SUCCED
2015年11月01日
車馬駄馬田 at 08:00 | Comments(0) | suc...
目次はこちら
SUCCED
$$ At this point, the taps from the succeeding delay elements have the symmetrically extended data values present upon them. / この時点で、連続する遅延素子からのタップには対称的に拡張されたデータ値が現れる。(USP5381354)
$$ "Failed communications attempt" means in this context a communications attempt which has not succeeded in being connected, at least at first instance. / “失敗の通信試行”はこの文脈では、少なくとも最初に接続するのに失敗の通信試行を意味する。(USP6775249)
$$ The second technique (retiring keys after a certain period) is particularly important since it provides a degree of damage limitation if an attacker succeeds in obtaining a secret key by limiting the period of time he can make use of it.(USP01037458)
$$ If this key request fails but the key management service succeeds in the authentication process with another gateway in the cluster, it simply sets the appropriate key and the client IP filter 1c will use it from then on.(USP01054158)
$$ In general, this is the most likely method to succeed of the methods of adaptation described herein though it is likely to require the most changes, and is therefore the most disruptive, and is the most computationally intensive.(USP02042274)
$$ This allows the MCC to proceed as quickly through the change sequence as it is able to determine that each previous step has succeeded.(USP02042274)
目次はこちら
SUCCED
$$ At this point, the taps from the succeeding delay elements have the symmetrically extended data values present upon them. / この時点で、連続する遅延素子からのタップには対称的に拡張されたデータ値が現れる。(USP5381354)
$$ "Failed communications attempt" means in this context a communications attempt which has not succeeded in being connected, at least at first instance. / “失敗の通信試行”はこの文脈では、少なくとも最初に接続するのに失敗の通信試行を意味する。(USP6775249)
$$ The second technique (retiring keys after a certain period) is particularly important since it provides a degree of damage limitation if an attacker succeeds in obtaining a secret key by limiting the period of time he can make use of it.(USP01037458)
$$ If this key request fails but the key management service succeeds in the authentication process with another gateway in the cluster, it simply sets the appropriate key and the client IP filter 1c will use it from then on.(USP01054158)
$$ In general, this is the most likely method to succeed of the methods of adaptation described herein though it is likely to require the most changes, and is therefore the most disruptive, and is the most computationally intensive.(USP02042274)
$$ This allows the MCC to proceed as quickly through the change sequence as it is able to determine that each previous step has succeeded.(USP02042274)
目次はこちら
※このブログではブログの持ち主が承認した後、コメントが反映される設定です。