用invocation造句子,“invocation”造句

來源:國語幫 5.51K

In this case, we wish to use the deferred response invocation pattern described earlier.

This mechanism can be used, for example, to externally configure process's database access or service invocation address.

Some classes retain state information from one method invocation to the next, and it is difficult to make such classes thread-safe in any practical way.

This encryption is applied to all IP packets and is not enabled or disabled on a per application or per service invocation basis.

For database designs that require shredding some or all of the contents of XML data, invocation of this stored procedure can be particularly useful after a bulk load of XML or BLOB data.

The invocation is basically unattended and synchronous.

Technical Note: Evaluated variables are compiled on every invocation, the compiled versions are not saved!

This includes the different types of invocation available and how you can use them within the standard aggregation patterns.

An invocation of an operation provided by a process: For example, a claims handling process supports the cancellation of a claim while the process is currently running.

Synchronous - If the consumer crashes while blocking as the service runs, when it restarts it has no way of reconnecting to the invocation in progress, so the response is lost.

invocation造句

Indigo supports two major approaches to the service invocation.

The details of external process invocation are mediated to insulate protocol and format differences.

This form of layering does have its own drawbacks because its bakes in assumptions of location agnosticity and synchronicity of invocation into the higher order service units.

Finally, another constraint on named parameters is that once you provide a name for a parameter in a method invocation, then the rest of the parameters appearing after it must also be named.

The powerful impulse for co-operation is materialism based on rapid economic development: the antithesis of Tagore’s invocation.

However, what if the application wanted to track other data such as the value of certain variables or even attempt to profile the code by recording the duration of a particular function invocation?

Map the user's identity associated with the web service invocation to a Shared pseudonym for use between different security domains.

Therefore, the adapter instantiates this new service capability and any implementation of this invocation functionality.

Non-blocking single transport pattern: in this invocation pattern, you achieve a non-blocking call using only a single transport connection underneath.

Do this invocation twice and watch the output console.

熱門標籤