说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 拼贴攻击
1)  collage-attack
拼贴攻击
1.
The experimental results demonstrate that these algoˉrithms can locate the tampered area and detect the"collage-attack"to the watermarked image.
实验结果表明,采用这两种算法实现的水印不仅具有良好的篡改区域定位功能,而且能够有效地克服“拼贴攻击”。
2.
It is showed by experiments results that the proposed algorithm can detect any change made to an image, including the change in pixel values and image size, and can detect the "collage-attack" and the "substitution-attack" based on Hash collision.
实验结果表明,该算法可以检测出任意像素值的改动、图像大小的改变,并且可以检测出拼贴攻击和基于Hash碰撞的替换攻击。
2)  Collage [英]['kɔlɑ:ʒ]  [美][kə'lɑʒ]
拼贴
1.
The Utopia thought in collage city;
拼贴城市中的乌托邦思想
2.
Collage and Pastiche——On the Parody Techniques in Ulysses;
拼贴与仿作——《尤利西斯》中的戏拟技法
3)  pastiche [英][pæ'sti:ʃ]  [美][pæ'stiʃ]
拼贴
1.
The Pastiche in the novel contains picture pastiche and word pastiche,so narrating is fragmentary.
伯格的《一个后现代主义者的谋杀》,是一部典型的后现代主义小说,大量采用了拼贴和戏仿的手法。
2.
This paper mainly demonstrates the three typical postmodern features reflected in White Noise,namely parody,blurring of life and fiction,and pastiche that well suits the author\'s postmodern concern.
唐·德里罗(Don Delillo)最富影响的作品《白噪音》(White Noise)是一部极具后现代写作特征的小说,本文的写作目的就是从戏仿,虚拟和现实的模糊以及拼贴这三个艺术风格来分析《白噪音》的后现代主义特征,旨在展现美国的后现代生活,表现作者对社会问题的关注。
4)  Aggression [英][ə'ɡreʃn]  [美][ə'grɛʃən]
攻击
1.
Relationship Between Rorschach Aggression Variables and Explicit Hostility;
罗夏测验攻击变量与外显攻击敌意的关系
2.
Rorschach Aggression Variables:A Study of Reliability and Validity;
罗夏测验攻击变量的信度效度研究
3.
Correlation between Personality and Rorschach Aggression Variables;
人格特征与罗夏测验攻击变量的相关性研究
5)  Attack [英][ə'tæk]  [美][ə'tæk]
攻击
1.
The prevention technology for ARP virus attack;
浅谈ARP病毒攻击的防御技术
2.
Prevention of attack on overflowing loopholes in buffer of Linux system;
对Linux系统缓冲区溢出漏洞攻击的防范
6)  attacking [英][ə'tæk]  [美][ə'tæk]
攻击
1.
This paper deeply analyses the principle and possiblility of buffer overflow attacking,and buffer overflow s potential dangers according to program code with buffer overflow.
针对C程序语言本身存在的不进行数组边界检查,容易产生缓冲区溢出,进而产生系统瘫痪等缺陷,对缓冲区溢出的原理和溢出攻击进行了详细的阐述。
2.
This paper briefly introduces the general outline of the Okamato E cash scheme and one attacking method against this scheme,discusses the attacking principles and provides some mends and reinforcements for the Okamato E cash schem
本文简要综述了电子货币的发展研究过程 ,分析了Okamoto电子货币体系的特点 ,剖析了一种攻击方法 ,对攻击方法做出了理论分析 ,在此基础上探讨了几种抵御攻击的方案 ,最后提出了一种改进的电子货币系
3.
This paper, based on the theory of IPv6, analyzes the security problem of IPv6 and a couple of classic attacking methods and briefly describes the research on information security.
论文从移动IPv6的基本原理入手,分析移动IPv6存在的安全隐患及几种典型的攻击方法,并对其安全性进行了简单的探讨。
补充资料:照相拼贴法

照相拼贴法(Photo-collage):蒙太奇照相是拍摄或放大时,把不同画面合成到一起的方法,而照相拼贴法是将已经拍得照片,经过裁剪拼贴后构成新的画面的一种表现方法。

说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条