x
uploads/erasure.jpg

erasure n.擦掉;刪去,刪去部分[語句];涂擦痕跡。

erbium

It turns out that the compiler actually inserts casts into the code during compilation to account for the fact that type erasure reduces the precision of the types of certain expressions 事實證明編譯器確實在編譯階段將數據類型轉換插入到代碼中,這樣做是為了解決類型擦除會降低某些表達式的類型的精度這一事實。

The experimental result shows that inter - batch optical erasure time constant , f , is much longer than intra - batch optical erasure time constant , e , which agrees well with the theoretical prediction 實驗測出的多重全息光柵的各批間光擦除時間常數f遠大于每批內光柵間的擦除時間常數e ,與理論預期一致。

Beyond , the pacific , dim and vast , was raising on its sky - line tumbled cloud - masses that swept landward , giving warning of the first blustering breath of winter . the erasure of summer was at hand 再往外,縹緲浩瀚的太平洋升起在天際,驅趕著滾滾云團向大陸襲來,已在聲勢煊煊地發出寒冬的呼嘯的第一道警報。

In the meantime , simulations of cascaded low - density erasure codes based on a few types of special sequences of degree distribution available are given , together with performance analyses on these codes . 4 同時,對基于幾類現有典型度分布序列的級聯型低密度糾刪碼進行了模擬仿真及性能分析; 4

Take all reasonably practicable steps to ensure that personal data are protected against unauthorised or accidental access , processing , erasure or other use 采取一切合理可行的步驟,以保障個人資料不會為未獲準許的人士查閱、處理、刪除或作其他用途,也不會意外地為人查閱、處理、刪除或作其他用途;

To take all reasonably practicable steps to ensure that personal data held are protected against unauthorised or accidental access , processing , erasure or other use ; and 采取一切合理而切實可行的步驟,確保個人資料受到保障,不會在未經許可或意外的情況下被他人查閱、處理、刪除或作其他用途;

The system uses erasure codes as a means to recreate data in the event that one or more servers fail . the implementation described can tolerate failure rates that approach 33 % 本系統使用一個erasurecode作為恢復方案,能夠在部分分片丟失的情況將數據文件恢復,其容忍的失敗率可以達到33 。

In order to narrow the wide distribution of the erasure threshold voltage and eliminate the over - erased cells , a self - convergence soft - programming scheme is also proposed 論文同時還提出一種新型的自收斂sibe軟編程操作模式,對過擦除存儲單元的閾值電壓分布具有很好的收斂效果。

Based on the known principle of fixed points in mathematical analysis , a sufficient convergence condition of the erasure recover algorithm for low - density erasure codes is shown . 5 基于著名的不動點原理,證明了低密度糾刪碼的刪除錯誤恢復算法穩定收斂的一充分條件; 5

Taking all reasonably practicable steps to ensure that personal data are protected against unauthorized or accidental access , processing , erasure or other use 采取所有合理可行的步驟,以確保個人資料受保障而不受未獲準許的或意外的查閱、處理、刪除或其他使用所影響;

Furthermore , the exposure schedule for recording holograms with equalized diffraction efficiency is designed based on the above - mentioned optical erasure time constants 并且依據上述兩種光擦除時間常數,為分批存儲熱固定多重全息圖的等衍射效率記錄設計了曝光時序。

This dissertation also studies double - erasure - correcting codes and double - erasure data layouts . a new double - erasure data layout method is proposed in this dissertation 本文還對雙故障容錯編碼和雙故障數據布局問題進行了研究,并提出了一種新的雙故障數據布局方法。

Yet ink on paper is lacking in one of the essential traits of computer displays : instantaneous erasure and reuse , millions of times without wearing out 不過,電腦螢幕有一項基本特質:隨時可以刪除再重寫,而且反覆幾百萬次也不會磨損這是紙上油墨所不及的。

The destruction caused by alzheimer ' s disease has been likened to the erasure of a hard drive , beginning with the most recent files and working backward 有人將阿茲海默癥對人腦造成的傷害,比喻成硬碟資料的刪除:先從最近儲存的檔案開始,然后再刪除舊的檔案。

The destruction caused by alzheimer ' s disease has been likened to the erasure of a hard drive , beginning with the most recent files and working backward 有人將阿茲海默癥對人腦造成的傷害,比喻成硬盤數據的刪除:先從最近儲存的檔案開始,然后再刪除舊的檔案。

This dissertation put forward to a new multi - erasures - correcting data layout : the two - level networked stripe ( tns ) . compared with other multi - erasures - correcting data layouts 本文提出了二級網絡條紋( tns : two - levelnetworkedstripe )多容錯數據布局方法。

Take all reasonably practicable steps to ensure that personal data are protected against unauthorised or accidental access , processing , erasure or other use 采取所有合理和切實可行的步驟以保障個人資料不受未獲準許的或意外的查閱處理刪除或其他使用所影響

Firstly , in the data layout , raid still is a single - erasure - correcting code . it doesn ’ t fit to the high availability requirement in the mass storage systems 具體表現在:在數據布局方面, raid仍然是單容錯布局,不能適應大容量存儲系統對可靠性的要求。

The virus can manifest itself in several ways including signs on the screen regarding its existence , erasure of memory or destruction of hard drive contents 病毒的出沒方式有幾種,包括在屏幕的標志上顯示其存在,擦除記憶或破壞硬磁碟的內容。