1
کامپیوتر و شبکه::
ادهاک
Sys- tems that we use today, see Chapter 4, compose protection domains from a combination of subjects, including users, their groups, aliases, and ad hoc permissions.
Initially, the techniques to identify covert channels in software was ad hoc, but researchers developed systematic techniques to enable the discovery of covert channels.
Addressing timing channels is a more ad hoc procedure, but is a consideration throughout the design.
We imagine that such filtering is done in an ad hoc manner, but its description is not detailed.
However, the distribution and use of resources is controlled by the privileged VM in an ad hoc manner.
واژگان شبکه مترجمین ایران
3
عمومی::
موردی
Process safety performance expectations are shared with employees in an ad hoc fashion.
Responsibilities and accountabilities for process safety roles are addressed in an ad hoc fashion.
Training or counseling is provided on this topic in an ad hoc fashion.
Management relies on ad hoc mechanisms for receiving such information.
Process safety concerns, issues, suggestions, and recommendations are generally resolved, with resolution monitored in an ad hoc fashion.
واژگان شبکه مترجمین ایران