| 1. | Mining students ' access patterns at teaching web sites 教学网站学生访问模式挖掘 |
| 2. | Group data with different data access patterns into separate pools 将有不同数据访问模式的数据统一放到不同的缓冲池中。 |
| 3. | The web usage mining mines web log records to discover users access patterns of web pages Web访问挖掘是通过分析web访问日志来发现用户访问web页面的模式。 |
| 4. | Association rules mining can be used in order to find out the user access pattern in electronic commerce 将关联规则挖掘技术运用到电子商务中用产访问模式发现中。 |
| 5. | With more and more business spread in internet , enterprise consentrate on the principle of access pattern 随着越来越多的业务在互联网上开展,用户使用web的规律成了各企业共同关注的一大热点。 |
| 6. | When you design a database , determine the likely access patterns of the data and combine frequently accessed data together 设计数据库时,应确定数据可能的访问模式,并将经常访问的数据放在一起。 |
| 7. | The indexes should be optimized based on the access patterns and query needs of the decision support environment of the data warehouse 索引应根据数据仓库决策支持环境中的访问模式和查询需求来进行优化。 |
| 8. | It discusses remote access patterns appearing in different implementations of the example use case versus separation of concerns and caching 讨论了实例用例和分离关注点以及高速缓存这些不同的实现中的远程访问模式。 |
| 9. | Moreover , as shown in the access pattern in e - commerce services , there will sooner or later be expectations to access the e - government over electronic devices like smart mobile phones and pdas 此外,从电子商贸的经验可以预见,市民迟早会期望利用智能流动电话和个人数码助理等电子设备接达电子政府。 |
| 10. | The first example implementation uses a technique where the initial design , as proposed by the standards used , suggests a non - optimal access pattern and causes performance problems 第一个实例的实现使用的是最初的设计方法,由于是按标准使用模式提出的,表明它不是最佳的访问模式,因此会引起性能问题。 |