Примеры использования Traversal на Английском языке и их переводы на Русский язык
{-}
- 
                                                                                        Official
                                                                                    
- 
                                                                                        Colloquial
                                                                                    
The basis for such learning is graph traversal.
Tree traversal, recursion, and reuse of data.
Modeling requires easy traversal of all structures.
Essentially, DV-hop consists of two waves of network traversal.
Possible directory traversal in MIME-type transformation.
Keywords: data structures, search tree,tree traversal.
In a binary search tree, in-order traversal retrieves data in sorted order.
Formerly known as Radvision Scopia PathFinder Firewall Traversal.
Session Traversal Utilities for NAT(STUN) provides one way for an application to traverse a NAT.
The first algorithm carries out an analysis of the graph based on its traversal.
A simple recursive traversal algorithm that visits each node of a BST is the following.
It was discovered that the WebDAV servlet is vulnerable to absolute path traversal.
Over the course of the game, Atreus helps in combat, traversal, exploration, and puzzle-solving.
Traversal across the mesh, as might be needed for collision detection, can be accomplished efficiently.
A remote authenticated attacker can use path traversal sequences e.g.
Post-order traversal while deleting or freeing nodes and values can delete or free an entire binary tree.
A remote attacker can exploit this flaw to access system files via a directory traversal attack.
However, EFSM state graph traversal problem seems to be nontrivial because of guard conditions that enable model transitions.
Your site will be protected silently, blocking SQL injection attacks,executable file uploads, directory traversal attacks and user-ID phishing.
Traversal Using Relay NAT(TURN) is a protocol that allows a client to obtain IP addresses and ports from such a relay.
The approximation is referred toas the farthest-point clustering(FPC) algorithm, or farthest-first traversal.
Morris traversal is an implementation of in-order traversal  that uses threading: Create links to the in-order successor.
In such graph, to one arc number correspond,generally speaking, multiple arcs, one of which is chosen nondeterministically for traversal.
Jakub Wilk discovered that arj does not sufficiently protect from directory traversal while unpacking an arj archive containing file paths with multiple leading slashes.
It controls access to the network by video conferencing systems,regulates bandwidth use and provides firewall traversal with VCS Expressway.
Jakub Wilk discovered that arj does not sufficiently protect from directory traversal while unpacking an arj archive containing file paths with multiple leading slashes.
Michal Marek discovered that ruby-archive-tar-minitar, a Ruby library that provides the ability to deal withPOSIX tar archive files, is prone to a directory traversal vulnerability.
This gives more direct, constant time,access to traversal and topology of various elements but at the cost of increased overhead and space in maintaining indices properly.
To allow IPsec-based traffic to pass through a NAT device,you must ensure that NAT Traversal(NAT-T) is supported on your IPsec peer computers.
This second phase does not require a tree traversal; it can be done linearly, and typically involves a simple replacement of intermediate-language operations with their corresponding opcodes.