「Protocol」の共起表現(1語右で並び替え) - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > Protocolの意味・解説 > Protocolに関連した共起表現

「Protocol」の共起表現一覧(1語右で並び替え)

該当件数 : 941



communicates using the Microsoft Notification Protocol, a proprietary instant messaging protocol.
Nonetheless, for any more natural protocol a proof of security in the random oracle mode
As part of the trial protocol, a volunteer must have begun drug treatment i
hitects of the Secure Sockets Layer (SSL) 3.0 protocol, a cryptographic protocol for secure communic
In the new version of the protocol, a block would only be retransmitted on timeo
mber 15, 1994 to boost support for the Lusaka Protocol, a peace agreement signed in August that trie
l traces back to 1986 with the signature of a protocol about immediate sharing of information and mu
It is the minimum version of the protocol accepted by .NET Messenger Service after Micr
In addition, the Protocol added Article 21 bis, Limitation of Productio
d BASIC and included the Xmodem file transfer protocol added by Jordan.
argued that the convention and Article 47 of Protocol Additional to the Geneva Conventions of 12 Au
Furthermore, under Protocol Additional to the Geneva Conventions of 12 Au
g, through the use of “proxies,” the Internet Protocol addresses from which their attacks originated
The Protocol adds a provision to Article 36 allowing for "
ailment itself, and the train operator failed protocol after passing through the switch.
The Protocol against the Smuggling of Migrants by Land, Se
wo Palermo protocols, the other one being the Protocol against the Smuggling of Migrants by Land, Se
s decision-making process during the Montreal Protocol Agreement, which has resulted in a near elimi
Erasmus Bilateral Agreements and other protocol agreements were developed.
Twitter's OAuth (authentication protocol) allowed instant registration for members who
entry for developers than the original Z39.50 protocol, allowing the relatively small market for lib
an Internet chat system with an inter-server protocol allowing clients to be distributed across man
The MOS protocol allows a variety of devices to be controlled
The protocol allows for a consumer to query a datasource o
The syntax of the Z39.50 protocol allows for very complex queries.
author of the book The Art of the Metaobject Protocol, along with Jim Des Rivieres and Daniel G. Bo
The Protocol also adds a provision to Article 22 stating t
The Protocol also addresses policies and legislation, thou
This protocol also allows communication between multiple in
y of colleges and universitiesCreation of the protocol also served as a common ground initiative on
The Protocol also authorized the Commission on Narcotic Dr
Protocol also toured with New Order, Fisherspooner, Th
hat captures the music and religious services protocol among the Gullah community in Beaufort, South
Up to version 0.4 of the protocol, an intermediate element between nodes and wa
nthesis, including the Jung "non-aldol aldol" protocol, an alternate method for obtaining aldol prod
er work formed the basis of the U.N. Montreal Protocol, an international agreement to protect the oz
Protocol analysis is considered with respect to an unb
It can be used for computer network protocol analysis and security auditing.
Assessment of awareness; protocol analysis
Snort performs protocol analysis, content searching, and content matc
Wireshark & Ethereal Network Protocol Analyzer Toolkit, Syngress Publishing, ISBN 9
the Syngress' Wireshark and Ethereal Network Protocol Analyzer Toolkit and Ethereal Packet Sniffing
in Java, and contains plugins for I2C and SPI protocol analyzers.
give early and favorable consideration to the Protocol and give its advice and consent to ratificati
g his arm around Elizabeth II (breaking royal protocol) and having his photo taken.
ginal development of RFB (remote framebuffer) protocol and VNC, the desktop sharing technology
WASTE is a peer-to-peer and friend-to-friend protocol and software application developed by Justin
ver the network using the standard remote X11 protocol and rendered on the client machine.
nded Iraq of its obligations under the Geneva Protocol and to unconditionally remove and destroy all
ll European countries have ratified the Kyoto Protocol, and all have supported strong reductions in
he Angolan government to implement the Lusaka Protocol and other agreements.
Note the difference between this protocol, and an earlier (technologically unrelated) p
implementation of the Acordos de Paz, Lusaka Protocol and relevant Security Council resolutions was
eed for the full implementation of the Lusaka Protocol and other agreements, and supported adjustmen
It uses XMPP protocol and adheres to GNOME's published human interf
, Zephyr was designed as an instant messaging protocol and application-suite with a heavy Unix backg
en they were used in the 1987 film The Fourth Protocol, and after closure in numerous productions, i
ws can then be built without knowledge of the protocol and format with which messages are sent to an
Nevertheless, Sixtus IV quarrelled over protocol and prerogatives of jurisdiction, was unhappy
plementation of the Peace Accords, the Lusaka Protocol and relevant Security Council resolutions, an
the people of Saskatchewan, via the Office of Protocol and Honours, to a royal person to mark a visi
ing to their website, "none have [cracked the protocol], and plenty have tried."
Minister Stephen Harper criticizing the Kyoto Protocol and the scientific basis of anthropogenic glo
ccess the on chip debug interface, a specific protocol and tight timing with distinct voltage levels
ogy, typically considered to be a 4G wireless protocol, and a candidate for the replacement of curre
Intelligent and scalable rule-based routing protocol and matching algorithm
tely fulfill its obligations under the Lusaka Protocol and Security Council resolutions, including f
eveloped standards such as the Internet Cache Protocol and Summary Object Interchange Format, and sp
He signed Amasya Protocol and at the end of the Sivas Congress in 1920,
propriate choice of suffix following language protocol), and clause-final conjunctives or sentence e
il discussed the implementation of the Lusaka Protocol, and extended the mandate of the United Natio
obligations under the Acordos de Paz, Lusaka Protocol and relevant Security Council resolutions.
from activities inconsistent with the Lusaka Protocol and to respect UNITA as a political party.
obligations under the Acordos de Paz, Lusaka Protocol and relevant Security Council resolutions.
between two protocols calls the introductory protocol and the final protocol or eschatocol.
-based request/response protocols - a signing protocol and a verifying protocol.
implementation of the Accordos de Paz, Lusaka Protocol and relevant Security Council resolutions was
uzzer text messaging employs the popular XMPP protocol and its internet telephony employs the Sessio
author of the Zimmermann-Sassaman key-signing protocol, and was an organizer of the protests followi
scaling as part of its PCL 5 printer control protocol, and Intellifont technology was shipped with
, an interface with the internet via Internet Protocol, and any other point of communication involvi
s the Senate Chair for the Joint Committee on Protocol and he was the chair of the Frederick County
young children, they are largely governed by protocol and cannot enjoy the freedom of the White Hou
e obtained simultaneously and by a consistent protocol and are therefore comparable across a large n
By 17 February 2006 6 States had ratified the Protocol and a further 24 had signed the Protocol but
This was regarded as a serious violation of protocol, and Charlton was temporarily relegated to th
ere applicable, START I, including the Lisbon Protocol; and maintain fully effective export controls
Marrakech, where the USA boycotted the Kyoto protocol and still ignores the Charter."
nd video system, meeting rooms, banquet hall, protocol and VIP lounge, business centre, information
he new DoD Sexual Assault Response policy and protocol and submit their plan to the Services in acco
il reaffirmed that the Acordos de Paz, Lusaka Protocol and relevant Security Council resolutions for
Area established by a Swaziland/South Africa Protocol and will be known as "Lake Jozini Transfronti
d using the Mobile IP standard communications protocol and including the IPSec security standards.
the Urs ceremony at the same time to maintain protocol and to avoid a situation in which who would p
It only works with the OSCAR protocol and if both chat partners use Trillian.
support version 3.8 of the Remote Framebuffer Protocol and can handle most known VNC encodings.
ssaging, streaming media (Real Time Messaging Protocol) and many developer productivity tools.
y into getting House to conform with hospital protocol, and argues that House's division is losing $
sten silently for weather alerts via the SAME protocol and then sound an alarm to warn the listener
e latest versions also support the BitTorrent protocol and Shoutcast radio stations.
is responsible for defining the HL7 standard protocol and is composed of Standing Administrative Co
he Internet to orbit, using both the Internet Protocol and Mobile IP.
purpose was to bring experience in procedure, protocol and amending and introducing legislation.
xample, the TCP is a request-response pattern protocol, and the UDP has a one-way pattern.
implementation of the Acordos de Paz, Lusaka Protocol and relevant Security Council resolutions whi
isters begin to appear, the CDC is called per protocol and institutes a lockdown.
S, SES, MFS and SAAS) is run on the FLEX 1600 protocol, and can be monitored through several website
DomainKeys was issued as a "historical" protocol and DKIM was issued as its standards-track re
Mizar uses the Chess Engine Communication Protocol and can run under the popular chess interface
RoF technology is also protocol and bit-rate transparent, hence, can be emplo
elivery and Financing, the Joint Committee on Protocol, and the Joint Committee on Administrative, E
Australian Protocol and Procedures, 1982
The SPARQL Protocol and RDF Query Language uses a similar N3 subs
s of the Euphrates-Tigris river system is the protocol annexed to the 1946 Treaty of Friendship and
This breach of protocol antagonized the French command.
The treaty's Protocol applies to aircraft which can carry at least
Since late 2004 phonecalls through the VoIP protocol are integrated.
Clinical trials using a CDR protocol are also reported for clinicians attempting t
Parties to the Protocol are further obligated to adopt measures to en
ore the country concerned joined the Optional Protocol are not permitted.
everal traditions banned or deprecated by the Protocol are common.
racters which would not be allowed in the IRC protocol are escaped.
st European countries that did not ratify the Protocol are expected to suffer from increasing air po
After approval by the director, the Office of Protocol arranges for a new star to be placed on the W
validates the approach to use of the Internet Protocol articulated by Keith Hogie with NASA Goddard
not need access to the exact rotor cited in a protocol, as long as the K-factor can be calculated.
ng development of the BitTorrent peer-to-peer protocol, as well as the ongoing development of µTorre
fections are treated with the same medication protocol as the T. canis or T. catis roundworm infecti
ting the client-side of the SSH file transfer protocol as implemented by the sftp-server command by
References that cite the Istanbul Protocol as a useful tool in the efforts to combat tor
political wing of UNITA, violated the Lusaka Protocol as well as UN-imposed sanctions.
erating officer of the Office of the Chief of Protocol, as well as Acting Chief of Protocol in the a
The interlock protocol, as described by Ron Rivest and Adi Shamir, w
on Sector (ITU-T) adopted the Common Alerting Protocol as Recommendation X.1303.
A protocol as defined in computer science uses a more fo
Bush dismissed Kyoto Protocol as too costly, describing it as "an unrealist
According to Canadian protocol, as a former Prime Minister, she is styled "T
The protocol aspects of this should be coordinated closely
This protocol assumes that it is run over a secure channel,
Marlinspike presented attacks on the SSL/TLS protocol at Black Hat USA 2009, which demonstrated way
In March 1999: He became Chief of Royal Protocol at the Royal Court.
Section 2 of Article 6 allows a Party to the Protocol at their discretion only to prosecute if the
supports the HSDPA ("3.5G") mobile telephony protocol at 7.2Mbps.
It originally used the Server Message Block protocol atop either the NetBIOS Frames protocol (NBF)
23 countries have signed but not ratified the protocol: Australia, Austria, Belgium, Burkina Faso, C
e of the flexibility of the instant messaging protocol, based on XML, and a number of extensions dev
HTTP(P2P) is a protocol based on HTTP.
fone, Zfone and ZRTP, a newer and secure VoIP protocol based on modern VoIP standards.
rticipants was high” and recommended that the protocol be tested in controlled, double-blind trials.
anned since 1 January 1996 under the Montreal Protocol because of its ozone-depleting potential.
(often implemented using the two-phase-commit protocol), because although both types of transactions
Initial design of Beyond Protocol began in 1991.
Her role as Chief of Protocol began as a volunteer for then-San Francisco m
Work on the Z39.50 protocol began in the 1970s, and led to successive ver
for each Traveline region with the JourneyWeb protocol being used to manage journeys between Traveli
have detailed understanding of the format or protocol being tested.
R, in 1989 the USSR condemned the 1939 secret protocol between Nazi Germany and itself that had led
Following the LR reaction protocol between the entry and the destination vectors
nt, where he served as provincial director of protocol between 1979 and 1984 and as an assistant dep
It is, however, possible to execute SKE protocol between two users and use the generated key t
A similar protocol between Bulgaria and the Republic of Macedoni
el plus a set of generic services and several protocol bindings for these services, including SOAP a
to: Antarctic Treaty, Antarctic-Environmental Protocol, Biodiversity, Climate Change, Desertificatio
In 2001 he developed the MANOLITO protocol, Blubster and Piolet - two peer-to-peer file-
In the North Berwick Protocol Books (NAS-B56/1/1) Robert Lauder younger of
synchronous File Transfer (SAFT), an Internet protocol bound to TCP port 487
to 1928, he served as Director General of the Protocol Branch.
oth the royals and the mayor deny any serious protocol breach.
The Protocol bringing under International Control Drugs Ou
uses Twisted for its low-level networking and Protocol Buffers for protocol description.
Protocol buffers - "Google's lingua franca for data",
Google's protocol buffers use a similar format to have compact
messages demonstrate how composition works in Protocol Buffers (they both use Point).
ized objects and objects created using Google Protocol Buffers;
DG Scripts, Oasis OLC, Mud Client Compression Protocol, bug fixes, and more.
purchased the property, formerly known as The Protocol Building, in August 2008.
IETF by publishing 4 Internet Drafts of their protocol, but the standard was never ratified.
at Japan might achieve the goals of the Kyoto Protocol, but her idea has not been realized yet.
ut under the current schedule of the Montreal Protocol, but can continue to be used in new HVAC equi
Many dosbots use the IRC protocol, but some use their own custom protocols.
StreamCast, that originally used the Opennap protocol, but later supported many different peer-to-p
I'm not sure of the exact protocol, but they would have needed joint UK/US autho
t Kit from Millipore is based on the standard protocol, but enables processing of a large number of
erpreting this as a personal attack, disobeys protocol by taking a shuttle craft without Kathryn Jan
ons in the Kodori Valley and the signing of a protocol by both parties on April 2, 2002.
After violating protocol by meeting with her parents, she was transfer
d a native look, and support for the Kerberos protocol by modified servers.
1. Adoption of the Hiroshima-Nagasaki Protocol by the 2010 NPT Review Conference
ng the Hungarians could explain the Byzantine protocol by which, in the exchange of ambassadors unde
q further specified the nature of the earlier protocol by forming a joint committee on technical iss
ents honor commitments set forth by the Kyoto Protocol, by conducting in unison peaceful demonstrati
to Interior Director and Head of palaces and protocol by decree of July 29, 1935 (Tunisia) .
to enact provisions giving effect to the 2003 Protocol by affirmative Order in Council.
Austria declared Denmark in violation of the Protocol, by the November Constitution, which Christia
alm in the Kodori Valley and the signing of a protocol by both parties on April 2, 2002.
CTCP extends the original IRC protocol by allowing users to query other clients for
the DS among themselves communicate through a protocol called the Database Support Protocol.
company has evolved from using a proprietary protocol called TSMP (Time Synchronized Mesh Protocol)
ing platform has its own native communication protocol called Sola Access Information Language (SAIL
The AR and the AS communicate through a protocol called the Application Support Protocol which
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS