1
کامپیوتر و شبکه::
بهروزرسانی امن
It is clear that we require new methodologies to accommodate safe update operations.
The model compares the primitive update and the safe update processes.
This can be justified since our aim is only to compare the primitive update with the safe updates.
This is because we will compare the same update operation for primitive and safe updates.
For safe update however, we need to check the values of all first child of element C.
واژگان شبکه مترجمین ایران