「Protocol」の共起表現一覧(1語左で並び替え)5ページ目
該当件数 : 1174件
n form the foundation layer of a web services | protocol stack, providing a basic messaging framework |
hat captures the music and religious services | protocol among the Gullah community in Beaufort, South |
he head to end a piece is default jam session | protocol. |
el plus a set of generic services and several | protocol bindings for these services, including SOAP a |
provide the scp2 program, which uses the SFTP | protocol instead of SCP, but provides the very same co |
SIP, a signaling | protocol commonly used for Voice over IP; |
The ISC interface uses the SIP signalling | protocol. |
ically tailored to support the SIP signalling | protocol for use in an IMS network. |
-based request/response protocols - a signing | protocol and a verifying protocol. |
A similar | protocol between Bulgaria and the Republic of Macedoni |
GData provides a simple | protocol for reading and writing data on the Internet, |
ld this post as a full-time appointment since | Protocol 11 to the European Convention on Human Rights |
t's non-standards-based extensions to the SIP | protocol. |
a number of Microsoft's extensions to the SIP | protocol for Enhanced Presence features. |
ured with key material generated with the SKE | protocol or previously agreed upon key material (for e |
It is, however, possible to execute SKE | protocol between two users and use the generated key t |
Spirit: for the Skype | protocol on the n900. |
ided the inspiration for pursuing APC's smart | protocol in 1996. |
The SMLT | protocol has been submitted to the IETF for considerat |
He found that his SMR | protocol, which uses visual and auditory EEG biofeedba |
The Smuggling | Protocol entered into force on 28 January 2004. |
It is also referred to as the Smuggling | protocol. |
es access to the exposed methods via the SOAP | protocol. |
XUP is a SOAP-based | protocol for communicating events in a user interface, |
ity and small footprint embedded USB software | protocol stack, allowing device manufactures to easily |
Roosevelt's Soviet | Protocol Committee, dominated by Harry Hopkins and Gen |
The SPARQL | Protocol and RDF Query Language uses a similar N3 subs |
cations to query their status using a special | protocol. |
ccess the on chip debug interface, a specific | protocol and tight timing with distinct voltage levels |
in Java, and contains plugins for I2C and SPI | protocol analyzers. |
In addition to the SSH | protocol, SFTPPlus supports file transfer using FTP, H |
Early versions of RSA padding used in the SSL | protocol were vulnerable to a sophisticated adaptive c |
SSLeay to implement the underlying TLS or SSL | protocol. |
Marlinspike presented attacks on the SSL/TLS | protocol at Black Hat USA 2009, which demonstrated way |
MXit has been included as a standard | protocol in Pidgin since version 2.6.4. |
offer products using the industry's standard | protocol - BACnet. |
s an early proposal to the IETF of a standard | protocol for instant messaging. |
is responsible for defining the HL7 standard | protocol and is composed of Standing Administrative Co |
t Kit from Millipore is based on the standard | protocol, but enables processing of a large number of |
Portugal is now a Republic, but state | protocol in general grants her the style of HRH The Du |
nted attacks on the Online Certificate Status | Protocol that enable attackers to defeat the protocol |
minary experience with a low-cost stimulation | protocol that includes letrozole and human menopausal |
Supports STOMP | protocol for cross language clients |
re-implementation of the Tabular Data Stream | protocol. |
osecutor's office, to follow a more stringent | protocol for dealing with future allegations of abuse |
"Indian Strings" ( | Protocol demo) - 4:06 |
dministration (FDA) regulations and the study | protocol, the BrainGate device was removed from him af |
A supplementary | protocol, reducing the amount of reparations, was sign |
The concordat was modified by a supplementary | protocol signed on 25 January 1938. |
based interface and built-in customer support | protocol. |
CLX is an X Window System | protocol client library in the Common Lisp programming |
The distributed hash table | protocol Koorde uses a De Bruijn graph. |
erent data-gathering method is the talk-aloud | protocol. |
heir own processor and memory, and ran TCP/IP | protocol software that was downloaded onto the cards f |
commitment to the use of the underlying TDML | protocol in its national policy for management of most |
supports the HSDPA ("3.5G") mobile telephony | protocol at 7.2Mbps. |
tiated during the connection using the Telnet | protocol. |
tiated during the connection using the telnet | protocol. |
llenge-rechallenge (CDR) is a medical testing | protocol in which a medicine or drug is administered, |
other, shared by Ingolf Pernice, is that that | protocol is an interpretative protocol which will eith |
give early and favorable consideration to the | Protocol and give its advice and consent to ratificati |
The | Protocol subsequently failed to materialize. |
ntarily being added by 1991, years before the | protocol signed became compulsory. |
on certain types of civilian targets and the | Protocol I states that civilian objects are not accept |
Article 6, Section 1 of the | Protocol specifically covers the denial of the Holocau |
By October 2009, the | Protocol had been signed by 117 countries, and there w |
an be extended in subsequent revisions of the | protocol specification by appending extension addition |
The | Protocol for SYnchronous Conferencing (PSYC); |
The | protocol was agreed by SADC leaders in Mauritius on Au |
1 States have signed but not yet ratified the | Protocol. |
The | protocol was rebranded as the Bay Network Management P |
At the heart of the | protocol is the 'Manifest' - an XML document that enca |
The | Protocol requires participating States to criminalize |
The | protocol supports networks designed with SMLT or DSMLT |
According to the | protocol of county police boss Zidor, rumors began to |
The | Protocol was terminated by the Single Convention on Na |
The | protocol is an enhancement to the Multi-Link Trunking |
and are well tested, so their use within the | protocol ensure easy implementation and interoperabili |
The | Protocol was superseded by the 1961 Single Convention |
I.e. while the | protocol might be open, access to Apple's FaceTime ser |
le task during this term was to supervise the | protocol for all world leaders who attended the Novemb |
The | Protocol against the Smuggling of Migrants by Land, Se |
The | protocol can be used to retrieve vital data from patie |
The | Protocol consisted of three declarations, all issued o |
The | protocol came into force on 12 February 2002. |
Up to version 0.4 of the | protocol, an intermediate element between nodes and wa |
Text of declaration No. 2 of the | protocol |
, when the organization was created under the | protocol purposes and internal regulations were publis |
Text of declaration No. 1 of the | protocol |
ional Assembly and the Prime Minister, on the | protocol of the Republic of Turkey. |
The | protocol of the random drug testing program the distri |
e programs without knowing the details of the | protocol. |
Under the | protocol signed on May 7, 1832 between Bavaria and the |
The | protocol ordered the execution of 10 high-ranking offi |
ws can then be built without knowledge of the | protocol and format with which messages are sent to an |
no restriction on trade to the parties of the | protocol within the Archipelago and North Borneo. |
The | Protocol is aimed at the protection of rights of migra |
The | protocol is not an Internet standard but it is still w |
wo Palermo protocols, the other one being the | Protocol to Prevent, Suppress and Punish Trafficking i |
IETF Internet Draft defines version 5 of the | protocol. |
Adding the | protocol overhead and blanking time, a standard link r |
and the United States who have not signed the | Protocol or does not have any mandatory reductions set |
The | Protocol for the Reconstruction of Hungary was an agre |
Apologies if the | protocol for this is incorrect. |
The | protocol can be implemented at different levels depend |
companies were honor guard companies for the | protocol service, the honor guard at the "Memorial to |
ing to their website, "none have [cracked the | protocol], and plenty have tried." |
As of September 2010 the | Protocol has 66 signatories and 55 parties. |
nst the Ottoman Empire, if the demands in the | protocol were submitted to the British. |
The | protocol is defined by FidoNet technical standard prop |
The | protocol aspects of this should be coordinated closely |
The | Protocol opened on 28 January 2003 and entry into forc |
The image data's transfer is based on the | protocol SBP-2. |
onmental effects of plans and programmes, the | Protocol places a special emphasis on the consideratio |
With the advent of USB 3.0, the | protocol was revised to add full-duplex signaling and |
The ICRC had suggested that the | Protocol require parties to "take all necessary measur |
Does anyone know what the | protocol is for succession boxes? |
"Where possible, the | protocol makes use of existing Internet and Web techno |
nstruction is entirely in accordance with the | Protocol to Article 69, but that the Improver question |
is true then V will accept when P follows the | protocol. |
A summary of more recent improvements of the | protocol has been provided by H. Freeze. |
Ownership of the | protocol has changed hands many times and was most rec |
Due to the complexity of the | protocol, very few software applications currently sup |
The | Protocol also adds a provision to Article 22 stating t |
In addition, the | Protocol added Article 21 bis, Limitation of Productio |
rticipants was high” and recommended that the | protocol be tested in controlled, double-blind trials. |
purchased the property, formerly known as The | Protocol Building, in August 2008. |
ich define the behavior of the program by the | protocol of their interactions. |
The | Protocol to the 1979 Convention on Long-Range Transbou |
The British signatory of the | Protocol was Sir Ernest Satow. |
By 2006 the | protocol had been signed by 112 states, and ratified b |
The Convention was amended by the | Protocol entering into force on 7 July 1955. |
The | Protocol for Limiting and Regulating the Cultivation o |
The | protocol allows for a consumer to query a datasource o |
Application of the | Protocol is being supported by a number of measures in |
Parties to the | Protocol are further obligated to adopt measures to en |
contain any number of entities defined by the | protocol, or by extensions to the protocol. |
Although not part of the | protocol, the occasion allowed Israel to secure French |
ch usually proved sufficient to establish the | protocol of partner interaction. |
The | Protocol bringing under International Control Drugs Ou |
In addition, every Party to the | Protocol was committed to inform the UN Secretary-Gene |
The | protocol lays down a specification for passing data be |
To the extent possible, the | protocol uses XML to represent the protocol data being |
nex V, Area Protection and Management, of the | protocol on Environmental Protection of Antarctica (Th |
The | protocol is used when statistical testing is inappropr |
The | Protocol to Prevent, Suppress and Punish Trafficking i |
The | protocol is included in the Heathrow Manual of Air Tra |
23 countries have signed but not ratified the | protocol: Australia, Austria, Belgium, Burkina Faso, C |
e Council of Europe Explanatory Report of the | Protocol states the "European Court of Human Rights ha |
Section 2 of Article 6 allows a Party to the | Protocol at their discretion only to prosecute if the |
but differences in the implementation of the | protocol made it difficult |
g tools without having prior knowledge of the | protocol grammar. |
one of the three main components of UDDI, the | protocol used to discover Web Services (the other two |
The | Protocol adds a provision to Article 36 allowing for " |
The | protocol is maintained by Zugg Software, though they h |
The | protocol was designed to sit on top of User Datagram P |
By 17 February 2006 6 States had ratified the | Protocol and a further 24 had signed the Protocol but |
ation in charge of the standardization of the | protocol extensions of XMPP, the open standard of inst |
Reflecting these principles, the | Protocol embodies a major structural revision of the C |
The | Protocol on Blinding Laser Weapons, Protocol IV of the |
It is the minimum version of the | protocol accepted by .NET Messenger Service after Micr |
Pollution From Ships, 1973 as modified by the | Protocol of 1978. |
etherlands, pancuronium is recommended in the | protocol for euthanasia. |
The | Protocol also addresses policies and legislation, thou |
The | Protocol on Strategic Environmental Assessment supplem |
in training to ensure people step outside the | protocol when necessary. |
nt; Mrs. Ute Schmidt, a representative of the | Protocol; Councilor Ministeriale Mr Raju Sharrna, Refe |
In the new version of the | protocol, a block would only be retransmitted on timeo |
d only one experienced nurse who examined the | protocol in advance, correctly guessed the experimenta |
The revised conventions and the | protocol entered into force 12 months after ratificati |
escriptor Specification now only contains the | protocol for communicating with a WMS about how to sty |
ommittee on Federal Relations, 1999-2004; the | Protocol Committee, 2007-11, the Liaison Work Group of |
A Commentary to the | Protocol was written by Adolf Lande, former Secretary |
The | protocol consists of an immediate recall task, a triad |
The | protocol for subculturing cells depends heavily on the |
The | protocol determining the amount of reparations to be e |
The Order of Precedence in Sri Lanka the | protocol list at which Sri Lankan government officials |
The | protocol provided the control and management of the Eu |
The | protocol does not include the full breadth of interact |
onsiderable debate concerning what effect the | protocol will actually have. |
s of the Euphrates-Tigris river system is the | protocol annexed to the 1946 Treaty of Friendship and |
The | Protocol consisted of two declarations, both issued on |
table BAN logic, i.e. it attempts to move the | protocol implementation effort closer to the abstracti |
The | Protocol to the 1979 Convention on Long-Range Transbou |
Article 8, Section 1 of the | protocol specifically covers the denial of the Holocau |
wo Palermo protocols, the other one being the | Protocol against the Smuggling of Migrants by Land, Se |
other player may deviate arbitrarily from the | protocol in his or her local computation), then the ot |
Although negotiated under UNECE, the | Protocol is open to all UN Member States. |
The | Protocol provides for extensive public participation i |
The Treaty of Brussels was amended by the | Protocol signed in Paris at the conclusion of the Lond |
hough Arthur never officially granted her the | protocol of a formal position, she proved to be a popu |
The adoption of the | Protocol would mean that oil-importing nations should |
However, the version of the | protocol implemented in libjingle differs from that pu |
tly is often essential to the security of the | protocol. |
rief neuropsychological test derived from the | protocol of the CERAD 10-word recall test. |
The | protocol was faster than YMODEM because no error-check |
The | Protocol (which applies specifically to aircraft and a |
y of colleges and universitiesCreation of the | protocol also served as a common ground initiative on |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |