"cases"的翻译 使用英语:


  字典 中国人-英语

关键字 : Cases Fraud Hundreds Solve

  例子 (外部来源,未经审查)

Come to cases.
Come to cases, Teddy. Come to cases.
Trials In Progress Twenty Five Detainees in Nine Cases
Trials In Progress Twenty Five Detainees in Nine Cases
Vol. 50, pp. 140 44 (1956) (reporting two American cases).
Vol. 50, pp. 140 44 (1956) (reporting two American cases).
African Cases in International 1995쓪 2 920 2 060 71 34
African Cases in International Business
在特殊情况下 打扰 先生 in special cases.
in special cases.
that as many as 90 of all blackmail cases have a homosexual origin.
You know also, sir, that as many as 90 of all blackmail cases have a homosexual origin.
正在等待认证network interface doing dhcp request in most cases
Waiting for authorization
正在等待认证network interface doing dhcp request in most cases
Auto IP
正在等待认证network interface doing dhcp request in most cases
Configuring interface
Vol. 49, pp. 424 25 (1955) (discussing an American case and citing several European cases).
Vol. 49, pp. 424 25 (1955) (discussing an American case and citing several European cases).
Agrawal A and Ribot J.1999.Accountability in Decentralization A Framework with South Asian and West African Environmental Cases
Agrawal, A and Ribot J. 1999. Accountability in Decentralization A Framework with South Asian and West African Environmental Cases.
In these cases, only GEF funding is included in the present report, with the same information from other respondents omitted.
In these cases, only GEF funding is included in the present report, with the same information from other respondents omitted.
5 October 1991 Contro la delinquenza organizzata non c'è alternativa ai maxi processi (No alternatives to mega cases against organized crime)
He actively participated in the Vienna negotiations on the elaboration of the main Convention and of its three additional Protocols
61. quot Cases of the ICJ relating to employment in international organizations quot , published in Essays in Honour of JudgeႠRobertႠYewdall Jennings (1996).
61. quot Cases of the ICJ relating to employment in international organizations quot , published in Essays in Honour of Judge Robert Yewdall Jennings (1996).
In a single year, there are 200 300 million cases of malaria and 50 100 million cases of dengue fever worldwide. So Why haven t we found a way to effectively kill mosquitoes yet? Hadyn Parry presents a fascinating solution genetically engineering male mosquitoes to make them sterile, and releasing the insects into the wild, to cut down on disease carrying species.
In a single year, there are 200 300 million cases of malaria and 50 100 million cases of dengue fever worldwide. So Why haven t we found a way to effectively kill mosquitos yet? Hadyn Parry presents a fascinating solution genetically engineering male mosquitos to make them sterile, and releasing the insects into the wild, to cut down on disease carrying species.
In general, security by obscurity is one of the weakest forms of security. But in some cases, every little bit of extra security is desirable.
But in some cases, every little bit of extra security is desirable.
identification of concrete cooperative efforts, and in some cases joint actions, in the areas of (a) trade in services, (b) trade and environment, and(c) countries in accession to the WTO.
identification of concrete cooperative efforts, and in some cases joint actions, in the areas of (a) trade in services, (b) trade and environment, and(c) countries in accession to the WTO.
Name of SESAM message catalog file. In most cases, this directive is not neccessary. Only if the SESAM message file is not installed in the system's BS2000 message file table, it can be set with this directive.
In the Apache PHP module, this SESAM interface is configured using Apache directives.
50. A cross cultural comparison of juvenile offenders, offenses, due processes and societies The cases of Toledo, Ohio, and Rosario, Argentina (with Joseph W. Scott), Criminology , American Society of Criminology, vol. 11, No. 2, August 1973, pp. 183 205.
A cross cultural comparison of juvenile offenders, offenses, due processes and societies The cases of Toledo, Ohio, and Rosario, Argentina (with Joseph W. Scott), Criminology , American Society of Criminology, vol. 11, No. 2, August 1973, pp. 183 205.
Identifies as user with username and password. Identification is only valid for the current session. I do not thing this function will be needed very often. In most cases it will be easier to identify with the opening of the connection.
In most cases it will be easier to identify with the opening of the connection.
In a number of cases, such as the technical assistance to some Pacific SIDS in meteorological services, the support has been provided on a continuing uninterrupted multi year basis, pointing to the greater long term need for human resource development and capacity building in these countries.
In a number of cases, such as the technical assistance to some Pacific small island developing States in meteorological services, the support has been provided on a continuing, uninterrupted multi year basis, pointing to the greater long term need for human resource development and capacity building in these countries.
The module hides most of the complexity of Z39.50 so it should be fairly easy to use. It supports persistent stateless connections very similar to those offered by the various RDB APIs that are available for PHP. This means that sessions are stateless but shared amongst users, thus saving the connect and initialize phase steps in most cases.
This means that sessions are stateless but shared amongst users, thus saving the connect and initialize phase steps in most cases.
Providing that w here in occupied territory an individual protected person is detained as a spy or saboteur, or as a person under definite suspicion of activity hostile to the security of the Occupying Power, such person shall, in those cases where absolute military security so requires, be regarded as having forfeited rights of communication under the present Convention .
Providing that w here in occupied territory an individual protected person is detained as a spy or saboteur, or as a person under definite suspicion of activity hostile to the security of the Occupying Power, such person shall, in those cases where absolute military security so requires, be regarded as having forfeited rights of communication under the present Convention .
Benedetto Conforti and Angelo Labella, Invalidity and Termination of Treaties The Role of National Courts, 1 European Journal of International Law 44, 57 58 (1990) (discussing the effect of armed conflict as a subset of the rebus sic stantibus doctrine). See ibid., 57 n. 39 for an extensive list of cases in national courts dealing with the effect of armed conflict on treaties.
Benedetto Conforti and Angelo Labella, Invalidity and Termination of Treaties The Role of National Courts, 1 European Journal of International Law 44, 57 58 (1990) (discussing the effect of armed conflict as a subset of the rebus sic stantibus doctrine). See ibid., 57 n. 39 for an extensive list of cases in national courts dealing with the effect of armed conflict on treaties.
You may create different database users for every aspect of your application with very limited rights to database objects. The most required privileges should be granted only, and avoid that the same user can interact with the database in different use cases. This means that if intruders gain access to your database using one of these credentials, they can only effect as many changes as your application can.
You may create different database users for every aspect of your application with very limited rights to database objects.
蛁 The tag UserComment has the same problem as the Copyright tag. It can store two values first the encoding used and second the value itself. If so the IFD section only contains the encoding or a byte array. The COMPUTED section will store both in the entries UserCommentEncoding and UserComment. The entry UserComment is available in both cases so it should be used in preference to the value in IFD0 section.
If the user comment uses Unicode or JIS encoding and the module mbstring is available this encoding will automatically changed according to the exif ini settings.