释义 |
traceback 英treɪs'bæk美treɪs'bæk iWeb⁴³²⁵⁶ 基本例句 追溯¹⁰⁰ The preceding part of the error message shows the context where the exception happened, in the form of a stack traceback. 错误信息的前面部分显示了异常发生的上下文,并以调用栈的形式显示具体信息。 wiki.ubuntu.org.cn After media verification it may give a Traceback error in the blue area of the screen. 在验证媒体之后,它可能会在屏幕上的蓝色区域显示一个 Traceback错误。 ibm Also, your local alignment doesn't need to end at the end of either sequence, so you don't need to start your traceback in the bottom-right corner; you can start it in the cell with the highest score. 而且,局部比对不需要到达任何一个序列的末端,所以也不需要从右下角开始回溯:可以从得分最高的单元格开始回溯。 ibm As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback. 攻击者使用 IP欺骗来隐藏自己的真实地址,因此人们开始研究 IP源回溯技术。 dictall But this gives an opportunity to DDoS attackers, that is, it makes the source IP traceback hardly. 但这也给分布式拒绝服务攻击提供了机会,使得追踪到攻击源非常困难。 kns50.chkd.cnki.net Finally, in the traceback, you start with the cell that has the highest score and work back until you reach a cell with a score of 0. 最后,在回溯的时候,从得分最高的单元格开始,回溯到得分为0的单元格为止。 ibm If the test method does not run as anticipated, we will get an error and a traceback describing the error. 如果测试方法没有按预期运行,我们将得到一个错误以及描述这个错误的回溯。 ibm If no address is provided, it takes the current registers to traceback the stack. 如果没有提供地址,那么它采用当前寄存器来回溯堆栈。 ibm In order to coordinate monitoring Agents with each other in tracing the source of network attack by sharing the tracing data, a traceback method based on collaborative mechanism was proposed. 为了在分布式网络追踪系统中协调监控代理,及时共享多点采集的追踪数据合作定位网络攻击源,提出一种基于协同机制的攻击源追踪方法。 cnki IP traceback is an important way to defend against distributed denial of service attack. IP追踪是防御分布式拒绝服务攻击的重要方法。 joca Listing9 shows the traceback. 清单9给出了相应的跟踪。 ibm Otherwise, it assumes the provided address as a valid stack frame start address and attempts to traceback. 否则,它假定所提供的地址是有效的堆栈帧起始地址并设法进行回溯。 ibm Probabilistic Packet Marking for IP Traceback was proposed to defend against distributed denial- of- service attacks. 数据包抽样标记技术是为了应对分布式拒绝服务攻击而提出的一种 IP追踪技术。 cnki Probabilistic packet marking PPM is a practical and effective method for IP traceback of denial-of- serviceDoS attack. 随机数据包标记 PPM是对拒绝服务攻击进行 IP回溯的一种实用而有效的方法。 cnki This paper advanced the programming method and some techniques during soft implementation of viterbi decoding using the traceback algorithm on the basis of the analysis of viterbi decoding theory. 本文在分析维特比译码原理的基础上,提出了用软件编程实现回溯方式的维特比译码的设计方法和处理技巧。 dictall This system has three functions: misused detection, anomaly detection, and attack source traceback. 该系统实现了误用检测、异常检测、攻击源追踪三个方面的功能。 fabiao Varies IP traceback algorithms are studied. On the basis of advanced marking scheme AMS, two dimensional threshold reconstruction algorithm is given. 深入研究现有各种反向追踪算法,在 AMS算法的基础上,给出了二维门限重构算法。 fabiao When a context stack frame needs to be logically inserted between standard stack frames, the affected function actually, the function's traceback table is flagged with an indicator. 当需要按照逻辑将上下文堆栈帧插入到标准的堆栈帧之间的时候,可以使用一个指示器标记受到影响的函数事实上,是函数的回溯表。 ibm Without any argument, it does a traceback for all processes. 若不带任何参数,它就对所有进程执行回溯。 ibm |