their biological activity and has the merit good correction and simple calculation.
116. The interrupt descriptor table is located at any memory location in the system by the interrupt descriptor table address register (IDTR).
117. There is no need to have each agent maintain its own file descriptor table.
118. Creating a service using the adapter includes creating a service class with the service descriptor that represents the SOAP service.
119. Unlike poll(), the pollset interface does not require the selector to copy the entire file descriptor set each time when select() is called.
120. If the field does not have a signature, visitField() just gets the type information from the type directory using the field descriptor string.
121. In any case, a data descriptor is more general, so I'll show you one.
122. If lpProcessAttributes is NULL or lpSecurityDescriptor is NULL , the process gets a default security descriptor.
123. The decentralized state feedback controllers are designed using linear matrix inequalities (LMI) such that the well working order descriptor systems are asymptotical stabilization.
124. A segment descriptor provides the base address of a segment and access rights, type , and usage information.
125. Unable to find a valid security descriptor reference domain for this partition.
126. Experiments demonstrated that the color block co-occurrence matrix descriptor considerably improves the retrieval performance and can combine the feature of color and texture effectively.
127. Enhydra requires that the XML deployment descriptor contains a finder-method-jdbc-mapping element matching the finder methods declared in the EJBHome etc.
128.
129.
130.
随便看

 

英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。

 

Copyright © 2000-2024 Suppus.net All Rights Reserved
更新时间:2024/12/22 9:59:12