网站首页  词典首页

请输入您要查询的英文单词:

 

单词 binary
释义
binaries是binary的复数

binary

美 [?ba?n?ri]
英 ['ba?n?ri]
  • adj.复;【化】二元的;【数】二进制的
  • n.复;双体;【天】双[联]星【数学】二进制
  • 网络二进制文件;二进位档;双星
复数:binaries  
Adj. n.
binary relation
adj.
1.
二,双,复;【化】二元的;【数】二进制的
n.
1.
二,双,复;双体,复体;【天】双[联]星【数学】二进制

例句

释义:
1.
Fifteen of its new discoveries appeared to be so-called supergiant high-mass X-ray binaries (HMXB).
其新发现的15个被称作巨星-大质量X射线双星(HMXB)。
www.astronomy.com.cn
2.
The PHP project makes the life of the Windows developer easy by offering ready-to-deploy binaries with a complete set of extensions.
PHP项目通过提供带完整扩展集的立即部署(ready-to-deploy)的二进制文件,简化了Windows开发人员的工作。
www.ibm.com
3.
One of the methods of accomplishing both of these tasks is to modify the system binaries, or even the system libraries.
方法之一,完成这些任务是修改二元制,甚至图书馆系统。
www.cublog.cn
4.
And this really changed our whole concept of astronomy, the existence of these neutron star binaries.
对于天文学的概念,这些中子双星的,存在,现在一部分是。
open.163.com
5.
Note : Pre-compiled software packages are usually called "binaries, " although this is something of a misnomer.
注:预先编译的软件包通常称为“二进制文件”,尽管这不很贴切。
www.ibm.com
6.
You can upgrade from the Developer Edition directly to any other edition simply by installing the new database binaries.
通过安装新的数据库二进制文件,您可以从DeveloperEdition轻松地直接升级到任何其他版本。
www.ibm.com
7.
Assuming you have the same hardware, rolling it out is simple, just scp all the binaries and your hosts files out to all remote hosts.
假设您有相同的硬件,实施起来很简单,只要将所有二进制文件和所有主机文件复制到所有远程主机上即可。
www.ibm.com
8.
In regular binaries, indirect jumps are often used for multi-way branches, candidate targets are reserved in a jump table.
在通常的应用程序中,间接跳转指令经常用来实现多目标分支语义,分支目标存放在跳转表中。
www.ceps.com.tw
9.
Optionally, if you use a popular UNIX variant, you can likely find pre-built binaries ready to install on your distribution.
另外,如果使用流行的UNIX版本,很可能会找到预先构建好的二进制版本,可以把它直接安装在您的系统上。
www.ibm.com
10.
In the cores of stars clusters, black hole binaries are sufficiently tightly bound to be significant sources of gravitational waves.
在星团的核心部分,双黑洞紧密束缚在一起,成为引力波的重要来源。
www.bing.com
1.
To avoid this mistake, when there is a dependency between two or more updated binaries, include all the updated binaries in the test build.
为了避免此错误,当两个或多个更新后的二进制文件之间存在依赖项时,请在测试版本中包括所有更新后的二进制文件。
msdn2.microsoft.com
2.
Clearly, choosing the right machine is a very important part of minimising the time taken to move binaries into and out of Subversion.
显然,为了减少将二进制文件移入和移出Subversion所需的时间,选择适当的机器非常重要。
www.ibm.com
3.
Although this article focuses on ways to run Linux binaries on other platforms, distribution of compiled binaries has its place as well.
尽管本文重点关注的是在其他平台上运行Linux二进制程序的方法,但是,经过编译的二进制程序发行版本同样占有一席之地。
www-128.ibm.com
4.
In systems with large binaries, time would have to be of very little concern for this to be the best solution.
在包含大型二进制文件的系统中,时间因素很难影响这种方法成为最佳解决方案。
www.ibm.com
5.
As you download the binaries, look for the links for install guides and other documentation if you want more information.
下载后,若想获得更多信息,可以查找有关安装向导和其他文档的链接。
www.ibm.com
6.
The first problem, experienced by all users of the system, was the time required to check out or export the binaries.
第一个问题是签出或导出二进制文件所需的时间,这是系统所有用户都有过体验的。
www.ibm.com
7.
Next, we investigated the effect of various server authentication methods on the time required to move binaries in and out of Subversion.
接下来,我们调查不同服务器认证方法对将二进制文件移入和移出Subversion所需时间的影响。
www.ibm.com
8.
The example below contains the code that calculates the total binary size by adding the size of the files in the binaries folder .
下面的示例包含计算二进制文件总大小的代码,方法是将二进制文件夹中文件的大小相加。
www.bing.com
9.
Static -! Do not set this during bootstrap! Causes binaries to be statically linked instead of dynamically?
在系统引导过程中切勿使用该参数!因为这将导致二进制可执行文件使用静态连接而不是动态连接?
www.linux-ren.org
10.
Oracle supports side-by-side installation of application binaries, but only one set of binaries can be used by replication at a given time.
Oracle支持并行安装应用程序二进制文件,但是,在给定时间复制过程只能使用一组二进制文件。
technet.microsoft.com
1.
When you debug a dump file, the computer on which you debug must have access to the PDB symbol files and the binaries for the program.
调试转储文件时,您进行调试的计算机必须能够访问该程序的PDB符号文件和二进制文件。
technet.microsoft.com
2.
The results in Table 4 demonstrate that the machine used to run the Subversion server hugely affects the time required to import binaries.
表4中的结果表明,用于运行Subversion服务器的机器对于导入二进制文件所需时间有巨大的影响。
www.ibm.com
3.
Most of them are the same, but if you want to build high-performance applications, you are going to have to ship different binaries.
尽管它们中的大多数是相同的,但如果想构建高性能的应用程序,就必须提供不同的二进制文件。
www-128.ibm.com
4.
In fact, the main use for this is in libraries and other support files, but a number of system binaries are provided as well.
实际上,这一方法的主要用途在于程序库和其他支持文件,不过也同样提供了许多系统二进制程序。
www-128.ibm.com
5.
Windows group. This provides access to the Notification Services binaries used to run the service.
这样便可提供对用于运行服务的NotificationServices二进制文件的访问权限。
msdn2.microsoft.com
6.
This code is tested using existing binaries; there is no compiling at this point.
此代码是使用现有的二进制文件进行测试的;此时没有编译。
msdn2.microsoft.com
7.
Java stored procedures deploying using binaries do not require re-compilation at the target server.
使用二进制文件部署Java存储过程时,不需要在目标服务器上重新编译。
www.ibm.com
8.
You can find pre-complied binaries of each of these applications for AIX on dozens of online sites.
可以在许多网站上找到这些应用程序针对AIX预编译的二进制代码。
www.ibm.com
9.
The easiest way to detect crackers, however, is to have a clean set of statically linked binaries for your system.
最简单的方法来检测饼干,然而,你的系统有一个干净的链接库的静态集。
blog.chinaunix.net
10.
Scratchbox solves this in the most direct way possible: you run in a native environment using CPU emulation to run native binaries.
Scratchbox以尽可能直接的方式解决了这个问题:在使用CPU仿真的本地环境中运行本地二进制文件。
www.ibm.com
1.
Currently LINQ to XSD is only available as source code, no binaries have been published.
目前LINQtoXSD只提供了源代码,还没有发布执行文件。
www.infoq.com
2.
We still needed to investigate the amount of server disk space used to store binaries in different storage formats.
我们仍然需要调查以不同存储格式存储二进制文件所需的大量服务器磁盘空间。
www.ibm.com
3.
This means that any application that writes binaries to this location will need to be marked as requiring administrator privileges.
这表示,任何要向此位置写入二进制文件的应用程序都要标记为需要管理员权限。
msdn.microsoft.com
4.
Better documentation would be a nice addition, too, as would binaries for leading platforms.
建立更好的文档也是另外一个需要做的工作,这与为主流平台提供二进制文件一样重要。
www.ibm.com
5.
At this point all binaries, modules, man pages, and Web pages will be installed.
这时,将安装所有二进制文件、模块、帮助手册和Web页面。
www.ibm.com
6.
On a UNIX machine, the make process will automatically generate man pages for all the binaries and modules that have POD markup in them.
在UNIX机器上,make过程将自动为所有带有POD标记的二进制文件和模块生成帮助手册。
www.ibm.com
7.
This will build all of the perl binaries and libraries into a temporary blib directory.
这将所有perl二进制文件和库构建到临时blib目录中。
www.ibm.com
8.
Instrumentation is a profiling method in which the profiler inserts probe functions into specially built versions of the profiled binaries.
检测是一种剖析方法,分析工具会在受检测二进位档的特殊建置版本中插入探查函式。
technet.microsoft.com
9.
So I proposed that the Pirate Party platform require proprietary software's source code to be put in escrow when the binaries are released.
所以我建议海盗党的纲领规定在专有软件二进制代码发布的时候托管专有软件的源代码,放在一个有附件的契约里。
www.bing.com
10.
Install binaries, init script, sample config files, and set permissions on the external command directory, as shown in Listing 6.
安装二进制文件、init脚本、示例配置文件并设置外部命令目录上的权限,如清单6所示。
www.ibm.com
1.
These settings allow you to choose from a list of binaries and specify the launch order of binaries.
通过这些设置,您可以从二进制文件的列表中进行选择并指定二进制文件的启动顺序。
msdn2.microsoft.com
2.
A few megabytes for the binaries , documentation , and configuration files .
二进制代码,文档,和配置文件需要几兆空间。
www.bing.com
3.
threading single, multi Cause the produced binaries to be thread-safe. This requires proper support in the source code itself.
生成的二进制文件是线程安全的。这一要求应在源码本身上正确支持。
boost-doc-zh.googlecode.com
4.
Please notice: The size of the SIS file means ONLY the size of new binaries installed into your device.
请注意:大小的SIS文件意味着只有规模的新的二进制文件安装到您的设备。
www.xjttt.com
5.
The binaries and libraries on the host operating system can be shared across the ghosts.
可以跨访客共享宿主操作系统上的二进制代码和库。
www.ibm.com
6.
Moreover, we get a set of pulsar binaries with known sky positions and orbital parameters.
进一步,我们能够知道一些有确切位置和轨道参数的脉冲双星。
www.equn.com
7.
Some typical installation tasks include copying installation binaries to the image and running the installation programs for the software.
典型的安装任务包括把安装二进制代码复制到映像中和运行软件的安装程序。
www.ibm.com
8.
Do not send instrumented binaries to your customers.
不要将检测的二进制文件发送给客户。
www.kuenglish.info
9.
The installation data of your system includes the binaries of the WebSphere products.
系统的安装数据包括WebSphere产品的二进制文件。
www.ibm.com
10.
In this example, the task should be called after the files have been compiled and all binaries have been copied to the Binaries directory.
在本示例中,应该在已编译了文件且已将所有的二进制文件复制到二进制目录之后,才调用该任务。
msdn2.microsoft.com
1.
Also in this panel, the Deploy wizard gives the user the option to deploy using binaries (see Figure 4, the bottom part).
仍然是在这个面板中,Deploy向导为用户提供了使用二进制文件进行部署时的选项(见图4底端)。
www.ibm.com
2.
Binaries Binary, machine readable forms of programs which have been compiled or assembled. As opposed to source language forms of programs.
二进制,得到遵守或汇集的程序机器可读形式。对应于程序员语言形式。
swtrunk.bokee.com
3.
Note that in a more complex project, you might consider placing the binaries in a separate container.
请注意,在一个更复杂的项目中,您可以考虑把二进制文件放在一个单独的容器中。
www.ibm.com
4.
It does not represent or contain application binaries, and hence does not enforce a specific packaging or programming model.
它不表示或包含应用程序二进制,因此不强制特定的打包或编程模型。
www.ibm.com
5.
When vulnerable browsers read these malicious contests, they secretly download and automatically install harmful binaries in background.
当有漏洞的浏览器读到被注入的网页程式码时,它会秘密下载恶意程式并且在背景自动执行那些恶意程式。
ir.lib.ncu.edu.tw
6.
"We don't want to force people to fit into a doctor's categories, " even though, he concedes, most cultures "tend to think in binaries. "
“我们不想强令人们填入医生所划的分类中。”即便如此,他承认,大多数文化“倾向于非此即彼地思考。”
www.bing.com
7.
The first column in Table 2 describes how the binaries were stored by the Subversion user when they were put into the server.
表2中的第1列描述当把二进制文件放到服务器中时,Subversion用户如何存储它们。
www.ibm.com
8.
This package contains base and configuration files that are needed to run the actual binaries .
这个包包含着基本的和配置文件,这些都是运行实际的代码所需要的东西。
dictsearch.appspot.com
9.
When users non-commercially redistribute the binaries they received from you, they must pass along a copy of this written offer.
当用户以非商业方式发布了从你那里得到的程序的二进制码,他们必须同时提供一份你的这个书面承诺的副本。
www.gnu.org
10.
You must assemble the binaries that are to be deployed from the portfolio of applications that you are responsible for.
您必须将来自您所负责的应用软件的组合中被配置的二进制文件装配起来。
www.ibm.com
1.
Similarly, messages created by your new code can be parsed by your old code: old binaries simply ignore the new field when parsing.
类似地,你的新代码创建的消息也能被你的老代码解析:老的二进制程序在解析的时候只是简单地将新字段忽略。
blog.csdn.net
2.
Click here to download the binaries, source code, and tutorials for it for free from CodePlex.
点击这里从CodePlex免费下载相关的程序,源码以及教程。
blog.joycode.com
3.
Also, your application will share one set of binaries across the machine and they will be protected from tampering by a standard user.
另外,应用程序在整个计算机中只有一组二进制文件,这些文件将受保护,标准用户无法将其篡改。
msdn.microsoft.com
4.
The binaries include information that makes your application easier to reverse engineer, as well as security risks.
除了安全风险,二进制文件中包含的信息使您的应用程序更易于被反向工程处理。
msdn2.microsoft.com
5.
However, if you need the standard C library (for your custom binaries), there are other options beyond the massive glibc.
然而,如果我们需要标准的C库(我们自己定制的二进制可能需要这个库),除了巨大的glibc之外,我们还有其他选择。
www.ibm.com
6.
Typing whatis * will tell you about all the binaries in the current directory.
键入whatis*将会告诉你当前目录下所有二进制程序的信息。
www.bing.com
7.
The choice of authentication method does not much affect the time required to store and retrieve binaries.
认证方法的选择对存储和检索二进制文件所需的时间影响不大。
www.ibm.com
8.
Product files include the application binaries needed to run the Application Server.
产品文件,它包括运行ApplicationServer所需的应用程序二进制文件。
www.ibm.com
9.
When this stored procedure is deployed using binaries, this information is not transferred to the target server.
当使用二进制文件部署这个存储过程时,这样的信息不会传送到目标服务器。
www.ibm.com
10.
The binaries will ideally be deployed from a build view in which in the objects were generated and will remain as view private objects.
二进制文件从一个构建视图理想化地被开发,视图中产生对象并保持对象的私有性。
www.ibm.com
1.
Click Add Step again and create a new step with the name Get application binaries.
再次单击AddStep,创建一个名为Getapplicationbinaries的新步骤。
www.ibm.com
2.
The official site for the Geronimo project has the latest source code and binaries, and an active community on the mailing lists and wiki.
Geronimoproject的官方网站具有最新的源代码和二进制文件,以及邮寄列表和wiki上的活动社区。
www.ibm.com
3.
We just need to install the binaries of the cluster agent like a normal Windows program and run them unattended.
我们只需要像安装普通Windows程序一样安装集群代理的二进制程序,并让它们自动运行。
www.ibm.com
4.
Only the system's administrators were aware of the second problem, which was the amount of space consumed by the binaries.
而第二个问题只有系统管理员清楚,那就是二进制文件所占的大量空间。
www.ibm.com
5.
The next most important step is deciding where to save your application binaries and per-user configuration data.
下一个最重要的步骤是确定应用程序二进制文件和各个用户的配置数据的保存位置。
msdn.microsoft.com
6.
AIX operating system binaries can be stored in file systems local to the hosting logical partition.
AIX操作系统二进制文件可存储在主机逻辑分区本地的文件系统上。
www.ibm.com
7.
MSBuild provides a set of reserved properties that store information about the project fille and the MSBuild binaries.
MSBuild提供一组保留的属性,这些属性存储有关项目文件和MSBuild二进制文件的信息。
msdn2.microsoft.com
8.
On the Code Coverage page of the test run configuration editor, you can specify a key file for re-signing binaries after instrumentation.
在测试运行配置编辑器的“代码覆盖率”页上,可以指定用于在检测后重新签名二进制文件的密钥文件。
msdn2.microsoft.com
9.
Compressing the binaries yields the shortest possible wait times, thus meeting the requirements of the project.
压缩二进制文件可以使等待时间最短,因而符合项目需求。
www.ibm.com
10.
The initrd image is actually a RAM disk that contains a small file system with basic configuration files, binaries, libraries, and drivers.
initrd映像实际上是一个RAM磁盘,其中包含带有基本配置文件、二进制文件、库和驱动程序的小型文件系统。
www.ibm.com
1.
This bootstrapper may unpack the binaries to a temp location and then start another process that initiates the installation (see Figure 9).
这个bootstrapper会将二进制文件解压缩到临时位置,然后运行另一个进程来启动安装过程(请参见图9)。
msdn.microsoft.com
2.
The code below calculates the size of binaries present in the Binaries folder of the build directory.
下面的代码计算生成目录的二进制文件夹中存在的二进制文件的大小。
msdn2.microsoft.com
3.
without the proper corrections for the universe's makeup and shape, the orientation of galactic binaries will look warped.
如果没有正确的关于宇宙组成和形状的校正,这些双星的方向看起来将是歪曲的。
www.bing.com
4.
Although these binaries can be generated for each platform, it requires an additional level of expertise to accomplish this task.
尽管可以为每个平台生成二进制代码,但是这需要更高的技能水平。
www.ibm.com
5.
Specifies whether or not only signed binaries are loaded by the Microsoft Search Service.
指定MicrosoftSearch服务是否仅加载已签名的二进制文件。
msdn2.microsoft.com
6.
Tang Xuejun , The evaluation and extraction of interdiffusion coefficients of completely dissolved binaries using computer techniques.
唐学军,张家芸,应用计算机实现完全互溶二元系互扩散系数的计算与提取。
www.bing.com
7.
Searches the specified path for the source files if the location in the binaries is not available.
如果二进制文件中的位置不可用,则在指定路径中搜索源文件。
msdn2.microsoft.com
8.
The input for this tool is the application's source code and the resulting binaries compiled with certain compiler options enabled.
这个工具的输入是应用程序的源代码和使用某些编译器选项编译的二进制文件。
www.ibm.com
9.
This can be done easily if one is able to check the debug information in the binaries.
如果能够查看二进制文件中的调试信息,则很容易实现这一点。
www.ibm.com
10.
The emulation process is streamlined because the binaries are native to the underlying architecture of the system.
模拟过程进行了简化,因为这些二进制代码对于该系统的基础体系结构而言是本地的。
www.ibm.com
1.
The main aim here is to build two client binaries that have distinct base addresses for the server library.
这里的主要目的是使构建的两个客户机二进制文件具有不同的服务器库基址。
www-128.ibm.com
2.
We use these binaries during the configuration of the deployed environment.
我们会在配置所部署的环境期间使用到这些二进制文件。
www.ibm.com
3.
Programmers write code, hide it behind binaries, charge customers to use the software--then charge them more to fix it when it breaks.
程序员编写源代码、用二进制文件隐藏源代码、向软件用户收费——然后在软件崩溃时再收费修复。
www.bing.com
4.
The ejection process, however, would tear binaries apart, except perhaps when they were very tightly bound .
但是,在排斥驱逐的过程中,除非星体彼此非常紧密地束缚在一起,否则双星系统是会被拆散的。
dictsearch.appspot.com
5.
The last one is, of course, makefile, which will be used by GNU Make for building binaries.
最后当然是Makefile,GNUMake将使用它来构建二进制文件。
www.ibm.com
6.
This causes the SuppressMessage attributes to be emitted in the binaries and impacts performance.
这会导致在二进制文件中发出SuppressMessage属性,从而影响性能。
msdn2.microsoft.com
7.
It is also possible to use cross-compiler options that allow creation of POWER processor binaries on an Intel processor.
还可以使用交叉编译选项,这样可以在Intel处理器上创建POWER处理器的二进制文件。
www-128.ibm.com
8.
Note the location of the installed binaries because you'll need to use these later during the rendering process.
注意二进制代码的安装位置,稍后将在呈现过程中使用到。
www.ibm.com
9.
The framework does not need the source code of the proxied classes, but only the binaries.
框架不需要代理类的源代码,只需要二进制文件就可以。
www.infoq.com
10.
They are also sometimes used to manage tools and, occasionally, to store binaries.
有时候,版本控制系统也被用于管理工具,偶尔也用于存储二进制文件。
www.ibm.com
1.
Hudson could also install Hadoop binaries on all the nodes as necessary, really making this solution a turn-key.
只要有必要,Hudson也可以在所有结点安装Hadoop二进制码,而这就是解决方案的关键点。
www.bing.com
2.
The binaries used in the test system are very large compared to those used by many projects.
与很多项目使用的二进制文件相比,测试系统中使用的二进制文件非常大。
www.ibm.com
3.
Hence, simply checking the debug information can ensure that the binaries are in sync with the source.
因此,检查调试信息可以确保二进制文件与源文件是同步的。
www.ibm.com
4.
Contains binaries, libraries, documentation, and source-code for second level programs.
包含二进制,库,说明,二级程序源码。
www.ppmiao.com
5.
Source code, binaries , documentation, and tutorials are all available for download.
源代码、已编译吗、文档和教程都可以下载。
dictsearch.appspot.com
6.
these include the test assembly, instrumented binaries, and dependent assemblies.
其中包括测试程序集、已检测的二进制文件和依赖程序集。
technet.microsoft.com
7.
Place binaries, libraries and header files in a logical and consistent location.
将二进制文件,库文件和头文件放在一致的逻辑位置
www.infoq.com
8.
If you use a flavor of UNIX or Linux, check your distribution's repository for suitable binaries, or build Squirrel Shell from scratch.
如果您使用UNIX或Linux,请检查发行版附带的库,寻找合适的二进制文件或从头构建SquirrelShell。
www.ibm.com
9.
For both types of stored procedures, the deployed binaries are not deployable to another target.
对于这两种类型的存储过程,被部署的二进制文件不能被部署到另一个目标上。
www.ibm.com
10.
Script packages are zipped binaries (. zip or . tgz) that provide an execution script and required artifacts.
脚本包为压缩过的二进制文件(.zip或.tgz),提供了一个执行脚本和所需的工件。
www.ibm.com
1.
PHOEBE (Physics Of Eclipsing Binaries): a WD98 front-end for automated numerical minimization and physical parameters' estimation.
是一个为自动数字极小化和物理参数评价提供的一个WD98前端。
dictsearch.appspot.com
2.
Instrumented binaries are also larger than debug or release binaries and are not intended for deployment.
检测的二进制文件也比调试或发布的二进制文件大,它们不能用于部署。
msdn2.microsoft.com
3.
The next step is to download the CDT binaries.
下一步是下载CDT二进制文件。
www-128.ibm.com
4.
The entire sample (binaries and sources) is provided together with this article (see download).
随本文一起提供了整个示例(二进制文件和源代码)(请参见下载)。
www.ibm.com
5.
In this case, the deployment items and test binaries are copied into the local deployment folder and run there.
在这种情况下,部署项和测试二进制文件会复制到本地部署文件夹中并在此运行。
msdn2.microsoft.com
6.
When deploying using binaries, certain conditions and restrictions are needed.
在使用二进制文件进行部署时,存在一些条件和限制。
www.ibm.com
7.
bin -- Holds most of the binaries like init, busybox, shell, file management utilities, and etc.
bin―保存大多数象init、busybox、shell、文件管理实用程序等二进制文件。
www.ibm.com
8.
In my opinion the best tools to analyse such binaries are Interactive Disassemblers or CPU emulators .
在我看来是交互式反汇编器或CPU模拟器。
dictsearch.appspot.com
9.
The code architecture describes how the source code, binaries , and libraries are organized in the development environment.
代码架构描述了源代码,程序和库在开发环境中是如何组织的。
dictsearch.appspot.com
10.
We recommend you to use the latest PHP binaries.
推荐使用最新的PHP可执行包。
lv2.php.net
1.
The user can choose to modify these fields for the stored procedure being deployed using binaries.
用户可以选择为使用二进制文件部署的存储过程修改这些字段。
www.ibm.com
2.
We now discuss how a virus writer may attack the various stages in the analysis of binaries described above.
我们现在讨论病毒作者可能如何攻击以上所述二进制代码分析的各不同阶段。
www.pediy.com
3.
This is a substantial improvement, providing an environment in which target-system binaries are run (in emulation) during cross-development.
这个工具中有很多改进,它提供了一个环境,目标系统上的二进制文件在交叉开发过程中就能在这个环境上运行(以仿真模式)。
www.ibm.com
4.
Deploying using binaries will not transfer the source code to the target server.
使用二进制文件进行部署时,不会将源代码也传送到目标服务器。
www.ibm.com
5.
Attribute is the version number of the Kannel binaries.
属性是Kannel二进制的版本数。
www-128.ibm.com
6.
As Linux grows in popularity, developers need to examine their options when planning binaries that will run on non-Linux systems.
随着Linux越来越流行,当开发人员规划将运行于非Linux系统上的二进制程序时,需要审视他们的选择。
www-128.ibm.com
7.
A simple installer places binaries on a Windows computer.
一个简单的安装程序,在Windows计算机上放置二进制数据。
www.ibm.com
8.
If binaries are not available for your operating system, then you need to build mod_jk from the source.
如果这些二进制文件不适用于您的操作系统,则需要根据源代码构建mod_jk。
www.ibm.com
9.
The McTaskManager Service and Access Protection binaries have been updated to resolve this issue.
任务分派管理器服务和访问保护的二进位已被升级来处理此问题。
bbs.100free.net
10.
Using Subversion's efficient check-in script with binaries resulted in unacceptable wait times.
使用Subversion的高效签入脚本会导致难于接受的等待时间。
www.ibm.com
1.
Which changes you need to make depend on whether you downloaded the source code and compiled PHP yourself, or downloaded binaries.
需要做哪些修改则取决于您是下载源代码,自己编译PHP,还是直接下载二进制文件。
www.ibm.com
2.
Download Apache Wink source code, binaries of the latest version of the framework, and other example projects.
下载ApacheWink源代码,该框架最新版本的二进制文件,以及其他示例项目。
www.ibm.com
3.
An error occurred attempting to locate the Cluster Service binaries. A registry error has occurred.
试图定位群集服务二进制文件时出错。出现注册表错误。
www.drados.com
4.
Binaries are stripped of all debugging information when a product goes to production.
在将产品投入生产之后,就会从二进制文件中删除所有调试信息。
www.ibm.com
5.
This policy makes sure that integrity of the trusted binaries is check during load time.
此策略确保在加载时检查可信二进制文件的完整性。
www.ibm.com
6.
This method becomes more beneficial if binaries change very little between versions.
如果二进制文件各个版本之间的差异很小,那么这种方法就更加有益。
www.ibm.com
7.
Provide information for the installation directory of the DB2 binaries, and click Next.
输入DB2二进制文件的安装目录信息,然后单击Next。
www.ibm.com
8.
To find the latest specifications, documentation, source, and binaries.
您可在这里找到最新的规范、文档、源代码和二进制文件。
www-128.ibm.com
9.
Specifies the shared folder where the build binaries and log files are stored.
指定存储生成二进制文件和日志文件的共享文件夹。
msdn2.microsoft.com
10.
This paper introduces a browser-side solution to prevent web browsers from executing binaries downloaded by drive-by downloads.
本篇论文介绍了一种在浏览器端的方法来阻止执行经由Drive-byDownloads所下载下来的执行档。
ir.lib.ncu.edu.tw
1.
Like most other Jakarta projects, Lucene is distributed as pre-compiled binaries or in source form.
跟其他jakarta项目一样,Lucene以预编译二进制或源码的形式发布。
www.bing.com
2.
Binaries for the sample programs are provided in the samples pack (see Downloads).
示例程序的二进制文件提供在示例包中(参见下载)。
www.ibm.com
3.
Built binaries and log files copied to the drop directory might not be secure.
复制到放置目录的生成二进制文件和日志文件可能不安全。
msdn2.microsoft.com
4.
You can define a file attribute and have administrators upload the required binaries after loading the plug-in in IBM Workload Deployer.
您可以定义一个文件属性,并让管理员在加载了IBMWorkloadDeployer中的插件后上传所需的二进制文件。
www.ibm.com
5.
STAB and DWARF are two different ways of representing debug information for binaries.
STAB和DWARF是表示二进制文件中的调试信息的两种不同方式。
www.ibm.com
6.
A full QEMU installation includes several binaries, each of which emulates a different CPU architecture.
完整的QEMU安装包含若干二进制文件,其中每个都模拟不同的CPU架构。
www.ibm.com
7.
Indicates whether or not only signed binaries are loaded by the MSFTESQL Service.
指示MSFTESQL服务是否只加载签名的二进制文件。
msdn2.microsoft.com
8.
However, this new discovery proves that mature Jupiter-like worlds can exist in binaries.
但是,这项新的发现证明了类木星的成熟行星存在于双星系中。
www.bing.com
9.
junit. jar (the JUnit framework binaries; see JUnit's Web site for download information).
jar(JUnit框架二进制文件,下载信息请参阅JUnit的Web网站)。
www.ibm.com
10.
The Squirrel Shell's download page (see Resources for a link) provides source code and binaries for 32- and 64-bit Windows.
SquirrelShell的下载页面(参见参考资料)提供了针对32位和64位Windows的源代码和二进制代码。
www.ibm.com
1.
Windows will now add the Hyper-V binaries to your Windows installation.
Windows现在将添加Hyper-V二进制文件到你的Windows安装程序中。
www.bing.com
2.
Problem: OutsideIn binaries do not have execute permission.
问题:OutsideIn二进制文件没有执行权限。
www.ibm.com
3.
The RPM is a program designed to build and manage packages of software, including the source and binaries .
RPM是一个设计用来编译和管理源代码和二进制软件包的程序。
www.bing.com
4.
The built binaries are temporarily stored here until copied to the drop location.
生成的二进制文件在复制到放置位置之前,将临时存储在此处。
msdn2.microsoft.com
5.
Following a process of building daily and smoke testing any changed or new binaries ensures high quality.
遵循每日构建和冒烟测试的过程,任何更改过的或新的二进制文件都可确保实现高质量。
msdn2.microsoft.com
6.
Binaries with names of the form qemu-arch provide user-mode emulation for their respective architectures.
采用qemu-arch格式名称的二进制文件提供各自架构的用户模式模拟。
www.ibm.com
7.
On Linux, use your favorite package manager or get the source and binaries directly from Graphviz. org.
在Linux上,可以使用您喜欢的包管理器或直接从Graphviz.org获得源代码和二进制代码。
www.ibm.com
8.
Our trusty compiler, built for generating PPC Linux binaries for the PPE.
可信赖的编译器,用来为PPE生成PPCLinux二进制程序。
www.ibm.com
9.
MSBuild reserves some property names to store information about the project file and the MSBuild binaries.
MSBuild保留了一些属性名来存储有关项目文件和MSBuild二进制文件的信息。
msdn2.microsoft.com
10.
The Felix binaries are created in the "main" project directory.
Felix的二进制文件将生成在“main”目录。
www.bing.com
1.
Changes to signed binaries invalidate the original signing.
对已签名的二进制文件所做的更改会使原始签名失效。
msdn2.microsoft.com
2.
The experimental data of the three binaries are in good agreement with those reported in the literatures.
其中二元系的实验值与文献值良好一致。
journal.ecust.edu.cn
3.
The product binaries and source code is available as no-charge downloads from the IBM website.
您可以从IBM网站免费下载产品二进制文件和源代码。
www-306.ibm.com
4.
Gets or sets a value specifying whether to compile release binaries or debug binaries.
获取或设置一个值,该值指定是要编译发布二进制文件还是调试二进制文件。
msdn2.microsoft.com
5.
In these data sets, our pulsar search aims to find binaries with orbital periods longer than eleven minutes.
对于得到的数据集,我们所负责的脉冲星搜索,其目标主要是寻找轨道周期长于11分钟的脉冲双星。
www.equn.com
6.
Because the two systems use the same chip set, the binaries for many applications can be the same for Linux running on both.
由于这两种系统使用相同的芯片组,所以用于在两者之上运行的Linux的很多应用程序的二进制文件可以是相同的。
www.ibm.com
7.
Advantages: Binaries are portable to other platforms.
优点:二进位码可移植到其他平台。
big5.china.com
8.
Testing with mismatched binaries is a common mistake in smoke testing .
在冒烟测试中,使用不匹配的二进制文件进行测试是一个常见错误。
www.bing.com
9.
The build name provides a link to the drop location that contains the built binaries.
生成名称提供一个链接,指向包含生成的二进制文件的放置位置。
msdn2.microsoft.com
10.
C programmers will most likely prefer to go with building their own binaries from the source tarball.
程序员很可能愿意从源压缩文件编译自己的二进制文件。
dictsearch.appspot.com
1.
In other words, the deployment manager and the node cannot share the same product binaries even though they are mostly the same.
换而言之,部署管理器和节点不能共享相同的产品二进制文件,即使两者区别甚微。
www.ibm.com
2.
You can instrument binaries from within the IDE or by using command line tools.
您可以从IDE内或通过使用命令行工具检测二进制文件。
msdn2.microsoft.com
3.
The PHP project offers precompiled binaries for the Windows operating systems.
PHP项目为Windows操作系统提供了已预编译的二进制文件。
www.ibm.com
4.
These PHP restrictions are not valid in executed binaries, of course.
当然,这些PHP限制不适用于可执行文件。
hu2.php.net
5.
The binaries can be downloaded from the Index page.
您可以从Index页下载二进制文件。
www.ibm.com
6.
If the program's binaries are instrumented, code coverage data will be gathered.
如果这个程序的二进制文件经过了检测,则将收集代码覆盖率数据。
www.kuenglish.info
7.
You can download the Geronimo 3 source and binaries for both Windows and Unix (including Linux, Mac OS X) operating systems.
你可以丛这里下载Geronimo3的源代码和针对Windows和Unix(包括Linux、MacOSX)等操作系统的二进制文件。
www.infoq.com
8.
The body does not contain any binaries such as attachments.
body不包含任何二进制(如attachments)。
www.ibm.com
9.
I won't be able to create all the untether binaries before sunday, because I will be on planes, . . .
不过星期天之前我可能没有办法把代码弄好,因为我会在飞机上……
www.weiphone.com
10.
This will include both early access to code and binaries, as well as contributions to us where that is appropriate.
这会包括在早期访问源代码和二进制文件,以及合适的其他人贡献的程序。
www.infoq.com
1.
The second column shows the size of the binaries on the local system.
第2列显示二进制文件在本地系统上的大小。
www.ibm.com
2.
One last consideration is that I was unable to locate binaries for OpenSP for the Windows platform.
最后一个要考虑的问题是,我无法找到针对Windows平台的OpenSP的二进制文件。
www.ibm.com
3.
The first big candidate for installation is the big zip file full of binaries.
首先要安装的是一个全都是二进制程序的大压缩文件。
www-128.ibm.com
4.
CSM manages the distribution of the PL binaries using the CFM file transfer facility.
CSM使用CFM文件传输工具来管理PL二进制文件的分发。
www.ibm.com
5.
The server was then wiped out completely, including the OS and binaries.
当时,服务器完全消灭了,包括操作系统和二进制文件。
www.bing.com
6.
Precompiled binaries are not updated until a new version of the class library is deployed.
在部署类库的新版本后,才更新预编译的二进制文件。
msdn2.microsoft.com
7.
With the cluster agent approach, you just need to spare some space inside the FAT32 or NTFS filesystem to host Linux agent binaries.
使用集群代理的方法,您只需要在FAT32或者NTFS文件系统中留出一些空间来存放Linux代理二进制程序。
www.ibm.com
8.
Secure all custom component source files and binaries.
确保所有自定义组件源文件和二进制文件的安全。
msdn2.microsoft.com
9.
You may also need to configure a cross-compiler to generate the binaries you intend to test.
也许还需要配置跨编译器以生成想要测试的二进制文件。
www.ibm.com
10.
Only root can mount or unmount the device but users can execute binaries and use the "sticky bit" (covered later).
只有root可以装载或者缷载设备,但是用户可以执行二进制文件和使用“stickybit”(稍后介绍)。
www.ibm.com
1.
The application binaries are unchanged and they "just run" as they did in Server Foundation.
应用程序二进制文件并没有变化,它们“只是”像在ServerFoundation中那样运行。
www.ibm.com
2.
To prevent. NET from optimizing the binaries during the JIT process, you must complete the steps outlined in this topic on the UM server.
若要防止.NET在JIT过程中优化二进制,必须在UM服务器上完成此主题中概括的步骤。
technet.microsoft.com
3.
Do a make to build the binaries of the kernel module and user-level programs.
执行make来构建内核模块和用户级程序的二进制代码。
www.ibm.com
4.
At the Lua-users wiki, browse a variety of pre-built, installable Lua binaries.
在Lua-userswiki上,浏览很多预先构建的、可安装的Lua二进制文件。
www.ibm.com
5.
In fact, both Bigtable and relational databases use the blob type to store binaries.
事实上,Bigtable和关系数据库都使用blob数据类型来存储二进制文件。
www.ibm.com
6.
In addition, the images are built with the operating system disk separate from the IBM product binaries.
此外,映像在构建时将操作系统磁盘与IBM产品二进制分离。
www.ibm.com
7.
Solution: Assign full permission to the OutsideIn binaries.
解决方案:向OutsideIn二进制文件赋予完全权限。
www.ibm.com
8.
So you need to provide complete sources, not just diffs, with the binaries .
所以你需要随二进制程序提供完整的源代码,不只是差异。
dictsearch.appspot.com
9.
You can distribute binaries with the put operation.
可以通过put操作分发二进制代码。
www.ibm.com
10.
Specifies the location of the add-in binaries.
指定外接程序的二进制形式的位置。
msdn2.microsoft.com
1.
Before continuing, we need to be sure binaries related to Kerberos 5 are installed on the machine.
在继续我们的操作之前,需要确保机器上安装了与Kerberos5相关的二机制文件。
www.ibm.com
2.
Before you click the Build All button, it is a good idea to clean all projects and have the binaries rebuilt.
单击BuildAll按钮之前,清理所有项目并重新构建二进制文件是个不错的主意。
www.ibm.com
3.
The product binaries, and even the source, is available for download and use at no cost.
可以免费下载和使用这种产品的二进制代码和源代码。
www.ibm.com
4.
According to the new study, bully binaries form naturally and can each fling out dozens of runaways.
根据新的研究,恶霸双星可以自然形成并且一对恶霸双星可以抛出几十个速逃星。
www.bing.com
5.
For example, you can download gcc, build it for your favorite flavor of Linux, and charge others for the binaries.
例如,您可以下载gcc,为您喜欢的Linux风格编译它,并将二进制代码卖给其他人。
www.ibm.com
6.
One thing that's very noticeable is that the TiVo has a fairly loose combination of shell scripts, Tcl programs, and binaries.
非常值得注意的一件事情是TiVo具有一个非常松散的shell脚本、Tcl程序和二进制程序的组合。
www.ibm.com
7.
This comes in handy when you find well-known binaries in unusual places.
这是当你发现不寻常的地方著名的二进制派上用场。
www.diybl.com
8.
Download either the binaries on that page (look in the upper-right corner) or the sources and build it.
下载在该网页(在右上角外观)二进位码档案,或者是来源并建置它。
msdn.microsoft.com
9.
If you have programs that would benefit from optimization, then "rolling your own" binaries from the source code is the way to go.
如果您有从优化中受益的程序,那么从源代码中“构造您自己的(rollingyourown)”二进制则是您应该选择的方式。
www.ibm.com
10.
Many applications have some mechanism for updating the application binaries.
许多应用程序都具有某些用于更新应用程序二进制文件的机制。
msdn.microsoft.com
1.
The latter method is more effective for binaries and software packages, while copying to Amazon S3 is more for user data.
对于二进制文件和存储包,第二个方法更为有效,而复制到AmazonS3常用于用户数据。
www.ibm.com
2.
The locations of the apachectl and http(s)dctl binaries often vary.
apachectl和http(s)dctl程序所在的路径在不同系统中通常不一样。
uk2.php.net
3.
With the results from this pulsar search, we improve our understanding of how many binaries with neutron stars may be out there in total.
有了脉冲星搜索的结果,我们能够进一步了解总共有多少含有中子星的双星系统。
www.equn.com
4.
Describes how to view summary status, the detailed build report, the log file, and built binaries after a build runs.
描述如何在运行生成后查看摘要状态、详细生成报告、日志文件和生成的二进制文件。
msdn2.microsoft.com
5.
To find the binaries for debugging a crash dump, Visual Studio 2005 looks in the symbol search paths.
为了找到调试崩溃转储所需的二进制文件,VisualStudio2005会在符号搜索路径中查找。
msdn2.microsoft.com
6.
Binaries for 32-bit Intel and AMD platforms are provided with this article.
本文提供了针对32位Intel和AMD平台的二进制代码。
www-128.ibm.com
7.
On the AMD64 and Itanium architectures there is a compatibility layer to run 32-bit FreeBSD binaries.
AMD64和安腾平台,拥有一个兼容层来运行32位的FreeBSD二进制程序。
blog.163.com
8.
The home directory for this team contains the DB2 binaries.
这个团队的主目录包含DB2二进制代码。
www.ibm.com
9.
Also pay close attention to the strings in the system binaries.
同时密切关注系统中的二进制字符串。
blog.chinaunix.net
10.
Of course, you must adjust the path to the binaries to suit your configuration.
当然,您必须调整二进制文件的路径以适合您的配置。
www.ibm.com
1.
The tool chain binaries *do* support C exceptions and RTTI by default.
在默认情况下工具链二进制文件支持C 例外和运行时信息。
blog.sina.com.cn
2.
Scratchbox lets you have multiple build environments where you can mix and match target and host binaries.
Scratchbox允许您拥有多个构建环境,您可以在其中搭配使用目标和主机二进制文件。
www.ibm.com
3.
Minidump files without heaps need the binaries to load symbols.
小型转储文件,没有需要二进制数以加载符号的堆。
technet.microsoft.com
4.
Describes how to apply certificates after a post-build event has changed the original binaries.
描述生成后事件更改的原始二进制文件后如何应用证书。
msdn2.microsoft.com
5.
The binaries were retrieved using the export command.
然后使用export命令检索二进制文件。
www.ibm.com
6.
Half of all the stars in the sky are binaries, and so when you look at the spectra, you will see them go around each other.
天空中一半的恒星,都是双星,看光谱的时候,你们会发现,它们绕着彼此转动。
open.163.com
7.
As a result, DWB cannot re-deploy this stored procedure using binaries.
因此,DWB不能使用二进制文件重新部署这个存储过程。
www.ibm.com
8.
These require the binaries under test to be relinked with the library under test.
这些工具要求测试中的二进制文件与测试中的库重新链接到一起。
www.ibm.com
9.
You must enable Code Analysis for managed binaries in project {0} properties and build before checking in.
在签入前,必须先对项目{0}属性中的托管二进制文件启用代码分析并进行生成。
207.46.16.251
10.
It is source code for developers. No binaries at this time.
这只是为开发者提供源码,没有二进制文件。
www.infoq.com
1.
The bin directory in UNIX is where binaries and other runnable programs are stored.
UNIX中的bin目录是存储二进制和其它可运行程序的位置。
www.ibm.com
2.
Knowing how to effectively store binaries in Subversion can save hundreds of hours of team members' time and gigabytes of server space.
如果知道如何有效地将二进制文件存储到Subversion中,就可以节省小组成员数百个小时的时间和以千兆计的服务器空间。
www.ibm.com
3.
The path and the library path variables must contain the fully qualified path to the folder where OutsideIn binaries are placed.
路径和库路径变量必须包含放置OutsideIn二进制文件的文件夹的完全限定路径。
www.ibm.com
4.
In order to perform Code Analysis on managed binaries, MSBuild must start FxCop.
为了对托管二进制代码执行代码分析,MSBuild需要启动FxCop。
msdn2.microsoft.com
5.
Are you sure that you can trust the unsigned binaries after the system disinfection?
你肯定可以信任消毒后的系统二进制文件的符号?
bbs.kafan.cn
6.
Which will be used later to execute PowerPC binaries.
以后还要使用这个文件执行PowerPC二进制文件。
www-128.ibm.com
7.
make is for the build and make dest creates a Transarc style directory structure with binaries.
make用于构建目的,makedest创建了一个包含二进制文件的Transarc风格的目录文件结构。
www.ibm.com
8.
For non-Unix platforms and some versions of Unix there are binaries available.
对于非Unix平台和某些版本的Unix,有可用的二进制文件。
www.ibm.com
9.
VSInstr tool is used to instrument binaries.
VSInstr工具用于检测二进制文件。
msdn2.microsoft.com
10.
For example, you can update how your application behaves after shipping the binaries by just swapping out the external mapping file.
例如,在发布二进制文件后,只需交换出外部映射文件,就可以更新应用程序的工作方式。
msdn2.microsoft.com
1.
Once you've installed the binaries you need to configure your system as described in Section 2. 5.
一旦您已经安装了二进制包,您需要配置您的系统,请参考2.5的章节?。
dictsearch.appspot.com
2.
These cross-compilers can generate both 32-bit and 64-bit binaries.
这些跨系统编译器能够生成32位和64位二进制文件。
www.ibm.com
3.
When you want to build the software, more information than just the library binaries is needed.
当您需要构建软件时,除了这些库二进制文件之外,还需要更多信息。
www.ibm.com
4.
To make the transition smoother, X11R6. 9 and X11R7 share the same source base, and as far as possible produce the same set of binaries.
为了让转换过程更平滑,X11R6.9和X11R7共享了相同的代码基库,并且尽可能地生成相同的二进制文件集。
mxtctp.sourceforge.net
5.
You can download Pivot 1. 3 as binaries or source; the source distribution contains a BUILD file that describes how to build the project.
您可以下载二进制文件或源代码形式的Pivot1.3;源代码发行版包含一个BUILD文件,它描述如何构建项目。
www.ibm.com
6.
This step won't be required when the IBiblio Maven repository includes all of the XDoclet 1. 2. 3 binaries.
当IBiblioMaven库包含所有的XDoclet1.2.3二进制文件时,这一步可以省略。
www.ibm.com
7.
To perform the upgrade, install SQL Server binaries on this disk resource.
要执行升级,请在此磁盘资源上安装SQLServer二进制文件。
www.microsoft.com
8.
In order to generate dynamically linked binaries, include -fPIC in all Makefiles.
为生成动态链接的二进制文件,需要在所有的Makefile文件中包含-fPIC。
www.ibm.com
9.
The GPL says you must offer access to copy the source code "from the same place" ; that is, next to the binaries .
GPL说明你必须“从同一地方”提供访问源代码拷贝;这个地方紧接着二进制程序。
dictsearch.appspot.com
10.
The installations must always be run as root in order to change ownership of, and set the switch-user bit on, several key binaries.
为了切换几个关键二进制文件的所有权和设置它的用户切换,必须始终以root身份运行安装。
www.ibm.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/2/28 19:09:47