快好知 kuaihz


virtual machine造句
1. Basilisk is an embeddable data engine and virtual machine. 2. Decrypt every layers to access the Virtual Machine. 3. Aggressive virtual machine consolidation requires a performance trade-off. 4. Extending the virtual machine instruction set to support generics was deemed unacceptable, because that might make it prohibitively difficult for JVM vendors to update their JVM. 5. With concept of reference monitor and function of virtual machine monitor, a novel approach for protecting integrity of kernel was designed. 6. Add-ons let you modify the virtual machine configuration during deployment without the need to modify and save a new image configuration. 7. By debugging the virtual machine, the test and verification of the organization and microprogram was completed. 8. Microsoft Virtual Machine is owned and copyrighted by Microsoft Corporation. 9. In the J 2 SE Java virtual machine, the class verifier is responsible for rejecting invalid class files. 10. In the design, a virtual machine monitor was used as reference monitor by our adding reference monitor module into it. 11. In essence, the Java Virtual Machine ( JVM ) becomes the network operating system. 12. Through vmware s aix interface, a snapshot of virtual machine operation. pdf for example code. 13. All the non-deterministic events occurred in the virtual machine are recorded at the hypervisor layer, and the system execution stream recurs during replay by event emulation. 14. A virtual machine running under VM / 370 that supports data communication terminals. 15. Through direct device access, the influence of Virtual Machine (VM) on system performance could be decreased. Meanwhile, current device drivers could be used by guest operating systems. 16. The system will also support message passing models such as parallel virtual machine and the high performance Fortran extensions of Fortran 90. 17. In Figure 1, you can see that each software stack (operating system and applications) is an isolated virtual machine (VM). 18. In this paper, we proposed a parallel BP neural network learning algorithm with the support of PC cluster under the circumstance of PVM(Parallel Virtual Machine). 19. QEMU includes a monitor console that allows you to inspect a running guest operating system as well as control various aspects of the virtual machine (VM). 20. A hacker can become a highly privileged user with administrative controls and get out of a virtual machine and then execute malicious programs on the hypervisor. 21. The first thing the script does is create a target directory to hold the new virtual machine. 22. Unfortunately for Java programmers, most clustering systems are built around C-based software messaging APIs such as Message Passing Interface (MPI) or Parallel Virtual Machine (PVM). 23. This instruction is the Virtual RET implemented in the Virtual Machine. 24. To further promote the adoption of OVF based packages, we have developed tools to assist those interested in representing virtual machine/virtual appliances in OVF distributable format. 25. If it offers possibility to write processor module, you can even write a disassembler for the Virtual Machine and thus, do a full static analysis of the whole thing. 26. The core of DM 3 - ADB rule execution module is to construct a virtual machine. 26.try its best to gather and create good sentences. 27. This is one of the reasons why we decided to create the Process Virtual Machine (PVM) technology. 28. Pressing the START button exits the bootstrap loader and starts the virtual machine. 29. The script engine has some components, include symbol table, lexical analyzer, parser, semantic checker, intermediate code generator, optimizer, code generator, virtual machine. 30. In Hyper-V, installation of integration components creates an important pairing between each virtual machine and the primary partition.