英文字典中文字典


英文字典中文字典51ZiDian.com



中文字典辞典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z       







请输入英文单字,中文词皆可:

rollicking    音标拼音: [r'ɑlɪkɪŋ]
a. 闹玩的;任性的;活泼的

闹玩的;任性的;活泼的

rollicking
adj 1: given to merry frolicking; "frolicsome students
celebrated their graduation with parties and practical
jokes" [synonym: {coltish}, {frolicsome}, {frolicky},
{rollicking}, {sportive}]

Rollic \Rol"lic\ (r[o^]l"l[i^]k), v. i. [imp. & p. p.
{Rollicked} (-l[i^]kt); p. pr. & vb. n. {Rollicking}.]
[Corrupt. fr. frolic, under the influence of roll.]
To move or play in a careless, swaggering manner, with a
frolicsome air; to frolic; to sport; commonly in the form
rollicking. [Colloq.]
[1913 Webster]

He described his friends as rollicking blades. --T.
Hook.
[1913 Webster] Rollejee
Rolliche


请选择你想看的字典辞典:
单词字典翻译
rollicking查看 rollicking 在百度字典中的解释百度英翻中〔查看〕
rollicking查看 rollicking 在Google字典中的解释Google英翻中〔查看〕
rollicking查看 rollicking 在Yahoo字典中的解释Yahoo英翻中〔查看〕





安装中文字典英文字典查询工具!


中文字典英文字典工具:
选择颜色:
输入中英文单字

































































英文字典中文字典相关资料:


  • Efficiency and Security Evaluation of Lightweight . . .
    The security analysis of AES-128, SPECK, and ASCON for resource-constrained devices highlights the different trade-offs in terms of security and efficiency Many researchers have conducted and provided a detailed security analysis of the chosen algorithms
  • Performance and Security Trade-offs of Lightweight . . .
    This paper explores the trade-offs between performance and security in lightweight cryptographic protocols specifically designed for IoT deployments
  • Lightweight cryptographic algorithms for resource-constrained . . .
    It has become a challenging task to secure resource-constrained devices in IoT, radio frequency identification (RFID) tags, wireless sensor network (WSN) nodes, etc Therefore, lightweight cryptographic algorithms have been developed to provide adequate security in such devices
  • FORTIFYING THE EDGE: A MULTI-PRONGED STRATEGY
    limited processing power, memory, and battery life These constraints often necessitate the implementation of lightweight security proto ols, which may come at the expense of robustness Traditional NAC mechanisms, designed for resource-rich computing environments, often prove inadequate
  • Securing IoT Using Lightweight Cryptography: A Review
    authors acknowledge the trade-offs between security and resource constraints in IoT and suggest that a one-size-fits-all approach may not be suitable Instead, they advocate for a nuanced approach where the choice of lightweight cryptography
  • Lightweight Cryptography Algorithms for Resource-Constrained . . .
    In this paper, we are focusing on these resource-constrained IoT devices (such as RFID tags, sensors, smart cards, etc ) as securing them in such circumstances is a challenging task The communication from such devices can be secured by a mean of lightweight cryptography, a lighter version of cryptography
  • The Security Trade-Offs in Resource Constrained Nodes for IoT . . .
    Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices Nevertheless, security cost in terms of energy consumption has not been studied sufficiently





中文字典-英文字典  2005-2009