「Protocol」の共起表現(2語左で並び替え)4ページ目 - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > Protocolの意味・解説 > Protocolに関連した共起表現

「Protocol」の共起表現一覧(2語左で並び替え)4ページ目

該当件数 : 1073



ons supporting MRCP or Media Resource Control Protocol.
Developing the Resource Reservation Protocol
ributed Generic Information Retrieval (DiGIR) protocol.
rk, BitTorrent and a rewritten gnutella-based protocol which he named Gnutella2.
h on Web robots and trends in Robot Exclusion Protocol deployment and adherence.
loaded by default due to the robots exclusion protocol unless disabled during the program.
Roosevelt's Soviet Protocol Committee, dominated by Harry Hopkins and Gen
the StealthNet client for the RShare network protocol, which is still developed.
Intelligent and scalable rule-based routing protocol and matching algorithm
all services are using the same communication protocol, the requirement for a bridging technology is
fections are treated with the same medication protocol as the T. canis or T. catis roundworm infecti
May 2006 it was revealed that the Second Life protocol had been reverse-engineered.
Education, (Primary, Secondary, Adult), Protocol
In the most secret completion protocol Germany declared herself neutral in the event
fone, Zfone and ZRTP, a newer and secure VoIP protocol based on modern VoIP standards.
The Transport Layer Security (TLS) protocol provide the ability to secure communications
e Angolan peace agreement of 1994, see Lusaka Protocol.
een the PLO and Israel since September 1993: ( Protocol on Economic Relations 1994; 1994 Cairo Agreem
Service Discovery Protocol (SDP) should not be confused with Session Des
Simple Service Discovery Protocol (SSDP) as used in Universal Plug and Play (UP
Service Location Protocol (SLP)
Both programs use the Session Initiation Protocol for VoIP call signalisation.
Session Initiation Protocol (SIP) is an IETF standard protocol (RFC 3261
l signaling it employs the Session Initiation Protocol.
The Message Session Relay Protocol (RFC 4975, RFC 4976) defines text-based proto
ne clients run on the open Session Initiation Protocol (SIP) supporting various codecs.
S) services application is Session Initiation Protocol (SIP) application whereby a server receives S
s an implementation of the secure shell (SSH) protocol written in the Python programming language.
done and what is not done - this in short is protocol.
and the United States who have not signed the Protocol or does not have any mandatory reductions set
He signed Amasya Protocol and at the end of the Sivas Congress in 1920,
of the nuclear-weapon states have signed this protocol.
nal elections, the Party of the Roma signed a protocol of reciprocal electoral support with the Soci
On July 11, 2000 the parties signed a protocol on the stabilisation of the security zone, to
of Angola, Cuba, and South Africa signed the protocol on December 13, 1988 in Brazzaville, Congo.
Was there a similar dual-control protocol for the Jupiters, or were they entirely under
Simple Update Protocol, or SUP, is a protocol developed by FriendFee
Since then Protocol 6 of the Convention has called for nations to
unced in the last week of June since visiting protocol for listeners aren't allowed yet due to studi
The ISC interface uses the SIP signalling protocol.
ically tailored to support the SIP signalling protocol for use in an IMS network.
ed at the museum, demonstrating the skill and protocol of competitive driving horses in harness.
a, a re-implementation of SMB/CIFS networking protocol, released under the GNU General Public Licens
Snort performs protocol analysis, content searching, and content matc
end-to-end performance of some communications protocol.
Multicast Source Discovery Protocol (MSDP) is a Protocol Independent Multicast (P
A Soviet-Afghan trade protocol is signed in Moscow, pursuant to which Afghan
t the bridges compute using the Spanning Tree Protocol can be determined using the following rules.
en no longer necessary to run a spanning tree protocol of any kind since there are no logical bridgi
Depending on the specific routing protocol, this convergence time can cause network inte
re to bind operations to a specific transport protocol SOAP.
The ICAO standard for VDL Mode 4 specifies a protocol enabling aircraft to exchange data with groun
ter's Office in 1940 to be a speechwriter and protocol expert.
The SSH 2.0 protocol encrypts data with public key algorithms and
ed results to the client using a standard web protocol (e.g.
h/Retrieve via URL (SRU) is a standard search protocol for Internet search queries, utilizing Contex
d using the Mobile IP standard communications protocol and including the IPSec security standards.
permits compatibility with standard Internet Protocol (IP) network hardware and software.
also discovered the remote state preparation protocol in quantum information theory, which has been
r obligations as nuclear weapons states under Protocol I and Protocol II of the Treaty.
omotion of Texas exports by the state's chief protocol officer played a role.
Personally, he was a stickler for protocol.
of the BuddyCast peer-to-peer streaming media protocol.
le task during this term was to supervise the protocol for all world leaders who attended the Novemb
ses: to give effect to the Supplementary Fund Protocol 2003, to give effect to Annex IV of the MARPO
XMPP (Any client supporting XMPP protocol can use transports to connect to .NET Messeng
The server supports Daytime Protocol, Time Protocol and Network Time Protocol and
Supports STOMP protocol for cross language clients
Area established by a Swaziland/South Africa Protocol and will be known as "Lake Jozini Transfronti
e captain insists on rapid, but full take off protocol, checking the aircraft following the rules.
The ICRC had suggested that the Protocol require parties to "take all necessary measur
rticipants was high” and recommended that the protocol be tested in controlled, double-blind trials.
other, shared by Ingolf Pernice, is that that protocol is an interpretative protocol which will eith
The Optional Protocol to the Convention against Torture and other C
cutive officer of that vessel after the peace protocol was signed on 12 August 1898, and until 16 Oc
Moneydance implements the OFX protocol to perform online banking and bill payment.
ulted Exxon regarding its stance on the Kyoto protocol.
mpetition at Epitaph Records, under the title Protocol.
Under the terms of the Boxer Protocol, Japan as allowed to maintain a military garr
For the novel, see The Fourth Protocol.
on Narcotic Drugs 1961 as amended by the 1972 Protocol.
pNFS describes a way for the NFS protocol to process file requests to multiple servers
February 16 - The Kyoto Protocol goes into effect, without the support of the
Marlinspike presented attacks on the SSL/TLS protocol at Black Hat USA 2009, which demonstrated way
Group, contributing to the design of the FTP protocol in particular.
s use has been phased out due to the Montreal Protocol.
y As part of GOIM a XMPP gateway to the Xfire protocol was created, which allows every XMPP client t
It uses the XMPP protocol for communication with an extended presence p
failures and works with any of the following protocol types: IP Unicast Static Routes, RIP1, RIP2,
tions working group that drew up the Optional Protocol to the Convention against Torture.
at Japan might achieve the goals of the Kyoto Protocol, but her idea has not been realized yet.
The Arthur-Merlin protocol, introduced by Laszlo Babai, is similar in na
Signature of the Japan-Manchukuo Protocol.
The official protocol listed him as van Haan and almost all the sou
ing to the adoption of the Hiroshima-Nagasaki Protocol in 2010.
The MOS protocol allows a variety of devices to be controlled
No funding for the Kyoto Protocol
e peace plans in Angola, including the Lusaka Protocol, respect human rights and the presence of the
nded Iraq of its obligations under the Geneva Protocol and to unconditionally remove and destroy all
ll European countries have ratified the Kyoto Protocol, and all have supported strong reductions in
ocal area network reachable using the Bonjour protocol.
he Angolan government to implement the Lusaka Protocol and other agreements.
Tmodem is derived from the HTMS protocol Translink with special modifications so that
Today, files transferred using the BitTorrent protocol constitute a significant slice of all Interne
On August 2, 1920 the Albanian-Italian protocol was signed, upon which Italy would retreat fr
(MIME) for registering the format of the IMPS protocol messages."
eed for the full implementation of the Lusaka Protocol and other agreements, and supported adjustmen
ing the HTTP GET interface and the BitTorrent protocol.
The Optional Protocol establishes an individual complaints mechanis
The Japan-Korea Protocol of August 1905 was made between representativ
On May 19, 1891, the Matta-Reyes Protocol was signed between Chile and Bolivia.
tiated during the connection using the Telnet protocol.
The Madrid Protocol of 1885 is an agreement between Great Britain
For this reason, the interlock protocol cannot be effectively used to provide authent
head is a search engine system for the Gopher protocol.
The Optional Protocol required ten ratifications to come into force
es access to the exposed methods via the SOAP protocol.
e was no agreement on how to extend the Kyoto Protocol, or how the $100 billion a year for the Green
o indication of why it is called the Montreal protocol.
The Geneva Protocol for the Pacific Settlement of International D
to this among countries who observe the 1977 Protocol I);
at of the cap-and-trade policies of the Kyoto Protocol.
Climate Summit, marked the crash of the Kyoto Protocol, which had "failed to produce any discernable
en they were used in the 1987 film The Fourth Protocol, and after closure in numerous productions, i
al oil production, he has proposed the Rimini protocol.
The Obby protocol used by the collaborative text editor Gobby
educe greenhouse gas emission under the Kyoto Protocol.
prison defaulted to preparing the three-drug protocol.
The Optional Protocol to the Convention on the Rights of Persons wi
also supports basic functionality of the XMPP protocol.
erent data-gathering method is the talk-aloud protocol.
According to the London Protocol (September 1944) all of the Free State of Bru
of the Kingdom were reiterated in the London Protocol of August 30, 1832 signed by the Great Powers
For the 1987 movie, see The Fourth Protocol (movie).
have voice/video conversations using the XMPP protocol (including Google Talk), though the implement
ed to the Google Talk network using the HTTPS protocol.
vindicated when 15 years later; the Montreal Protocol saw the end of Chlorofluorocarbon and FC base
nment on April 4, 2002 relating to the Lusaka Protocol.
All functions serves are based on the RFB protocol.
The basic protocol used on the Internet is the IP protocol, whic
23 Librae was also featured in Halo: The Cole Protocol
of whether Australia should ratify the Kyoto Protocol.
ratification and implementation of the Kyoto Protocol, since the family has invested considerable f
plementation of the Peace Accords, the Lusaka Protocol and relevant Security Council resolutions, an
ost important innovations brought by the 1996 Protocol is the codification of the "precautionary app
The 1922 protocol was supplemented by the "Austrian Protocol" s
The Trafficking Protocol entered into force on 25 December 2003.
, the 4th Meeting of the Parties to the Kyoto Protocol (MOP 4 or CMP 4), together with other subsidi
In the Geneva Protocol the member states had declared themselves “re
The Optional Protocol requires ten ratifications to come into force
In the EU, the Gothenburg protocol is implemented through the National Emission
The Geneva Protocol for the Pacific Settlement of International D
Minister Stephen Harper criticizing the Kyoto Protocol and the scientific basis of anthropogenic glo
no technical documentation about the network protocol.
The Gothenburg Protocol was signed on 30 November 1999 in Gothenburg
ion requirements under the terms of the Kyoto Protocol.
ut under the current schedule of the Montreal Protocol, but can continue to be used in new HVAC equi
r ratification by twenty states, the Optional Protocol came into force on 22 June 2006.
The Uppsala Protocol has been focused in a similar direction.
nd used the challenge-dechallenge-rechallenge protocol in an effort to verify the link.
y Chat eXtensions) is an extension to the IRC protocol developed by Microsoft.
t solutions, the application of the Canonical Protocol pattern dictates standardizing the communicat
ict, contrary to obligations under the Geneva Protocol.
e of chemical weapons, contrary to the Geneva Protocol of 1925.
The mission was concluded by the London Protocol, signed on 6 June 1862, which recognized that
tely fulfill its obligations under the Lusaka Protocol and Security Council resolutions, including f
right to education (Article 2(1) of the first protocol).
This section covers the Publius protocol in greater details.
nent contribution when he signed the Machakos Protocol with Salva Kiir, the current First Vice Presi
Many dosbots use the IRC protocol, but some use their own custom protocols.
The AIS-P protocol does this by eliminating a requirement for mu
The Cranford Protocol or Cranford Agreement was a verbal deal struc
Since late 2004 phonecalls through the VoIP protocol are integrated.
Nations General Assembly adopted the Optional protocol on the involvement of children in armed confl
It was inspired by the Kyoto Protocol which commits the EU to reduce CO2 by 8% by 2
d to features that directly relate to the TLS protocol.
, but the class must conform to the aProtocol protocol.
tiated during the connection using the telnet protocol.
d a native look, and support for the Kerberos protocol by modified servers.
As part of the trial protocol, a volunteer must have begun drug treatment i
The Optional Protocol to the Convention on the Rights of the Child
the Lord Chamberlain of the Court, the Chief Protocol of the Royal Ministry of Foreign Affairs, and
obal environmental accord called the Montreal Protocol.
ment of forces of May 14, 1994 and of the May protocol of 1998, according to which the Georgian side
1. Adoption of the Hiroshima-Nagasaki Protocol by the 2010 NPT Review Conference
In addition, the 1996 protocol prohibits altogether the practice of incinera
dministration (FDA) regulations and the study protocol, the BrainGate device was removed from him af
d in Annex 1 ("the reverse list") of the 1996 Protocol.
The Istanbul Protocol is published by the Office of the UN High Com
Newer versions of the Palringo protocol have added social features found in most mess
The Gothenburg Protocol entered into force on 17 May 2005.
nservative government had abandoned the Kyoto Protocol despite its previous opposition to it.
16 February: The Kyoto protocol enters into force.
to the refusal of countries to sign the Kyoto protocol, such as the United States and Australia, Ver
The Optional Protocol entered into force on 22 June 2006.
anned since 1 January 1996 under the Montreal Protocol because of its ozone-depleting potential.
ditioned [pain] stimulus, following the exact protocol used for classical conditioning with natural
In contrast to DNase-seq, the FAIRE-Seq protocol doesn't require the permeabilization of cells
The Damascus Protocol was a document given to Faisal bin Hussein by
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS