网站首页  词典首页

请输入您要查询的英文单词:

 

单词 tokens
释义
tokens是token的复数

token

美 [?to?k?n]
英 [?t??k?n]
  • n.标记;代币;纪念品;表示物
  • adj.作为标志的;象征性的
  • 网络令牌;记号;语言符号
复数:tokens  
adj. n.
token gift
n.
1.
象征,记号,标记;表示物,证物;纪念品;代币,代价券;【圣】前兆;暗号;【语】语言符号;【英史】私铸货币
adj.
1.
作为标志的;象征性的

例句

释义:
1.
The name of the function is always the first token in an S-Expression, and all of the other tokens are arguments to this function.
函数名总是S表达式的第一个记号,其它的记号都是该函数的参数。
audacity.sourceforge.net
2.
On three occasions the male monkey picked up tokens she dropped and inserted them into the slot and allowed her to have the food.
这只公猴三次捡起她掉下的代币,把它们塞进投币口,使她能够获取食物。
www.foodmate.net
3.
However, such general vocabulary takes up a little proportion of the total tokens produced by the subjects.
但是,这种概括性词汇在学生产出的总体口语词汇中只占一小部分。
202.119.108.211
4.
The activity rate is the ratio between the number of tokens currently assigned and the total number of tokens for an endpoint.
活动频率是指当前分配的令牌数和端点的令牌总数的比率。
www.ibm.com
5.
Uniqueness of tokens also results in an additional failure mode when attempting to connect a slot using a token that has already been used.
标记的唯一性也导致了额外的失败模式,如试图用一个已经被使用的标记连接一个插槽。
boost-doc-zh.googlecode.com
6.
This means that if yacc would have to read two tokens before it knew which action to take, it would be unable to parse this grammar.
这就意味着,如果yacc在知道采取哪个动作之前,必须读取两个标记,那么它将无法解析该语法。
www.ibm.com
7.
Whitespace can be inserted between any pair of tokens. Excepting a few encoding details, that completely describes the language.
空白可以加入到任何符号之间。以下描述了完整的语言。
www.open-china.net
8.
An admin must be able to view a report to see how many tokens have been given out and used on a per year, month, week or daily basis.
一个管理员必须能够查看报表,看看有多少令牌都被赋予了并在每年使用的,月,周或每日的基础。
www.bing.com
9.
Most of the sea folk passed their tokens up to the barges or tied them to the great funnel net being strung even now below the hulls.
大多数的海洋居民都把他们的信物交至驳船中,或把它们拴在船体下大漏斗形渔网上。
dictsearch.appspot.com
10.
Note that the tokens are opaque binary data, and only the underlying security mechanism needs to be able to interpret them.
注意,标志(token)是隐性二进制数据,只有底层安全性机制才需要能够解释它们。
www.ibm.com
1.
The monkeys also exchanged little tokens (in return for a bit of marshmallow) more often with the imitator than with the nonimitator.
猴子对模仿者的回应也比非模仿者多一些。
www.bing.com
2.
There are times when it seems as if God watches to see if we will give Him the abandoned tokens of how genuinely we do love Him.
有时候似乎神在看着我们,会不会愿意把一些小的礼物献给他,表明我们对他的爱有多真诚。
myutmost.wikispaces.com
3.
WBXML also allows for common strings to be reduced to tokens as well, with the token table sent as part of the document preamble.
WBXML也可以将普通的字符串缩减为标记,标记表则作为文档头部中的一部分传送。
www.ibm.com
4.
Furthermore, it is desirable that clients will not be able to predict the next tokens that they will get when accessing the site.
此外,理想的情况是,当访问一个站点时,客户不能够预测下一个他们即将获取的标识。
www.ibm.com
5.
Every application requires at least a token table to perform lookups, and often needs code to interpret the extension tokens as well.
每个应用程序都需要一张标记表来进行查找,通常还需要编若干代码来解释扩展标记。
www.ibm.com
6.
Tokens form what is known as the traversal operator, which indicates that you wish to follow a particular arc from each resource.
记号形成遍历运算符,它表示您希望沿着来自每个资源的特定圆弧遍历。
www-128.ibm.com
7.
First of all, the lifetime of tokens are not restricted to a single remote invocation, or to a single protocol.
首先,令牌的生存期并不局限于单个远程调用、或单个协议。
www.ibm.com
8.
Describes tracer tokens , which allow you to measure the performance of a transactional replication topology .
介绍跟踪令牌,跟踪令牌使您可以衡量事务性复制拓扑的性能。
www.bing.com
9.
Given the special syntax of the tokens, it is usually possible (and advisable) to derive this list by inspecting the package contents.
基于特定的符号语法,通常能够(并推荐)依据这个定制项列表对包内容进行检查。
www.infoq.com
10.
During two years of bartering prior to these experiments, failure to exchange tokens for food occurred in fewer than 5% of trials.
这些实验之前两年的物物交换中,石头换食物的失败比率仅有不到5%。
www.ecocn.org
1.
Here, the parser tests combinations of tokens to see how they compare to the abstract elements in its grammar.
在这里,解析器检测标记间的结合同其语法中的抽象元素的匹配程度。
www.ibm.com
2.
In reality, of course, most sites use the tokens issued by vendors as secure session identifiers, oblivious to the fact that this is weak.
然而实际上,绝大多数站点使用这个由供应商发布的标识作为安全会话的标识符,而忽略了它是有缺陷的事实。
www.ibm.com
3.
Since only LINE tokens can occur in a body, the next other token that shows up will be part of a header -- or a syntax error.
由于主体中只会出现LINE标记,所以出现下一个其他标记,表明这是标题部分——或者是一个语法错。
www.ibm.com
4.
WebSphere Application Server encrypts various user tokens (including the LTPA cookie) using what are known as the LTPA encryption keys.
WebSphereApplicationServer使用LTPA加密密钥加密各种用户令牌(包括LTPAcookie)。
www.ibm.com
5.
That's when you donate these tokens to the Museum of Broken Relationships, which opened this week in London.
那么你就应该将这些象征物送到破碎恋情博物馆;该馆本星期在伦敦开张。
www.bing.com
6.
Plain tokens, the earliest kind ofproto-writing, seem to have helped people keep track of harvests andherds.
简单的符号是最早的原型文字,似乎是在帮助人类记录下庄稼与牲畜的数量。
www.bing.com
7.
Put simply, Eclipse scanners convert characters in a Document range into a series of Tokens that hold arbitrary data Objects.
简单来说,Eclipse扫描程序将Document范围中的字符转换为一系列存有任意数据Object的Token。
www.ibm.com
8.
In terms of ATM withdrawals, credit card companies have done very well by mixing physical tokens with a password-based scheme.
就ATM的提款过程而言,信用卡公司通过混合物理标记和基于密码的方案来很好地完成任务。
www.ibm.com
9.
Tokens can also be used for transmitting security related information for a single remote call.
令牌还可以用于为单个远程调用传输安全相关的信息。
www.ibm.com
10.
Electronic tokens can be expensive, and must be carried by users at all times to ensure access.
但电子信物可能会很昂贵,而且为了保证能随时使用帐户,用户还必须老把它带在身上。
www.ecocn.org
1.
We may give flowers, candy and cards just like the world, but those tokens are expressions of a deeper love.
我们也有可能像世俗中一样赠送鲜花,糖果和贺卡,但这些东西只是更深层的爱的表现。
free1.activepower.net
2.
So everything costs one token, but as you can see, sometimes tokens buy more than others, sometimes more grapes than others.
每样东西都花费一个代币,但有时代币可比别人买的更多,有时候可以买到更多的葡萄。
www.yyets.com
3.
In a reference table when no other tokens are present in that column or any other column in the row.
例如,如果该列或行中的任何其他列中都没有任何其他标记,则。
msdn2.microsoft.com
4.
I could see a card like this being played in a Constructed deck that wanted to swarm the table with tokens.
我可以预见到那些使用大量衍生物的构筑套牌中会出现他的身影。
www.bing.com
5.
In the last step of the evaluation, the remaining tokens from vector are joined in a string and displayed on the screen.
在求值的最后一步,向量中剩余的符号被结合到字符串,并在屏幕上显示。
www-128.ibm.com
6.
Use printf tokens for dynamic content in a full sentence rather than breaking up the sentence into multiple strings.
在完整的句子中使用printf标记来标记动态内容而不要将句子分割为多个字符串。
www.ibm.com
7.
During the transmission, the tokens are serialized and, preferably, encrypted as well.
在传输过程中,对令牌进行序列化,最好同时进行加密。
www.ibm.com
8.
Using a larger number of tokens, it is far more likely that the total numbers will be much closer to the specified 50% for each output.
如果使用更大数量的令牌,则对每个输出,令牌总数更可能接近于指定的50%。
www.ibm.com
9.
The core of WS-Trust is a set of messages used to issue, renew, cancel, and validate security tokens.
WS-Trust的核心是一组用来发出、更换、取消以及验证安全令牌的消息。
www.ibm.com
10.
Each woman creates in her own likeness the love-tokens that are offered to her.
每个女人都是按她自己的模式来塑造所得到的爱的象征。
dict.veduchina.com
1.
It was strange to me why we were not allowed to buy rice, flour and sugar without these little blue, orange and yellow tokens.
当时我觉得很奇怪,如果没有这些蓝色、橙色和黄色的代币券,为什么就不能买米、面粉和糖呢?
edu.sina.com.cn
2.
Nonetheless, those alternative tokens that aren't lexical keywords are colloquially known as "digraphs" .
虽然如此,这些不是要害字词汇的候选标记仍被通俗地称为“双连符”。
dictsearch.appspot.com
3.
To do this, you need to register an application with Twitter, which provides you with a set of keys and tokens.
为此,您需要向Twitter注册一个应用程序,然后Twitter会为您提供一组密匙和令牌。
www.ibm.com
4.
You can view a list of tokens present within the system by specifying the -s option with no specific slot number.
可以通过指定不带特定槽号的-s选项查看系统内部提供的令牌列表。
www.ibm.com
5.
By default the Distribution Agent is set to run continuously, so tokens should be sent to all nodes automatically.
默认情况下,分发代理设置为连续运行,因此令牌将自动发送到所有节点。
msdn2.microsoft.com
6.
If you are looking at a sequence of tokens, you may want to perform a particular action on an occurrence of this sequence.
如果你在查看标记序列,你可能想在这一序列出现时执行某一动作。
www-128.ibm.com
7.
A sequence of tokens that specifies the format to be used for each number in the list.
指定列表中的每个数字要使用的格式的标记序列。
msdn2.microsoft.com
8.
WS-Security has standardized header blocks, known as tokens, that can be used to store this information.
WS-Security已经标准化了可用于存储此信息的标头块(也称为令牌)。
www.ibm.com
9.
presents: To Harry, tokens from his friends: a table piled high with what looked like half the candy shop.
礼物:哈利的朋友送给他的礼物:桌上堆得像小山,似乎半个糖果店都被搬到这里来了。
www.hoolee8.com
10.
this options page allows you to add , delete , and change the comment tokens that generate task list reminders.
此“选项”页允许您添加、删除和更改生成“任务列表”提醒的注释标记。
www.ichacha.net
1.
In an ideal world, all senders would include hashcash tokens in their messages; recipients would all check their validity upon receipt.
在理想的世界中,所有发送者都应该在他们的消息中包含bashcash标记;接收者在接收时都将检查它们的合法性。
www.ibm.com
2.
While the documentation for the cursor-based API talks about events, it is easier to think of the input source as a stream of tokens.
虽然基于指针的API的文档说的是事件,但把输入源看成标记流很方便。
www.ibm.com
3.
Identification, authentication, and authorization tokens are usually maintained as cookies.
身份识别、验证和授权标志通常以cookies形式维护。
www.ibm.com
4.
Here, a series of persisted individual permissions, retrieved as a set of string tokens in this case, is added to a PermissionSet.
此处,将一系列持久的个别权限(在本例中作为一组字符串令牌取回)添加到PermissionSet中。
www.ibm.com
5.
Is the name of the publication in which tracer tokens were inserted.
在其中插入了跟踪标记的发布名称。
technet.microsoft.com
6.
In XSeq, the tokens of the input XML file are separated into a set of containers, each of which is then compressed using Sequitur.
在XSeq中,输入XML文件的标记被分隔到一组容器中,然后使用Sequitur对每个容器进行压缩。
www.ibm.com
7.
WiKID is designed to be a secure alternative to tokens, certificates, and passwords.
WiKID旨在成为令牌、证书、密码的安全替代品。
www.ibm.com
8.
I should have followed the weather to stay at home; in that case, I would not have wasted two tokens for Toronto Transit Commission.
我应该跟随天气的暗示待在家里,要是那样的话,我还可以节省两枚公交硬币。
blog.sina.com.cn
9.
Specifies the contract that should be implemented by a custom security token authenticator that issues tokens to the client.
指定一个协定,该协定应该由向客户端颁发令牌的自定义安全令牌身份验证器来实现。
technet.microsoft.com
10.
On the second pass, the overall name-object graph is complete, and all the fixup tokens are able to resolve.
在第二步中,整个名称对象图完成了,所有修正的标记都能够解决。
technet.microsoft.com
1.
The value is a white space separated list of name tokens of the nodes whose white space only text nodes must be preserved.
值为通过空白分隔的节点名称标记列表,这些节点必须保留纯空白文本节点。
msdn2.microsoft.com
2.
Sometimes stores used certain tokens because there was a shortage of actual coinage.
有时商店里因为没有足够的硬币而使用一些代用币。
www.tingclass.com
3.
Eugenio: WIF is designed to abstract developers away from all the details of validating, parsing and exchanging security tokens.
Eugenio:WIF的设计目的就是让开发人员远离身份验证的所有细节,包括校验,解析和交换安全令牌。
www.infoq.com
4.
Kerberos also provides a system for authorization in the form of administering tokens or credentials.
Kerberos还以管理令牌或凭据的形式提供了一种授权系统。
www.ibm.com
5.
In other cases, the original user credentials cannot be propagated the way tokens can be.
在其他的情况下,不能使用传播令牌的方法来传播原始用户凭据。
www.ibm.com
6.
As part of processing , the gathered text data is passed through a word breaker to separate the text into individual tokens, or keywords .
在处理过程中,通过断字符将收集到的文本数据分隔成各个单独的标记或关键字。
www.bing.com
7.
Most of the glamorous new projects are run, at the executive level, by outsiders, with Qataris sometimes tokens at the top.
多数富有吸引力的新项目,执行层都是外来人,位于高层的卡塔尔人通常只是充当门面。
www.ecocn.org
8.
It isn't handling anything particularly difficult, just straightforward parsing and categorization of the returned tokens.
它不处理任何特别困难的操作,只是对所返回的标记进行简单的解析和分类。
www.ibm.com
9.
Describes how the work item type definition language supports tokens for referencing users and groups.
描述工作项类型定义语言如何支持用于引用用户和组的标记。
msdn2.microsoft.com
10.
The Conax smart card deducts the appropriate number of tokens, grants viewing and stores or exports to the STB the programme reference.
Conax智能卡扣除相应数量的令牌,允许观看和存储或向STB输出程序基准。
english100.lingd.net
1.
This category logs only the tokens within the TDS packets, and is less verbose than the TDS. DATA category.
该类别仅记录TDS包内的标记,并且不如TDS.DATA类别详细。
msdn2.microsoft.com
2.
Other BSP recommendations restrict how various security tokens are to be referenced and used.
其他BPS建议限制各种安全令牌的引用和使用方法。
www.ibm.com
3.
Start by replacing the word types with different word tokens.
开始用其他单词标记替换单词类型。
www.ibm.com
4.
Provides methods for marking and filtering metadata tokens to avoid repeating actions that have already been taken.
提供对元数据标记进行标记和筛选的方法,以避免重复已执行的操作。
207.46.16.251
5.
Who sent tokens and wonders into the midst of thee, O Egypt, upon Pharaoh, and upon all his servants.
埃及阿,他施行神迹奇事,在你当中,在法老和他一切臣仆身上。
www.ebigear.com
6.
Using a larger number of tokens results in a higher accuracy of the simulation.
使用较大数量的令牌可以得到更高的模拟准确率。
www.ibm.com
7.
If the STB has modem for return path connection, the viewing history can be transferred to the Conax Tokens PPV server.
如果STB有调制解调器来返回路径连接,则可以将观看记载转发到Conax令牌PPV服务器。
english100.lingd.net
8.
When working with tokens, the whole lifecycle and lifetime of the tokens should be considered.
在使用令牌时,应该考虑令牌的整个生命周期和生存期。
www.ibm.com
9.
Different variations are available in terms of handling tokens in the login modules.
对于登录模块中对令牌的处理,可以使用不同的变体。
www.ibm.com
10.
Authentication tokens are not required to be valid except at the Operator Site or implementation from which they originated.
认证令牌并不要求一定是有效的,除非是在原始产生这些令牌的操作入口站点或兼容实现中。
www.hotdic.com
1.
Historically, code tokens have been confined to little devices, like ones that hang off many corporate employees' key chains.
以前,动态口令牌仅限于小型设备,比如挂在许多公司员工钥匙链上的那些小玩意。
www.cn.wsj.com
2.
They have no intrinsic value in the universe and are simply tokens of the game to give it structure.
他们本身没什么内在价值,只不过是游戏成绩的符号。
www.kekenet.com
3.
Gets a collection of security token parameters for signed and endorsing supporting tokens required by the security binding element.
获取一个安全令牌参数的集合,用于安全绑定元素所要求的已签名且认可的支持令牌。
msdn.microsoft.com
4.
Tokens using either the form {variable} or {variable=default} represent a simple replacement operation.
使用{variable}或{variable=default}形式的标记表示一个简单的替换操作。
www.ibm.com
5.
While lex can be used to generate sequences of tokens for a parser, it can also be used to perform simple input operations.
虽然可以用lex来为解析器生成记号序列,但也可以用它来执行简单的输入操作。
www.ibm.com
6.
This should be true in designing session based scripts -- even where the session tokens are 'trusted' today.
这在设计基于脚本的会话是可实现的——即使这里的会话标识今天是‘可信任的’。
www.ibm.com
7.
This dissertation is divided into three chapters. Chapter one, the origin of tokens of love and its classification.
全文分为三章:第一章:定情信物的渊源与分类。
www.fabiao.net
8.
Returns detailed latency information for specified tracer tokens, with one row being returned for each Subscriber.
返回指定跟踪令牌的详细滞后时间信息,为每个订阅服务器返回一行。
msdn2.microsoft.com
9.
LTPA tokens are one way of propagating user identity from a client to a Web service provider.
LTPA令牌是从客户机将用户标识传递到Web服务提供者的一种方法。
www.ibm.com
10.
If the process inputs arrive in a size other than 1, click Edit to set the number of tokens per bundle.
如果到达的流程输入大小不为1,则单击Edit以设置每个包的令牌数量。
www.ibm.com
1.
It outputs the textual representation of the preprocessed tokens generated from a given input file. It is described in more details here.
它输出从一个给定的输入文件生成的预处理单词的文字表示。
boost-doc-zh.googlecode.com
2.
You may obtain more fun credits by going to the My Account section clicking on the "Top up fun tokens" link.
您可以在“我的帐户”网页点击“增加代表币”键连领取更多乐趣代表币。
www.dublinbet.com
3.
Support of this new paradigm requires its own high-level keywords and tokens.
对此新设计规范的支持要求其自身要有高级别的关键字和标记。
msdn2.microsoft.com
4.
Unlike the simple scanner, an AST understands the relationships between language elements (they are no longer simply "tokens" ).
与简单的扫描程序不同,AST理解语言元素(它们不再只是“标记”)之间的关系。
www.ibm.com
5.
In fact, some very popular application engines do not provide secure tokens.
事实上,一些十分受欢迎的应用程序殷勤根本就不提供安全标识。
www.ibm.com
6.
The context switching tokens, {) and (}, are used to switch the query from XML construction to query evaluation.
上下文切换标记{)和(}用于将查询从XML构造切换到查询计算。
msdn2.microsoft.com
7.
If the tokens do not match V8 performs a callback to check if access should be allowed.
如果令牌不匹配的话,V8会调用回调函数来判断这个访问是否应该被允许。
blog.sina.com.cn
8.
You set all of the dump options using the -Xdump command-line option in conjunction with a series of tokens to set the various options.
使用-Xdump命令行选项和一系列标志来设置各种转储选项。
www.ibm.com
9.
An object initializer consists of a sequence of member initializers, enclosed by { and } tokens and separated by commas.
对象初始化器由一系列成员初始化器组成,封闭于{和}标记内并且由逗号间隔。
www.diybl.com
10.
They're the edible equivalent of a diamond necklace, monetary tokens of affection, a flashy display to show you care.
犹如人们购买钻石项链,是一种货币化的爱意符号,一种光鲜而媚俗的表达。
www.bing.com
1.
Tokens using the form {-operation|arg|variable(s)} are a bit more complicated.
{-operation|arg|variable(s)}形式的标记稍微复杂一点。
www.ibm.com
2.
Provides information about metadata tokens, which are used to identify abstractions.
提供有关用于标识抽象内容的元数据标记的信息。
msdn2.microsoft.com
3.
It is a Swing-based application that analyzes a configurable number of tokens both within individual files and across multiple files.
它是一个基于Swing的应用程序,可以分析单独文件内或跨多个文件的标记的可配置数量。
www.ibm.com
4.
OmniFind can be configured to associate documents with security tokens or access control lists.
OmniFind可以配置来将文档与安全令牌或访问控制列表相关联。
www.ibm.com
5.
and yet these are the tokens of my daughter's virginity.
其实这就是我女儿贞洁的凭据。
www.bing.com
6.
This user routine reads the input stream, recognizing the lower level structures, and communicates these tokens to the parser.
这个用户程序读取输入流,识别更低层的结构,将识别出的token送给parser。
blog.sina.com.cn
7.
Nimber seven: A hundred muni train tokens, for the many, many great rides of your life.
第七件:市营电车百周年纪念品,代表你无数次的电车之旅。
forum.friends6.com
8.
The special syntax of tokens also makes it possible to verify that values for all the tokens have been supplied.
符号的特殊语法也让验证替换值是否都给出提供了可能。
www.infoq.com
9.
Remember, when talking about tokens, you have to consider the entire lifetime of the token and not be narrowed down to a single invocation.
请记住,当讨论令牌时,您必须考虑到令牌的整个生存期,而不是局限于单个调用。
www.ibm.com
10.
Information technology - Security techniques; Time-stamping services - Part 2: Mechanisms producing independent tokens.
摘要:信息技术。安全技术。时间标记业务。第2部分:产生独立标记的结构方式。
www.souku.com.cn
1.
You give it a list of rules describing your grammar, and it parses tokens and takes actions based on what it sees.
只要提供给它一组描述语法的规则,它就可以分析标记,并根据所见到的采取操作。
www-128.ibm.com
2.
The tokens PPV can be run as concurrent conditional access mode to standard subscription, Event PPV or NVOD PPV.
令牌PPV可以在并发有条件接入模式下运行标准订购、事件PPV或NVODPPV。
english100.lingd.net
3.
If you are planning to get the password once and store it for future use, Sametime tokens provide a more secure alternative.
如果希望获得口令后,保存口令供以后使用,那么Sametime令牌提供了一种更安全的方式。
www.ibm.com
4.
Property exactly matches one of the tokens in the document or workbook.
属性中的一个字符串与文档或工作簿中的一个标记完全匹配。
msdn2.microsoft.com
5.
A lexer is a software component that divides text strings into individual words, or tokens, so that the individual words can be indexed.
lexer是一个能将文本字符串分成单个命令,或者标记的软件组分,这样使得单个命令可以被检索到。
www.ibm.com
6.
Attributes to restrict the tokens to be processed to those matching the corresponding index values.
属性将要处理的标记限定为那些与相应索引值相匹配的标记。
www-128.ibm.com
7.
Finding tokens is a bit interesting, but the real work comes with applying grammars to the token lists.
查找记号的确有一点意思,但真正有意思的是如何向记号列表应用语法。
www-128.ibm.com
8.
Rules of thumb like 'don't waste' as well as our obsession with collecting tokens (money) work against our impulse to spend.
拇指规则中的‘不要浪费’和沉迷于收集代币对我们花钱的冲动不利。
www.elanso.com
9.
This program uses an iterator to read a line from stdin and another iterator to split the line into individual tokens.
此程序使用一个迭代器来从stdin中读取一行,同时另一个迭代器将该行分割成单个的标记。
www.ibm.com
10.
Access tokens are a variation of RoV and offer a coarser grained authorization level and better performance.
访问标志(accesstoken)是RoV的一个变体,它提供一个较粗粒度的授权级别和更佳的性能。
www.ibm.com
1.
Take advantages of opportunities to give material tokens of your love.
把握机会赠送礼物,以表爱情。
www.ebigear.com
2.
To form a grammatically correct sentence using these tokens , your construction must conform to certain rules .
为了使用这些标记造一个语法正确的句子,你的结构必须符合一定的规则。
www.bing.com
3.
File stores all of the configuration information for the current tokens within a system.
文件存储了系统中当前令牌的所有配置信息。
www-128.ibm.com
4.
A comma-separated string value specifying the version, culture, and public-key tokens of an assembly.
以逗号分隔的字符串值,指定程序集的版本、区域性和公钥标记。
msdn2.microsoft.com
5.
All text and character entities MUST be converted to string (e. g. , STR_I) or entity (ENTITY) tokens.
所有的文本和字符实体都必须转换成字符串(如STR_I)或实体(ENTITY)标记。
www.ibm.com
6.
Using security tokens or smart cards requires more expense, more infrastructure support and specialized hardware.
使用安全令牌或智能卡需要更贵、更多的基础实施支持和专用硬件。
www.kancaimi.cn
7.
As you can see, the above code combines three tokens to generate a complete SQL query.
就像你看到的,上面的代码用三段字串组成了一个完整的SQL查询语句。
www.bing.com
8.
WS-Trust also allows for directly transporting security tokens in SOAP message headers, rather than via the STS web service interface.
WS-Trust还允许在SOAP消息头内直接传输安全令牌,而不是通过STSWeb服务接口。
www.ibm.com
9.
Provider-signed certificates eliminate the possibility that non-subscribers can create (forge) tokens.
提供者签名的证书排除了非订阅者建立(伪造)令牌符号的可能性。
www.ibm.com
10.
Makes sure that all parts of the expression are recognized as legal tokens.
确保表达式所有部分都被认为是合法的。
www-128.ibm.com
1.
This wizard will help you acquire and install Terminal Server Client Access License tokens onto your Terminal Server License Server .
该向导将会帮助您获取并在您的终端服务器许可证服务器上安装终端服务器客户端访问许可证令牌。
www.jukuu.com
2.
Metadata tokens are conceptually similar to pointers, persisted in MSIL, that reference a particular metadata table.
元数据标记在概念上和指针相似,永久驻留在MSIL中,引用特定的元数据表。
technet.microsoft.com
3.
Although this can be limiting, you may find that in your SOA infrastructure it makes sense to use different tokens.
尽管这样可能会限制其使用,但是您会发现,在SOA基础结构中可以使用各种不同的令牌。
www.ibm.com
4.
Gets an enumerator for an array of generic parameter tokens associated with the specified TypeDef or MethodDef token.
获取与指定标记表示的泛型参数关联的元数据。
technet.microsoft.com
5.
Specifically, strong name tokens are used in assembly references to refer to the dependent assembly.
具体而言,强名称标记在程序集引用中使用,用来引用依赖程序集。
msdn2.microsoft.com
6.
But at least 6m people, probably closer to 100m, in 126 countries of the world, accepted them as tokens of the Divinity He personified.
但是在世界上的126个国家里,至少有六百万,或许接近于一亿人,相信它们是赛巴巴所代表的神的象征物。
www.ecocn.org
7.
Why we hide relationship detritus in a shoe box or ship off these tokens to an exhibit of heartbreak.
因此,我们将恋情碎片装入鞋盒子,或者将这些象征物送进心碎展览馆。
www.bing.com
8.
The custom token object behaves like other WebSphere security tokens, and the application server automatically transmits it.
自定义令牌对象的工作原理与其他WebSphere安全令牌相同,应用服务器将自动对其进行传输。
www.ibm.com
9.
One of the fastest-growing technologies is also one of the most visible : code tokens.
增长最迅速也最为人所知的技术之一是动态口令牌。
www.qeto.com
10.
Surrounded by these and other hard-won tokens of our American lives, I was suddenly and fiercely grateful to have come back home.
包围在这样或那样通过艰苦努力而获得的美国生活标记,我突然有了一种回到家里的强烈感激之情。
www.bing.com
1.
FastCGI under IIS (on WINNT based OS) supports the ability to impersonate security tokens of the calling client.
IIS(在基于WINNT的操作系统上)中的FastCGI支持模仿客户端安全令牌的能力。
ua2.php.net
2.
Methods provide efficient resolution of metadata tokens to runtime handles for fields, methods, and types in the current module.
方法向当前模块中的字段、方法和类型的运行时句柄提供有效的元数据标记解析。
msdn2.microsoft.com
3.
Just like using passwords together with usernames to gain access, sites will use tokens together with secrets to access resources.
正如使用用户名和密码来获取访问权限一样,站点使用令牌和密钥(secrets)来获取资源。
www.cnblogs.com
4.
If all tokens of all endpoints in the group are assigned, the mediation flow request is stored in a FIFO queue until a token becomes free.
如果一个组中的所有端点的所有令牌都已分配出去,那么仲裁流请求将储存在一个FIFO队列中,直至有令牌转变成未占用状态。
www.ibm.com
5.
However, there are many other standards and proprietary security tokens that are used in different environments.
但是,不同的环境中常常使用其他许多标准和专有的安全令牌。
www.ibm.com
6.
Tokens can be created by a time trigger, which is the default.
令牌可由时间触发器创建,这是缺省设置。
www.ibm.com
7.
'Access tokens' allow Facebook applications to access and change personal profile information.
“访问令牌”允许Facebook应用程序访问和更改个人档案信息。
dongxi.net
8.
In the next section we will explain how this prevents Verifiers from replaying presented U-Prove tokens.
在下一节中,我们会说明这是如何防止校验方重放已经存在的U-Prove令牌的。
www.infoq.com
9.
They asked their friends to donate their own discarded love tokens and soon built up a large collection, mercurial vapor.
他们让本身的伴侣捐出“烧毁”的恋爱疑物,很快他们便保藏了大量物件。
bbs.oseetech.com
10.
Businesses committed to gender diversity at the top shouldn't just give 'lip service by having tokens, ' this executive said.
这位管理人士称,有志使高层性别多样化的公司不应该仅仅口惠而实不至。
www.360doc.com
1.
Milk tokens, ie (in Britain) bought from the milkman and left on the doorstep to pay for the milk delivered.
牛奶票(送奶人出售的票证,购者用以付送奶费,可置于门外)。
a68.blog.hexun.com
2.
As mentioned, tokens are placed in a WS-Security header inside the SOAP: envelope header element.
正如前面提到的,令牌被放在WS-Security标头的SOAP:envelope标头元素中。
www.ibm.com
3.
This variation is the most complete with all the login modules actively handling tokens.
这种变体是最完整的,它具有所有主动处理令牌的登录模块。
www.ibm.com
4.
The DB2. UPDATE_SP_CONFIG stored procedure updates the shared memory and writes all logging tokens to a configuration file.
UPDATE_SP_CONFIG存储过程对共享内存进行更新,并将所有的日志标记写入一个配置文件中。
www.ibm.com
5.
Object to work with metadata tokens and scopes that allow sophisticated clients to perform their own MSIL generation.
对象处理元数据标记和允许复杂客户端执行自己的MSIL生成的范围。
msdn2.microsoft.com
6.
Note that when preprocessing to a separate file, spaces are not emitted after tokens.
请注意,当预处理到单独文件时,不在标记后发出空格。
msdn2.microsoft.com
7.
Specifies a comma-separated assembly name combination consisting of version, culture, and public-key tokens.
指定由版本、区域性和公钥标记组成的以逗号分隔的程序集名称的组合。
msdn2.microsoft.com
8.
The tokens themselves are not exposed as objects, but their type and properties are discoverable through methods on the cursor.
标志本身不作为对象公开,但其类型和属性可以通过游标方法来访问。
www.ibm.com
9.
Specifies a comma-separated assembly combination consisting of version, culture, and public key tokens.
指定一个逗号分隔的程序集组合,该程序集组合由版本、区域性和公钥标记组成。
msdn2.microsoft.com
10.
Lexing, to give one definition, is the act of breaking up input into meaningful words (also called lexing tokens or lexemes).
从定义来看,词法分析是将输入内容分解为有意义的单词(也叫做词法分析记号(lexingtokens)或词位(lexemes))的动作。
www.ibm.com
1.
Breaks the input stream into a list of tokens.
将输入流分成一列记号。
www-128.ibm.com
2.
b: ask the worker who sells tokens to give you one. it's free of charge. actually maps showing subway routes are posted at most stations.
向售货员要一张,那是免费的,实际上大多数地铁站都贴有线路图。
eng.chinaue.com
3.
LTPA tokens include a configurable expiration timestamp; after the token expires, a new authentication challenge is issued.
LTPA令牌包括一个可配置的到期时间戳。令牌到期后,将发出新的认证询问。
www.ibm.com
4.
This interface allows clients to use security tokens to submit requests for several types of operations.
这个接口允许客户机使用安全令牌提交对几种类型操作的请求。
www.ibm.com
5.
The transactions are interconnected by the tokens generated by ARM and passed by applications.
事务通过ARM生成的令牌互连在一起,并由应用程序进行传递。
www.ibm.com
6.
We now define an execution of a process as a tree of tokens.
我们现在定义一个流程的执行作为一个令牌树。
www.blogjava.net
7.
So, you've broken your input into a stream of tokens.
这样,您已经将输入拆分为一连串的记号。
www.ibm.com
8.
root Retype new UNIX password: passwd: all authentication tokens updated successfully.
请输入新密码;注:验证新密码;注:修改
wenku.baidu.com
9.
The gateway needs to be configured to trust keys and tokens from each client.
此网关需要配置为信任来自每个客户端的密钥和令牌。
www.ibm.com
10.
In general this guideline means that information tokens that are not natural language go in attributes.
一般来讲,这一原则是指把不是自然语言的信息标记放到属性中。
www-128.ibm.com
1.
I leaned my cheek against my knee, staring at the physical tokens of my parents' love.
将下巴搁在膝头,盯着父母对我的爱的实体标志。
bookapp.book.qq.com
2.
Of course, Huaqianyuexia, candlelight dinners and other romantic atmosphere, for a kiss tokens of love, but very helpful Oh!
当然,花前月下,烛光晚餐等浪漫气氛,对一吻定情可是很有帮助的哦!
wenwen.soso.com
3.
The format is a comma-separated assembly combination consisting of version, culture, and public key tokens.
该格式是以逗号分隔的程序集组合,它由版本、区域性和公钥标记组成。
msdn2.microsoft.com
4.
Trivia represents information not needed by the compiler such as whitespace and comments and tokens lack the context to be informative.
琐碎内容代表的是编译器不需要的信息,像空格、注释以及缺少上下文的令牌。
www.infoq.com
5.
As discussed, the analyzers are responsible for preprocessing the text data and converting it into tokens stored in the index.
正如上文所述,分析程序负责处理文本数据并将其转换为标记存储在索引中。
www.ibm.com
6.
In doing so, Twitter will also pass along some tokens (as URL parameters, which can be programmatically obtained).
在进行此操作时,Twitter还将传递一些令牌(作为URL参数,可以编程方式获得)。
www.ibm.com
7.
The MSIL portion contains MSIL and metadata tokens that reference the metadata portion of the PE file.
MSIL部分包含MSIL和引用PE文件元数据部分的元数据标记。
msdn2.microsoft.com
8.
It prevents tokens from being maliciously submitted to gain access to a resource after the first use.
它使令牌避免了恶意提交以在一个资源被使用一次后获得对它的访问。
www.ibm.com
9.
For more information on tracer tokens, see Measuring Latency and Validating Connections for Transactional Replication.
有关跟踪令牌的详细信息,请参阅为事务复制测量滞后时间和验证连接。
technet.microsoft.com
10.
Even though the task takes longer, the bottleneck is removed and tokens no longer queue up.
即使任务占用的时间较长,但消除了瓶颈,并且令牌不用再排队。
www.ibm.com
1.
Instead, you will recognize tokens of type STRING or QUOTED_STRING using a character pattern defined using regular expressions.
但是,您可以通过使用正则表达式定义的字符模式识别STRING或QUOTED_STRING类型的标记。
www.ibm.com
2.
The following sample program prints out all of the current tokens and slots in use in the system.
下列样本程序打印出当前在系统中使用的所有令牌和槽。
www-128.ibm.com
3.
Had Juliet so seen her love tokens dishonoured the sooner would she have sought the lethean herbs of the good apothecary.
若是朱丽叶看到她的爱情信物遭受到如此亵渎,她会立刻去找一位高明的药剂师给她配一剂能够遗忘一切的药。
blog.sina.com.cn
4.
The sending server might use a specific inbound and an outbound login module to handle tokens.
发送服务器可能使用一个特定的入站和一个出站登录模块来处理令牌。
www.ibm.com
5.
Collection of viewing history to Conax Tokens PPV server can be triggered via an EMM.
将观看记载向Conax令牌PPV服务器的收集可以通过EMM触发。
english100.lingd.net
6.
When using the cursor-based API, the application processes XML by advancing a logical cursor over a stream of XML tokens.
如果使用基于指针的API,应用程序通过在XML标记流中移动逻辑指针来处理XML。
www.ibm.com
7.
Moreover, many physical tokens can be duplicated easily.
另外,许多物理标记易于复制。
www-128.ibm.com
8.
Tokens are assigned to particular end users or groups and to the records that the particular user is allow to access.
标志被指定给特定的终端用户或组,同时也被指定给特定用户可以访问的记录。
www.ibm.com
9.
Adds the end token to the signature and marks the signature as finished, so no further tokens can be added.
在签名中添加结束标记并将签名标记为已完成,以便不能再添加更多的标记。
msdn2.microsoft.com
10.
The slot manager daemon (pkcsslotd) manages slots (and therefore tokens) in the system.
槽管理器守护进程(pkcsslotd)管理系统中的槽(因此也包括令牌)。
www.ibm.com
1.
Partition the source into preprocessor tokens separated by whitespace and comments.
用以空格和注释分割的记号划分源代码。
dictsearch.appspot.com
2.
If the time between tokens varies according to the time of day, you can use a timetable trigger.
如果令牌之间的时间间隔在一天的不同时间是不同的,您可以使用时间表触发器。
www.ibm.com
3.
A replacement token entered does not match any recognized tokens.
输入的替换符号跟可以识别的符号不匹配。
www.fan6.net
4.
You can also use the -L option of xargs to have it treat lines as arguments rather than the default of individual blank-delimited tokens.
您还可以使用xargs的-L选项让命令将行当作参数看待,而不是默认的以单个空格分隔的标记。
www.ibm.com
5.
If the time between tokens varies, you can use a random time trigger, using a distribution to vary the time.
如果令牌之间的时间不同,您可以使用随机时间触发器,并使用某个分布来改变时间。
www.ibm.com
6.
A non-shaded login modules actively handles tokens, a shaded login module (if there is one) does not.
不带阴影的登录模块将主动地处理令牌,而带阴影的登录模块(如果存在)则不会。
www.ibm.com
7.
Login modules are used to retrieve and decrypt the various tokens to get to the user credentials.
登录模块用于检索和解密各种令牌,以获得其中的用户凭据。
www.ibm.com
8.
Any number of whitespace characters can occur between two successive tokens.
任意数量的空白字符可出现在两个连续的记号间。
dictsearch.appspot.com
9.
Use SOAP header blocks to exchange security tokens and to carry time stamps of messages.
使用SOAP头信息来交换安全性令牌和携带消息的时间戳。
www.ibm.com
10.
Creates a default security token resolver for the specified security tokens.
为指定的安全令牌创建默认安全令牌解析程序。
msdn.microsoft.com
1.
Object that can be used to generate a method body from metadata tokens, scopes, and MSIL streams.
对象,可用于从元数据标记、范围和MSIL流生成方法体。
msdn2.microsoft.com
2.
The extension tokens are used in different ways by different WBXML applications.
不同的WBXML应用程序按照不同的方式使用扩展标记。
www.ibm.com
3.
When using the resulting reader, the application does not need to worry about ever encountering these types of tokens.
使用该读取器时,应用程序不用担心会遇到这种类型的标记。
www.ibm.com
4.
Indexed content can also be analyzed to produce terms, often called tokens.
还可以分析建立了索引的内容来生成词汇(通常称为令牌)。
www.ibm.com
5.
The service features quick setup and eliminates the need for tokens, smart cards, and certificates.
该项服务的特征就是快速建立和避免了通行证,智能卡和认证的需要。
www.21csp.com.cn
6.
The braces act as context-switching tokens and switch the query from XML construction to query evaluation.
大括号充当上下文切换标记,并将查询从XML构造切换到查询计算。
msdn2.microsoft.com
7.
In fact, we love collecting the tokens so much we quickly forget what they're for.
实际上,我们是如此地喜欢收集它们,以至于我们很快地忘记了它们的作用。
bbs.chinadaily.com.cn
8.
At the start of each round, the computer told them they had received a certain number of tokens, either 12, 16, 24 or 36.
{4}每轮游戏开始时,电脑告诉他们,他们获得了一定数额的代币,可能是12枚、16枚、24枚或是36枚。
edu.sina.com.cn
9.
This field in the person document will be consulted if the SSO configuration is enabled for mapping names in LTPA tokens.
如果在LTPA令牌中为映射名称启用了SSO配置,就会参考个人文档中的这个域。
www.ibm.com
10.
The TOKEN statement contains a regex-like expression that describes what integer tokens look like.
TOKEN语句包含类似regex的表达式,该表达式描述了整数记号看起来象什么。
www.ibm.com
1.
Yacc takes sets of tokens and assembles them into higher-level constructs, analogous to sentences.
yacc接受成组的记号,并将它们装配为高层次的结构,类似于句子。
www.ibm.com
2.
The image decorations made on the ancient painted pottery mainly originated from the totem tokens of clan.
彩陶上的意象纹饰,大多来源于氏族的图腾标志形象。
www.fabiao.net
3.
For such cases, an exception rule can be added for processing part indicators as substrings in tokens.
对于这些情形,可添加一条异常规则,将部件指示器处理为令牌中的子字符串。
www.ibm.com
4.
References to these tokens in the preceding productions are enclosed in angle brackets.
在前面的结果中,对这些记号的引用是用尖括号括起来的。
www.ibm.com
5.
To do that, insert self-contained blocks of Java code after the and tokens in the expression production.
为此,要在expression产生式中的和标记之后插入自包含的Java代码块。
www.ibm.com
6.
What healing comfort I found in being surrounded by these tokens of their caring.
被这些充满关怀的东西包围着对我来说是莫大的安慰。
club.qingdaonews.com
7.
The indentation levels of consecutive lines are used to generate INDENT and DEDENT tokens, using a stack, as follows.
连续行的缩进层次用于生成语言符号INDENT和DEDENT,这个过程中使用了堆栈,如下述。
www.17xie.com
8.
The client is configured to trust the service keys or tokens and the service is configured to trust the client keys or tokens.
客户端配置为信任服务密钥或令牌,而服务配置为信任客户端密钥或令牌。
www.ibm.com
9.
This is where yacc comes in: yacc lets you describe what you want to do with tokens. A yacc grammar tends to look sort of like this
这就是yacc要做的:yacc让您可以描述希望怎样处理记号。
www.ibm.com
10.
Maximum number of tokens associated to an endpoint.
与某个端点相关联的最大令牌数。
www.ibm.com
1.
Stateful security context tokens also allow a secure session to survive a Web server being recycled.
使用有状态安全上下文令牌,安全会话还可以使Web服务器免于回收。
msdn2.microsoft.com
2.
To further secure the system, tokens only can be used once.
为了进一步加强系统的安全,令牌只能被使用一次。
www.ibm.com
3.
The customized string can contain optional tokens that will be replaced with actual values at run time.
定制的字符串可以包含任意符号,在运行的时候,实际值将替代这些符号。
www.ibm.com
4.
Name tokens allow character data values, but are more limited than CDATA.
名称标记允许使用字符数据值,但是比CDATA的限制更多。
msdn2.microsoft.com
5.
You effect actions in the game through your game tokens. A game token is any entity you may manipulate directly.
你的有效动作通过游戏化身来实现。游戏接口就是你能直接摆布的实体。
coconutcococute.spaces.live.com
6.
Only at the time he starts viewing, must he agree to deduct tokens stored in the smart card.
只有当他开始观看时,才必须同意扣除智能卡中存储的令牌。
english100.lingd.net
7.
As a result, an escape macro must now accompany all tokens used in job steps, or else those job steps will fail.
因此,作业步骤中使用的所有令牌现在必须附带转义宏,否则,这些作业步骤将失败。
technet.microsoft.com
8.
Now that we had a simple grammar that recognizes sequences of tokens, we needed to find a way to feed tokens to the parser.
既然我们已经有了一个可以识别标记序列的简单语法,将需要寻求一种将这些标记提供给语法分析器的方法。
www-128.ibm.com
9.
The remaining elements contain any additional tokens entered on the command line.
其他元素包含在命令行输入的任何附加标记。
technet.microsoft.com
10.
The tokens can be deducted all at one time or as tokens per minutes, i. e. continues deducting from the purse as configured by TV operator.
令牌可以一次全部扣除或者按照分钟扣除,即按照TV操作员的配置自令牌包连续扣除。
english100.lingd.net
1.
What does the API -- used for login -- support (for example, tokens, authentication mechanisms, validation)?
用于进行登录的API支持哪些内容(例如,令牌、身份验证机制、验证)?
www.ibm.com
2.
Show variable manipulation, scanner tokens, and memory usage.
显示变量操作,符号扫描和内存使用。
boost-doc-zh.googlecode.com
3.
Details about the group endpoints: URL, current workload (used tokens), maximum tokens.
组端点的细节:URL、当前工作负载(使用的令牌)和最大令牌数。
www.ibm.com
4.
A host can control all code access to thread tokens by both the common language runtime (CLR) and user code.
主机可以通过公共语言运行库和用户代码控制对线程标记的所有代码访问。
msdn2.microsoft.com
5.
The security subsystem audits the receipt of potentially forged LTPA tokens.
该安全性子系统对可能伪造的LTPA令牌的收据进行审核。
www-128.ibm.com
6.
You can remove these predefined tokens from the list by highlighting the token and clicking Remove.
通过突出显示该标记并单击“移除”,可以从列表中移除这些预定义标记。
msdn2.microsoft.com
7.
These directives are used to define the tokens the lexer can return.
这些指令用来定义lexer可以返回的记号。
www.ibm.com
8.
Miao silver bracelet in silver for the tokens of love, ward off evils, ancestor worship and other activities.
银饰手镯在苗族银饰用于定情,僻邪,祭祖等活动。
iask.sina.com.cn
9.
Around 2000BC metal tokens, the forerunners of coins, were produced as receipts for quantities of grain placed in granaries.
大约公元前2000年,硬币的原形――金属代币作为谷仓存放谷物数量的收据而被创造。
www.ecocn.org
10.
The grammar productions are described in EBNF and tokens in regular expressions.
语法产生式用EBNF描述,使用规则表达式的符号。
osl.bsw.net.cn
1.
The repairer starts by telling its scanner to analyze the damaged region and produce Tokens.
修复程序首先让扫描程序分析遭到破坏的区域并生成一些Token。
www.ibm.com
2.
The analyzer's job is to take apart a string of text and give you back a stream of tokens.
分析器的工作是分离一串文本并返回一个标号流。
www.bing.com
3.
The Rampart distribution includes a separate module called rahas, which enables issuing security tokens required by WS-SecureConversation.
Rampart发行版包括一个单独的rahas模块,它支持发起WS-SecureConversation所需的安全令牌。
www.ibm.com
4.
The symbols produced by the lexer are called terminals or tokens.
lexer生成的符号称为终结符(terminals)或者记号(tokens)。
www.ibm.com
5.
Every district wants its own port, and some projects make sense only as tokens of national pride.
每个地区都想要自己的港口,而一些工程却只是为了显示民族荣耀。
www.ecocn.org
6.
Your bags will be ok. I promise. Pets, Mounts, Heroic Badges, BG Tokens are all getting storage space.
我保证你们的包包不会被挤满。所有宠物,坐骑,徽章,战场牌子都会有特定的空间给你们存放。
wow.uuu9.com
7.
Enable or disable PIN confirmation before deducting tokens from the token purse.
在从令牌包扣除令牌之前启用或者停用PIN确认。
english100.lingd.net
8.
When two scopes are merged, tokens from the imported scope are re mapped into tokens in the emitted scope.
当合并两个范围时,来自汇入之范围的语汇基元会重新对应至发出之范围的语汇基元。
technet.microsoft.com
9.
Represents a class of syntactically equivalent tokens.
代表一类在语法结构上等效的标记。
www-128.ibm.com
10.
Practice and aesthetics are the dual tokens of the nature of human being.
实践与审美是人的本质的双重表征。
www.ceps.com.tw
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/3/1 4:38:05