「Protocol」の共起表現一覧(1語右で並び替え)
該当件数 : 941件
communicates using the Microsoft Notification | Protocol, a proprietary instant messaging protocol. |
Nonetheless, for any more natural | protocol a proof of security in the random oracle mode |
As part of the trial | protocol, a volunteer must have begun drug treatment i |
hitects of the Secure Sockets Layer (SSL) 3.0 | protocol, a cryptographic protocol for secure communic |
In the new version of the | protocol, a block would only be retransmitted on timeo |
mber 15, 1994 to boost support for the Lusaka | Protocol, a peace agreement signed in August that trie |
l traces back to 1986 with the signature of a | protocol about immediate sharing of information and mu |
It is the minimum version of the | protocol accepted by .NET Messenger Service after Micr |
In addition, the | Protocol added Article 21 bis, Limitation of Productio |
d BASIC and included the Xmodem file transfer | protocol added by Jordan. |
argued that the convention and Article 47 of | Protocol Additional to the Geneva Conventions of 12 Au |
Furthermore, under | Protocol Additional to the Geneva Conventions of 12 Au |
g, through the use of “proxies,” the Internet | Protocol addresses from which their attacks originated |
The | Protocol adds a provision to Article 36 allowing for " |
ailment itself, and the train operator failed | protocol after passing through the switch. |
The | Protocol against the Smuggling of Migrants by Land, Se |
wo Palermo protocols, the other one being the | Protocol against the Smuggling of Migrants by Land, Se |
s decision-making process during the Montreal | Protocol Agreement, which has resulted in a near elimi |
Erasmus Bilateral Agreements and other | protocol agreements were developed. |
Twitter's OAuth (authentication | protocol) allowed instant registration for members who |
entry for developers than the original Z39.50 | protocol, allowing the relatively small market for lib |
an Internet chat system with an inter-server | protocol allowing clients to be distributed across man |
The MOS | protocol allows a variety of devices to be controlled |
The | protocol allows for a consumer to query a datasource o |
The syntax of the Z39.50 | protocol allows for very complex queries. |
author of the book The Art of the Metaobject | Protocol, along with Jim Des Rivieres and Daniel G. Bo |
The | Protocol also adds a provision to Article 22 stating t |
The | Protocol also addresses policies and legislation, thou |
This | protocol also allows communication between multiple in |
y of colleges and universitiesCreation of the | protocol also served as a common ground initiative on |
The | Protocol also authorized the Commission on Narcotic Dr |
Protocol also toured with New Order, Fisherspooner, Th | |
hat captures the music and religious services | protocol among the Gullah community in Beaufort, South |
Up to version 0.4 of the | protocol, an intermediate element between nodes and wa |
nthesis, including the Jung "non-aldol aldol" | protocol, an alternate method for obtaining aldol prod |
er work formed the basis of the U.N. Montreal | Protocol, an international agreement to protect the oz |
Protocol analysis is considered with respect to an unb | |
It can be used for computer network | protocol analysis and security auditing. |
Assessment of awareness; | protocol analysis |
Snort performs | protocol analysis, content searching, and content matc |
Wireshark & Ethereal Network | Protocol Analyzer Toolkit, Syngress Publishing, ISBN 9 |
the Syngress' Wireshark and Ethereal Network | Protocol Analyzer Toolkit and Ethereal Packet Sniffing |
in Java, and contains plugins for I2C and SPI | protocol analyzers. |
give early and favorable consideration to the | Protocol and give its advice and consent to ratificati |
g his arm around Elizabeth II (breaking royal | protocol) and having his photo taken. |
ginal development of RFB (remote framebuffer) | protocol and VNC, the desktop sharing technology |
WASTE is a peer-to-peer and friend-to-friend | protocol and software application developed by Justin |
ver the network using the standard remote X11 | protocol and rendered on the client machine. |
nded Iraq of its obligations under the Geneva | Protocol and to unconditionally remove and destroy all |
ll European countries have ratified the Kyoto | Protocol, and all have supported strong reductions in |
he Angolan government to implement the Lusaka | Protocol and other agreements. |
Note the difference between this | protocol, and an earlier (technologically unrelated) p |
implementation of the Acordos de Paz, Lusaka | Protocol and relevant Security Council resolutions was |
eed for the full implementation of the Lusaka | Protocol and other agreements, and supported adjustmen |
It uses XMPP | protocol and adheres to GNOME's published human interf |
, Zephyr was designed as an instant messaging | protocol and application-suite with a heavy Unix backg |
en they were used in the 1987 film The Fourth | Protocol, and after closure in numerous productions, i |
ws can then be built without knowledge of the | protocol and format with which messages are sent to an |
Nevertheless, Sixtus IV quarrelled over | protocol and prerogatives of jurisdiction, was unhappy |
plementation of the Peace Accords, the Lusaka | Protocol and relevant Security Council resolutions, an |
the people of Saskatchewan, via the Office of | Protocol and Honours, to a royal person to mark a visi |
ing to their website, "none have [cracked the | protocol], and plenty have tried." |
Minister Stephen Harper criticizing the Kyoto | Protocol and the scientific basis of anthropogenic glo |
ccess the on chip debug interface, a specific | protocol and tight timing with distinct voltage levels |
ogy, typically considered to be a 4G wireless | protocol, and a candidate for the replacement of curre |
Intelligent and scalable rule-based routing | protocol and matching algorithm |
tely fulfill its obligations under the Lusaka | Protocol and Security Council resolutions, including f |
eveloped standards such as the Internet Cache | Protocol and Summary Object Interchange Format, and sp |
He signed Amasya | Protocol and at the end of the Sivas Congress in 1920, |
propriate choice of suffix following language | protocol), and clause-final conjunctives or sentence e |
il discussed the implementation of the Lusaka | Protocol, and extended the mandate of the United Natio |
obligations under the Acordos de Paz, Lusaka | Protocol and relevant Security Council resolutions. |
from activities inconsistent with the Lusaka | Protocol and to respect UNITA as a political party. |
obligations under the Acordos de Paz, Lusaka | Protocol and relevant Security Council resolutions. |
between two protocols calls the introductory | protocol and the final protocol or eschatocol. |
-based request/response protocols - a signing | protocol and a verifying protocol. |
implementation of the Accordos de Paz, Lusaka | Protocol and relevant Security Council resolutions was |
uzzer text messaging employs the popular XMPP | protocol and its internet telephony employs the Sessio |
author of the Zimmermann-Sassaman key-signing | protocol, and was an organizer of the protests followi |
scaling as part of its PCL 5 printer control | protocol, and Intellifont technology was shipped with |
, an interface with the internet via Internet | Protocol, and any other point of communication involvi |
s the Senate Chair for the Joint Committee on | Protocol and he was the chair of the Frederick County |
young children, they are largely governed by | protocol and cannot enjoy the freedom of the White Hou |
e obtained simultaneously and by a consistent | protocol and are therefore comparable across a large n |
By 17 February 2006 6 States had ratified the | Protocol and a further 24 had signed the Protocol but |
This was regarded as a serious violation of | protocol, and Charlton was temporarily relegated to th |
ere applicable, START I, including the Lisbon | Protocol; and maintain fully effective export controls |
Marrakech, where the USA boycotted the Kyoto | protocol and still ignores the Charter." |
nd video system, meeting rooms, banquet hall, | protocol and VIP lounge, business centre, information |
he new DoD Sexual Assault Response policy and | protocol and submit their plan to the Services in acco |
il reaffirmed that the Acordos de Paz, Lusaka | Protocol and relevant Security Council resolutions for |
Area established by a Swaziland/South Africa | Protocol and will be known as "Lake Jozini Transfronti |
d using the Mobile IP standard communications | protocol and including the IPSec security standards. |
the Urs ceremony at the same time to maintain | protocol and to avoid a situation in which who would p |
It only works with the OSCAR | protocol and if both chat partners use Trillian. |
support version 3.8 of the Remote Framebuffer | Protocol and can handle most known VNC encodings. |
ssaging, streaming media (Real Time Messaging | Protocol) and many developer productivity tools. |
y into getting House to conform with hospital | protocol, and argues that House's division is losing $ |
sten silently for weather alerts via the SAME | protocol and then sound an alarm to warn the listener |
e latest versions also support the BitTorrent | protocol and Shoutcast radio stations. |
is responsible for defining the HL7 standard | protocol and is composed of Standing Administrative Co |
he Internet to orbit, using both the Internet | Protocol and Mobile IP. |
purpose was to bring experience in procedure, | protocol and amending and introducing legislation. |
xample, the TCP is a request-response pattern | protocol, and the UDP has a one-way pattern. |
implementation of the Acordos de Paz, Lusaka | Protocol and relevant Security Council resolutions whi |
isters begin to appear, the CDC is called per | protocol and institutes a lockdown. |
S, SES, MFS and SAAS) is run on the FLEX 1600 | protocol, and can be monitored through several website |
DomainKeys was issued as a "historical" | protocol and DKIM was issued as its standards-track re |
Mizar uses the Chess Engine Communication | Protocol and can run under the popular chess interface |
RoF technology is also | protocol and bit-rate transparent, hence, can be emplo |
elivery and Financing, the Joint Committee on | Protocol, and the Joint Committee on Administrative, E |
Australian | Protocol and Procedures, 1982 |
The SPARQL | Protocol and RDF Query Language uses a similar N3 subs |
s of the Euphrates-Tigris river system is the | protocol annexed to the 1946 Treaty of Friendship and |
This breach of | protocol antagonized the French command. |
The treaty's | Protocol applies to aircraft which can carry at least |
Since late 2004 phonecalls through the VoIP | protocol are integrated. |
Clinical trials using a CDR | protocol are also reported for clinicians attempting t |
Parties to the | Protocol are further obligated to adopt measures to en |
ore the country concerned joined the Optional | Protocol are not permitted. |
everal traditions banned or deprecated by the | Protocol are common. |
racters which would not be allowed in the IRC | protocol are escaped. |
st European countries that did not ratify the | Protocol are expected to suffer from increasing air po |
After approval by the director, the Office of | Protocol arranges for a new star to be placed on the W |
validates the approach to use of the Internet | Protocol articulated by Keith Hogie with NASA Goddard |
not need access to the exact rotor cited in a | protocol, as long as the K-factor can be calculated. |
ng development of the BitTorrent peer-to-peer | protocol, as well as the ongoing development of µTorre |
fections are treated with the same medication | protocol as the T. canis or T. catis roundworm infecti |
ting the client-side of the SSH file transfer | protocol as implemented by the sftp-server command by |
References that cite the Istanbul | Protocol as a useful tool in the efforts to combat tor |
political wing of UNITA, violated the Lusaka | Protocol as well as UN-imposed sanctions. |
erating officer of the Office of the Chief of | Protocol, as well as Acting Chief of Protocol in the a |
The interlock | protocol, as described by Ron Rivest and Adi Shamir, w |
on Sector (ITU-T) adopted the Common Alerting | Protocol as Recommendation X.1303. |
A | protocol as defined in computer science uses a more fo |
Bush dismissed Kyoto | Protocol as too costly, describing it as "an unrealist |
According to Canadian | protocol, as a former Prime Minister, she is styled "T |
The | protocol aspects of this should be coordinated closely |
This | protocol assumes that it is run over a secure channel, |
Marlinspike presented attacks on the SSL/TLS | protocol at Black Hat USA 2009, which demonstrated way |
In March 1999: He became Chief of Royal | Protocol at the Royal Court. |
Section 2 of Article 6 allows a Party to the | Protocol at their discretion only to prosecute if the |
supports the HSDPA ("3.5G") mobile telephony | protocol at 7.2Mbps. |
It originally used the Server Message Block | protocol atop either the NetBIOS Frames protocol (NBF) |
23 countries have signed but not ratified the | protocol: Australia, Austria, Belgium, Burkina Faso, C |
e of the flexibility of the instant messaging | protocol, based on XML, and a number of extensions dev |
HTTP(P2P) is a | protocol based on HTTP. |
fone, Zfone and ZRTP, a newer and secure VoIP | protocol based on modern VoIP standards. |
rticipants was high” and recommended that the | protocol be tested in controlled, double-blind trials. |
anned since 1 January 1996 under the Montreal | Protocol because of its ozone-depleting potential. |
(often implemented using the two-phase-commit | protocol), because although both types of transactions |
Initial design of Beyond | Protocol began in 1991. |
Her role as Chief of | Protocol began as a volunteer for then-San Francisco m |
Work on the Z39.50 | protocol began in the 1970s, and led to successive ver |
for each Traveline region with the JourneyWeb | protocol being used to manage journeys between Traveli |
have detailed understanding of the format or | protocol being tested. |
R, in 1989 the USSR condemned the 1939 secret | protocol between Nazi Germany and itself that had led |
Following the LR reaction | protocol between the entry and the destination vectors |
nt, where he served as provincial director of | protocol between 1979 and 1984 and as an assistant dep |
It is, however, possible to execute SKE | protocol between two users and use the generated key t |
A similar | protocol between Bulgaria and the Republic of Macedoni |
el plus a set of generic services and several | protocol bindings for these services, including SOAP a |
to: Antarctic Treaty, Antarctic-Environmental | Protocol, Biodiversity, Climate Change, Desertificatio |
In 2001 he developed the MANOLITO | protocol, Blubster and Piolet - two peer-to-peer file- |
In the North Berwick | Protocol Books (NAS-B56/1/1) Robert Lauder younger of |
synchronous File Transfer (SAFT), an Internet | protocol bound to TCP port 487 |
to 1928, he served as Director General of the | Protocol Branch. |
oth the royals and the mayor deny any serious | protocol breach. |
The | Protocol bringing under International Control Drugs Ou |
uses Twisted for its low-level networking and | Protocol Buffers for protocol description. |
Protocol buffers - "Google's lingua franca for data", | |
Google's | protocol buffers use a similar format to have compact |
messages demonstrate how composition works in | Protocol Buffers (they both use Point). |
ized objects and objects created using Google | Protocol Buffers; |
DG Scripts, Oasis OLC, Mud Client Compression | Protocol, bug fixes, and more. |
purchased the property, formerly known as The | Protocol Building, in August 2008. |
IETF by publishing 4 Internet Drafts of their | protocol, but the standard was never ratified. |
at Japan might achieve the goals of the Kyoto | Protocol, but her idea has not been realized yet. |
ut under the current schedule of the Montreal | Protocol, but can continue to be used in new HVAC equi |
Many dosbots use the IRC | protocol, but some use their own custom protocols. |
StreamCast, that originally used the Opennap | protocol, but later supported many different peer-to-p |
I'm not sure of the exact | protocol, but they would have needed joint UK/US autho |
t Kit from Millipore is based on the standard | protocol, but enables processing of a large number of |
erpreting this as a personal attack, disobeys | protocol by taking a shuttle craft without Kathryn Jan |
ons in the Kodori Valley and the signing of a | protocol by both parties on April 2, 2002. |
After violating | protocol by meeting with her parents, she was transfer |
d a native look, and support for the Kerberos | protocol by modified servers. |
1. Adoption of the Hiroshima-Nagasaki | Protocol by the 2010 NPT Review Conference |
ng the Hungarians could explain the Byzantine | protocol by which, in the exchange of ambassadors unde |
q further specified the nature of the earlier | protocol by forming a joint committee on technical iss |
ents honor commitments set forth by the Kyoto | Protocol, by conducting in unison peaceful demonstrati |
to Interior Director and Head of palaces and | protocol by decree of July 29, 1935 (Tunisia) . |
to enact provisions giving effect to the 2003 | Protocol by affirmative Order in Council. |
Austria declared Denmark in violation of the | Protocol, by the November Constitution, which Christia |
alm in the Kodori Valley and the signing of a | protocol by both parties on April 2, 2002. |
CTCP extends the original IRC | protocol by allowing users to query other clients for |
the DS among themselves communicate through a | protocol called the Database Support Protocol. |
company has evolved from using a proprietary | protocol called TSMP (Time Synchronized Mesh Protocol) |
ing platform has its own native communication | protocol called Sola Access Information Language (SAIL |
The AR and the AS communicate through a | protocol called the Application Support Protocol which |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |