Trying to learn how to translate from the human translation examples.
From: Machine Translation
Suggest a better translation
Quality:
From professional translators, enterprises, web pages and freely available translation repositories.
error while retrieving the folderlist
அடைவு பட்டியலை திரும்பப்பெறும் போது பிழை
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
an error occurred while retrieving the printer list.
à® à®à¯à®à¯à®ªà¯à®ªà¯à®±à®¿à®ªà¯ பà®à¯à®à®¿à®¯à®²à¯à®ªà¯ பà¯à®±à¯à®µà®¤à®¿à®²à¯ பிழà¯.
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
an error occurred while retrieving the printer list:
அச்சுப்பொறிகளின் பட்டியலைப் பெறுவதில் தவறு:
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
an error occurred while retrieving the list of available backends:
à®à®°à¯à®à¯à®à¯à®®à¯ பினà¯à®©à®£à®¿à®à®³à®¿à®©à¯ பà®à¯à®à®¿à®¯à®²à¯ à®®à¯à®à¯à®à¯à®à¯à®à¯à®à¯à®®à¯à®ªà¯à®¤à¯ à®à®°à¯ பிழ௠நà¯à®°à¯à®¨à¯à®¤à¯à®³à¯à®³à®¤à¯:
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
colors and fonts
comment
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
the unicode() function returns a unicode code point for the first character in a text string.
இந்த code () செயல்பாடு உரை சரத்தியிலுள்ள முதல் எழுத்தை எண் குறிமுறையாக தரும்.
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
retrieving the access control list on folder %1 failed. the server returned: %2
அடைவு% 1ல் அனுமதி கட்டுப்பாடு பட்டியலை மீட்டெடுக்க முடியவில்லை. சேவகன் திரும்பியது:% 2
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
korganizer colors and fonts configuration
கேஅமைப்பவர் வண்ணங்களின் கட்டமைப்புname
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
key-state dependent colors and fonts in the certificates list
key- state தொடர்புடைய வண்ணங்கள் மற்றும் விசைப் பட்டியலிலுள்ள எழுத்துருக்கள்
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
use accessibility stylesheet selecting this option will allow you to define a default font, font size, and font color with a few simple clicks of the mouse. simply wander over to the customize... dialog and pick out your desired options.
quot; தனிப்பயனக்குquot; பாணித்தாளில் அணுகலுக்கான தாள்களை பயன்படுத்து இந்த தாளுக்கு போவதன் மூலம் விருப்பமான நிறம், எழுத்துரு ஆகியவற்றை எளிதாக எலியை வைத்து சில கிளிக்குளில் அமைக்கலாம்.
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
yahooin cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. unfortunately, the integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. however, public auditing on the integrity of shared data with these existing mechanisms will inevitably reveal confidential information, identity privacy to public verifiers. this paper proposes a novel privacy-preserving mechanism that supports public auditing on shared data stored in the cloud. it particularly exploits ring signatures to compute verification metadata needed to audit the correctness of shared data. with this mechanism, the identity of the signer on each block in shared data is kept private from public verifiers, who are able to efficiently verify shared data integrity without retrieving the entire file. in addition, this mechanism is able to perform multiple auditing tasks simultaneously instead of verifying them one by one. the experimental results demonstrate the effectiveness and efficiency of the mechanism when auditing shared data integrity.
'to yahooin cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. unfortunately, the integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. however, public auditing on the integrity of shared data with these existing mechanisms will inevitably reveal confidential information, identity privacy to public verifiers. this paper proposes a novel privacy-preserving mechanism that supports public auditing on shared data stored in the cloud. it particularly exploits ring signatures to compute verification metadata needed to audit the correctness of shared data. with this mechanism, the identity of the signer on each block in shared data is kept private from public verifiers, who are able to efficiently verify shared data integrity without retrieving the entire file. in addition, this mechanism is able to perform multiple auditing tasks simultaneously instead of verifying them one by one. the experimental results demonstrate the effectiveness and efficiency of the mechanism when auditing shared data integrity.
Last Update: 2014-11-28
Usage Frequency: 1
Quality:
Reference: