保护模式

  • 网络protected mode;protection mode;protect mode;DPMI
保护模式保护模式
  1. Linux在保护模式下的中断处理分析

    Analysis of Linux Interrupt Procedure Based on Protected Mode

  2. Windows保护模式与DOS实模式通信编程技术

    Communication between Windows Protected Mode & DOS Real Mode

  3. PC在保护模式下的中断运行机制

    Interrupt Running System in Protection Mode in PC

  4. DOS扩展器与32位保护模式技术分析

    An Analysis of DOS Extender and 32 - Bit Protected - Mode Technology

  5. 保护模式DOS程序设计原理与方法

    Protected Mode DOS Programming Designing Principle and Method

  6. 在分析CNC系统多任务特点的基础上,介绍了CNC系统的多任务分类方法,并提出了基于通用32位操作系统、运行于保护模式下的多任务调度方法。

    Th principle of multitask coordination based on general 32 bit multitask operating system in CNC is proposed in this paper .

  7. TT系统保护模式的分析

    Analysis on Protection Models of TT System

  8. 保护模式下Pentium微处理器的存储管理方案

    Memory Management Scheme of Pentium Microprocessor in Protected Mode

  9. TRIPs协议规定了对于植物新品种权保护模式可以采取:专利法、有效的专门制度以及两种制度的结合。

    TRIPs Agreement pointed that there was three methods to protect new plant varieties : Patent law , effective special law , and integration of the two .

  10. 已有许多实践证明,商业化是最有效的历史街区保护模式,而RBD(RecreationBusinessDistrict,游憩商业区)的规划则是为其量身定做。

    It has proved that commercialization is the most effective protection pattern of the historical blocks , and the plan of RBD ( Recreation Business District ) is for its tailor-made .

  11. 但保护模式对于Gadget无效,因为Gadget是运行在本地计算机上,并且与本地文件以及API相互交互。

    Protected Mode is not applicable to gadgets as they are code present on the local computer and interact with files and APIs on the local computer .

  12. 该文提出了基于Windows软件注册的用户唯一性身份认证的软件产权保护模式,并给出了注册数据的混沌加密与解密和注册改写与检测算法。

    In this paper , we present a model used for software copyright protection based on the user 's unique feature registration in Windows , and algorithms used for data chaos encryption , decryption , and Windows registry inspection and modification .

  13. 支持IA-32保护模式的存储管理单元的设计与实现

    Design and Implementation of Memory Management Unit Based on IA-32 Protected Mode

  14. 全文共分为五章:导论部分分析了构建适应WTO体制的商标保护模式的研究意义,分析了国内外学者的研究状况,提出了本文的研究方法和研究思路。

    In the introduction , the author analyzes the research significance of constructing a trademark protection mode which is in accordance with WTO system , analyzing research situation of scholars abroad and domestic , and raises the research method and thinking of it .

  15. 然而,在CPU保护模式下,只有操作系统具有内存调度的权限,应用软件处理海量数据时只能依靠操作系统提供的内存调度算法。

    However , under the CPU protected mode , only the operating system have the right of memory scheduling , the application software can only rely on the memory scheduling algorithm provided by the operating system to process mass data .

  16. 采用决策判断树与TAM模型相结合建立分析模型,通过管理情景培训+问卷调查方式收集了数据,进行了实证研究,为不同保护模式下的用户采纳行为影响进行实证分析。

    The empirical analysis model is constructed by the combination of decision tree and TAM model . Data are collected by scenario training and questionnaires for different privacy protection modes .

  17. 给出了一种基于重合次数最少、快速隔离故障段线路的10kV配电网线路保护模式,即最少拍环网控制系统模式。

    A new type of distribution line protection mode for 10 kV power supply network & least beating loop network control system mode is introduced in this paper .

  18. IKE协商的安全参数包括加密及鉴别算法、加密及鉴别密钥、通信的保护模式(传输或隧道模式)、密钥的生存期等。IKE将这些安全参数构成的安全参数集合称为安全关联SA。

    The parameters negotiated by IKE include the arithmetic of encrypt and verification , the key used in encrypt and verification , the protecting pattern of communication ( transfers or tunnel pattern ) and the exist time of key .

  19. 深入了解IA-32体系结构中保护模式的功能,包括三种工作模式、地址变换机制、任务管理机制和异常调试机制。

    Studied the fuction of IA-32 protected mode , including three working modes , address transform mechanism , task management mechanism and exception debugging mechanism .

  20. 另一方面,随着微处理器技术和嵌入式应用的发展,出现了各种各样的高性能的嵌入式微处理器,并且普遍支持MMU和高级保护模式。

    On the another hand , along with the development of microprocessor and embedded application , there are many kind of high performance embedded processor supporting the MMU and high level protection mode .

  21. Intel的32位处理器(简称IA-32)体系结构中的保护模式是其独有的一套保护策略,也是各种商业化处理器中介绍极少的部分,其实现是设计兼容X86处理器的难点。

    Protected mode is a particular protect strategy in Intel ( IA-32 ), it 's also introduced by commerce processor rarely . Researching and implementing the protected mode is one of the difficulties in compatible micro-processor design .

  22. 本文在分析传统保护模式缺陷的基础上,提出了一种全新的数字电子资源知识产权保护模式&DOI保护法,并着重介绍了DOI对电子资源保护的特点和优势,预测了其美好前景。

    Analyzing the defects of traditional ways , the author brings up a full-new model of intellectual property protection of digital resources , DOI protection , then introduces the features and advantages of DOI protection , and finally pictures a good future for it .

  23. 论文针对电子资源的特点,提出了一种全新的数字电子资源知识产权保护模式&DOI保护法,并着重从电子资源DOI保护的可行性、它的优势和应用实例等方面加以阐述。

    Aiming at the distinguishing features of electronic resources , this paper brings up a fully new protection model of intellectual property of digital and electronic resources-DOI protection , and discusses the feasibility of DOI protection to electronic resources , its advantages , examples in life , and so on .

  24. 现代微处理器中最为重要的一种工作模式为保护模式。

    The most important mode in modem microprocessors is protected mode .

  25. 知识经济时代计算机软件的法律保护模式

    Protection Mode of Computer Software in law at knowledge Economy Times

  26. 第二,双轨制的保护模式在实践中存在着诸多的不便。

    Second , double protection mode in practice there exist many inconvenience .

  27. 旅游发展背景下的徽州文化遗产保护模式研究

    Research Concerning Huizhou Cultural Heritage Protection Pattern Relying on Tourism Development Background

  28. 辽宁非物质文化遗产的开发式保护模式

    Development-oriented Protection Mode for Nonmaterial Cultural Legacy of Liaoning Province

  29. 国内外数据库权益保护模式比较研究

    Comparative Study on Models of Database Rights Protection in Home and Abroad

  30. 实时操作系统保护模式下的内存管理策略

    A memory management scheme for real time operating systems under protection mode