Please help us improve the quality of example sentences! Edit on Github

传统的数据库仅仅在显式的指令下才执行某个操作。Traditional DBMS is operated only under the explicit instructions.

表1-7是预约DBMS布局的一个逻辑模型的例子。Tables 1-7 indicate a sample logical model of the Reservation DBMS layout.

Other words in sentence

HBASE是一个时态数据库管理系统原型,它的SQL解释器是用面向对象的方法实现的。Hbase is a Prototype of Temporal DBMS. Its SQL Interpreter is Implemented by OOP Method.

此种方法可封闭非法用户的权限,大大提高数据库管理软件的安全性。This method can occlude the invalid user and greatly improve the security of the DBMS software.

国防、政府、金融等要害部门对自主、安全的数据库管理系统提出了非常迫切的要求。At the same time the vital departments such as national defense, government, finance demand a safe DBMS.

文中提出了一种新的用于关系数据库查询缓冲和预取的方法。In this report, we explore a new approach toward intelligent caching and prefetching for data query of DBMS.

为了便于对工作中信息的科学化、合理化的管理,人们根据各种需要设计出适合需要的数据库管理系统。In order to manage the information more scientific and more rational, we designed the DBMS based what we need.

Other words in sentence

时空数据库管理系统是能够同时处理时态数据和空间数据的数据库管理系统。Spatio-temporal database management system is a kind of DBMS that can deal with both spatial and temporal data.

对基于反馈回路的自调优模型的基础上设计与实现DBMS资源自调优工具进行了研究。In this paper, a self-tuning model of dynamic- tinning of resource of DBMS was brought forward based on feedback model.

DSPS的身份认证模块通过主体映射将用户的身份映射为不可信DBMS的账号。The authentication module of DSPS maps the user's identity to user account in untrusted DBMS through principal mapping.

传统数据库的安全是通过访问控制、身份鉴别、授权控制等方面进行保障的。The security of the traditional DBMS is safeguarded by access control, user authentication, accredit control and so on.

本平台已经广泛使用于开目系列软件中,并且使得开目设计、工艺、管理软件都能基于国内主流数据库运行。The platform has been used widely in series softwares of Kaimu, and makes these softwares run on the basis of mainstream DBMS.

Other words in sentence

指出采用分层扩展的方法在非时态DBMS上实现时态数据处理的方法是现阶段切实可行的方法。Itis point out that it is a viable method for processing temporal data in non-temporalDBMS to extend non-temporal DBMS layered.

入侵容忍数据库研究的目标是利用不可信的数据库管理系统构建可信的数据库应用系统。The aim of intrusion tolerance database is to utilize unauthentic DBMS to structure the believable database application system.

但在第二个方法中我们另外创建了一个DB-aware对象层,专门用来读写DBMS的数据。But in our second approach we created an additional layer of DB-aware objects that specialized in getting data into and out of the DBMS.

结合数据信息的这些特点,文中对数据库系统的设计与优化、数据的完整性与一致性、数据冗余的处理等问题作了详细的论述。So the paper thoroughly discusses the design and optimization of DBMS system, integrality and consistence of the data and data redundancy.

本文针对数据库管理系统中缓冲区的特殊重要地位,介绍了多缓冲池的配置及自调优的概念。This paper introduces the concept of configuring and self-tuning multiple buffer pools according to the specialty of the buffer area in DBMS.

Other words in sentence

ORACLE8数据库管理系统作为一种面向网络计算,并支持对象关系模型的产品已得到了广泛的应用。As one of DBMS which are aimed at network computing and supports object-oriented relational model, ORACLE8 has gotten wide-ranging application.

通过引入二维表保存元数据信息,提出了一种基于DBMS的新型元数据管理策略。This paper introduced the two-dimension table to preserve the metadata and proposed a new management strategy for metadata which based on DBMS.

该文根据本单位设计和实现XML和数据库数据转换中间件的理论和实践知识,对XML和数据库结合技术进行探讨。This paper mainly demonstrates XML- DBMS data transferring middleware and introduces other technology of combining XML and database by the way.