保护模式
- 网络protected mode;protection mode;protect mode;DPMI
-
Linux在保护模式下的中断处理分析
Analysis of Linux Interrupt Procedure Based on Protected Mode
-
Windows保护模式与DOS实模式通信编程技术
Communication between Windows Protected Mode & DOS Real Mode
-
PC在保护模式下的中断运行机制
Interrupt Running System in Protection Mode in PC
-
DOS扩展器与32位保护模式技术分析
An Analysis of DOS Extender and 32 - Bit Protected - Mode Technology
-
保护模式DOS程序设计原理与方法
Protected Mode DOS Programming Designing Principle and Method
-
在分析CNC系统多任务特点的基础上,介绍了CNC系统的多任务分类方法,并提出了基于通用32位操作系统、运行于保护模式下的多任务调度方法。
Th principle of multitask coordination based on general 32 bit multitask operating system in CNC is proposed in this paper .
-
TT系统保护模式的分析
Analysis on Protection Models of TT System
-
保护模式下Pentium微处理器的存储管理方案
Memory Management Scheme of Pentium Microprocessor in Protected Mode
-
TRIPs协议规定了对于植物新品种权保护模式可以采取:专利法、有效的专门制度以及两种制度的结合。
TRIPs Agreement pointed that there was three methods to protect new plant varieties : Patent law , effective special law , and integration of the two .
-
已有许多实践证明,商业化是最有效的历史街区保护模式,而RBD(RecreationBusinessDistrict,游憩商业区)的规划则是为其量身定做。
It has proved that commercialization is the most effective protection pattern of the historical blocks , and the plan of RBD ( Recreation Business District ) is for its tailor-made .
-
但保护模式对于Gadget无效,因为Gadget是运行在本地计算机上,并且与本地文件以及API相互交互。
Protected Mode is not applicable to gadgets as they are code present on the local computer and interact with files and APIs on the local computer .
-
该文提出了基于Windows软件注册的用户唯一性身份认证的软件产权保护模式,并给出了注册数据的混沌加密与解密和注册改写与检测算法。
In this paper , we present a model used for software copyright protection based on the user 's unique feature registration in Windows , and algorithms used for data chaos encryption , decryption , and Windows registry inspection and modification .
-
支持IA-32保护模式的存储管理单元的设计与实现
Design and Implementation of Memory Management Unit Based on IA-32 Protected Mode
-
全文共分为五章:导论部分分析了构建适应WTO体制的商标保护模式的研究意义,分析了国内外学者的研究状况,提出了本文的研究方法和研究思路。
In the introduction , the author analyzes the research significance of constructing a trademark protection mode which is in accordance with WTO system , analyzing research situation of scholars abroad and domestic , and raises the research method and thinking of it .
-
然而,在CPU保护模式下,只有操作系统具有内存调度的权限,应用软件处理海量数据时只能依靠操作系统提供的内存调度算法。
However , under the CPU protected mode , only the operating system have the right of memory scheduling , the application software can only rely on the memory scheduling algorithm provided by the operating system to process mass data .
-
采用决策判断树与TAM模型相结合建立分析模型,通过管理情景培训+问卷调查方式收集了数据,进行了实证研究,为不同保护模式下的用户采纳行为影响进行实证分析。
The empirical analysis model is constructed by the combination of decision tree and TAM model . Data are collected by scenario training and questionnaires for different privacy protection modes .
-
给出了一种基于重合次数最少、快速隔离故障段线路的10kV配电网线路保护模式,即最少拍环网控制系统模式。
A new type of distribution line protection mode for 10 kV power supply network & least beating loop network control system mode is introduced in this paper .
-
IKE协商的安全参数包括加密及鉴别算法、加密及鉴别密钥、通信的保护模式(传输或隧道模式)、密钥的生存期等。IKE将这些安全参数构成的安全参数集合称为安全关联SA。
The parameters negotiated by IKE include the arithmetic of encrypt and verification , the key used in encrypt and verification , the protecting pattern of communication ( transfers or tunnel pattern ) and the exist time of key .
-
深入了解IA-32体系结构中保护模式的功能,包括三种工作模式、地址变换机制、任务管理机制和异常调试机制。
Studied the fuction of IA-32 protected mode , including three working modes , address transform mechanism , task management mechanism and exception debugging mechanism .
-
另一方面,随着微处理器技术和嵌入式应用的发展,出现了各种各样的高性能的嵌入式微处理器,并且普遍支持MMU和高级保护模式。
On the another hand , along with the development of microprocessor and embedded application , there are many kind of high performance embedded processor supporting the MMU and high level protection mode .
-
Intel的32位处理器(简称IA-32)体系结构中的保护模式是其独有的一套保护策略,也是各种商业化处理器中介绍极少的部分,其实现是设计兼容X86处理器的难点。
Protected mode is a particular protect strategy in Intel ( IA-32 ), it 's also introduced by commerce processor rarely . Researching and implementing the protected mode is one of the difficulties in compatible micro-processor design .
-
本文在分析传统保护模式缺陷的基础上,提出了一种全新的数字电子资源知识产权保护模式&DOI保护法,并着重介绍了DOI对电子资源保护的特点和优势,预测了其美好前景。
Analyzing the defects of traditional ways , the author brings up a full-new model of intellectual property protection of digital resources , DOI protection , then introduces the features and advantages of DOI protection , and finally pictures a good future for it .
-
论文针对电子资源的特点,提出了一种全新的数字电子资源知识产权保护模式&DOI保护法,并着重从电子资源DOI保护的可行性、它的优势和应用实例等方面加以阐述。
Aiming at the distinguishing features of electronic resources , this paper brings up a fully new protection model of intellectual property of digital and electronic resources-DOI protection , and discusses the feasibility of DOI protection to electronic resources , its advantages , examples in life , and so on .
-
现代微处理器中最为重要的一种工作模式为保护模式。
The most important mode in modem microprocessors is protected mode .
-
知识经济时代计算机软件的法律保护模式
Protection Mode of Computer Software in law at knowledge Economy Times
-
第二,双轨制的保护模式在实践中存在着诸多的不便。
Second , double protection mode in practice there exist many inconvenience .
-
旅游发展背景下的徽州文化遗产保护模式研究
Research Concerning Huizhou Cultural Heritage Protection Pattern Relying on Tourism Development Background
-
辽宁非物质文化遗产的开发式保护模式
Development-oriented Protection Mode for Nonmaterial Cultural Legacy of Liaoning Province
-
国内外数据库权益保护模式比较研究
Comparative Study on Models of Database Rights Protection in Home and Abroad
-
实时操作系统保护模式下的内存管理策略
A memory management scheme for real time operating systems under protection mode