作业帮 > 英语 > 作业

英语翻译有3个段落,有点长.下文中的DIGITAL SHADOW 可以翻译为数字阴影或者数字影像.不要用在线翻译一下就复

来源:学生作业帮 编辑:作业帮 分类:英语作业 时间:2024/07/09 08:53:29
英语翻译
有3个段落,有点长.下文中的DIGITAL SHADOW 可以翻译为数字阴影或者数字影像.不要用在线翻译一下就复制上来的.
One entity’s influence,denoted by its virtual identity,is not restricted to the one service it consumes.It could be said that such a presence occupies many network nodes and service support functions in the overall architecture.We have termed this data and its associated functions the digital shadow.The digital shadow thus represents the entity’s uses and sessions,and contains the required information and the endpoint devices in the communication and service provisioning.The
digital shadow is thus the projection of a virtual identity onto the logical nodes that compose the architecture,and denotes the logical end points and used interim nodes,as depicted in Figure 1.5 Access to and manipulation of the digital shadow is tightly controlled and restricted to the entity itself and authorized providers that know the virtual identity and the context of its use.Even so,authorized providers may be further restricted to the sessions in which they are directly involved.
A virtual identity is a sub-set of the digital information about a user ([4]).A user may have more than one virtual identity to represent the different personas and aspects of its service usage.More than a question of personalization,this mechanism should ensure the user’s privacy across the aspects of its personality.A virtual identity may contain data relevant to many services and networks,including subscriptions,identifiers,service preferences,etc.While its logical understanding is that the information may be available from any point in the architecture,the information itself can be distributed and limited to access by only some entities.As described in Figure 4,the virtual identity can then be used in a transparent way to gain access to the network,services and even perform operations in the “real world”.
The digital shadow allows the user to excerpt its influence over multiple devices simultaneously by associating its virtual identity with those devices.In a similar manner,the user’s influence goes beyond owned devices,since it affects routers,proxies,servers,etc.This information can all be harnessed,for the user’s benefit,and provided to cross-domain and cross-layer operations.One example is that low level queuing information from a user’s flow in a router is provided to a higher
level routing function to provide a better service to that particular user.
还有一段........
By scoping the information in a digital shadow,we limit its influence across domains.While some information is only valuable within the boundaries of a device,other is valuable across domains.General policies of the services,legal and user should reflect the privacy level of the operation and whether it is successful or not.The scoping of the information also means that a piece of data may be different depending on scope (or context).The difference may be caused by the source or access control on the data
一个虚拟网络身份所代表的真实用户的影响并不局限于一种网络服务.可以说,这影响到了整体架构中的很多网络节点和服务支持功能.我们将这个数据及其相关功能称为数字阴影.因此数字阴影代表该使用者的使用和人机会话,并包含所需的信息以及通信和服务提供的终端设备.因此,数字阴影是一个虚拟身份在逻辑节点构成的体系结构上的投射,表示逻辑终点和使用过的临时节点,如图1.5所示.访问和操纵数字阴影被严格控制,仅限实体本身以及授权人员在虚拟身份和环境下使用.即便如此,授权人员可能会被进一步限制直接参与对话.
一个虚拟身份是用户数字信息的子集合([4]).一个用户可能有多个虚拟的身份,代表不同的人物角色和使用范围.所以这个机制应确保用户在其多个虚拟身份中的隐私.一个虚拟身份相关的数据可能包含许多服务和网络,包括订阅、身份识别、服务优惠等.虽然信息本身只分布和限制在一些用户所利用的通道,但按逻辑来讲,这些信息从架构中的任何一点都可被获取.正如图4所描述的,虚拟身份可以用一种透明的方式来访问网络、服务,甚至执行“真实世界”里的操作.
数字阴影允许用户通过其影响力关联虚拟身份使用的设备.类似的,用户的影响力超越了其拥有的设备,因为它影响到路由器,代理服务器,服务器等.这些信息都可以被用户为自己的利益所利用,并提供跨域和跨层操作.举例说,低级别用户信息通过路由器被传到一个更高的层次,为该特定用户提供更好的服务.
我们通过监控数字阴影内的信息限制其在该领域的影响力.虽然一些信息只是在一个设备的服务范围有价值,但另一些则是在整个领域中都有价值.通用政策和服务、用户应反映私人的操作,以及它成功与否.监控信息也意味着一部分数据可能有所不同,这种差别可能是由于对数据源或访问的控制引起的.
--------------------------
这200分挣得太辛苦,725字呢,打字都用几小时.楼主的财富值又不是真金白银~加分啊!
--------------------------
淘宝店 译嘉翻译