「Protocol」の共起表現(1語左で並び替え)5ページ目 - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > Protocolの意味・解説 > Protocolに関連した共起表現

「Protocol」の共起表現一覧(1語左で並び替え)5ページ目

該当件数 : 1174



n form the foundation layer of a web services protocol stack, providing a basic messaging framework
hat captures the music and religious services protocol among the Gullah community in Beaufort, South
he head to end a piece is default jam session protocol.
el plus a set of generic services and several protocol bindings for these services, including SOAP a
provide the scp2 program, which uses the SFTP protocol instead of SCP, but provides the very same co
SIP, a signaling protocol commonly used for Voice over IP;
The ISC interface uses the SIP signalling protocol.
ically tailored to support the SIP signalling protocol for use in an IMS network.
-based request/response protocols - a signing protocol and a verifying protocol.
A similar protocol between Bulgaria and the Republic of Macedoni
GData provides a simple protocol for reading and writing data on the Internet,
ld this post as a full-time appointment since Protocol 11 to the European Convention on Human Rights
t's non-standards-based extensions to the SIP protocol.
a number of Microsoft's extensions to the SIP protocol for Enhanced Presence features.
ured with key material generated with the SKE protocol or previously agreed upon key material (for e
It is, however, possible to execute SKE protocol between two users and use the generated key t
Spirit: for the Skype protocol on the n900.
ided the inspiration for pursuing APC's smart protocol in 1996.
The SMLT protocol has been submitted to the IETF for considerat
He found that his SMR protocol, which uses visual and auditory EEG biofeedba
The Smuggling Protocol entered into force on 28 January 2004.
It is also referred to as the Smuggling protocol.
es access to the exposed methods via the SOAP protocol.
XUP is a SOAP-based protocol for communicating events in a user interface,
ity and small footprint embedded USB software protocol stack, allowing device manufactures to easily
Roosevelt's Soviet Protocol Committee, dominated by Harry Hopkins and Gen
The SPARQL Protocol and RDF Query Language uses a similar N3 subs
cations to query their status using a special protocol.
ccess the on chip debug interface, a specific protocol and tight timing with distinct voltage levels
in Java, and contains plugins for I2C and SPI protocol analyzers.
In addition to the SSH protocol, SFTPPlus supports file transfer using FTP, H
Early versions of RSA padding used in the SSL protocol were vulnerable to a sophisticated adaptive c
SSLeay to implement the underlying TLS or SSL protocol.
Marlinspike presented attacks on the SSL/TLS protocol at Black Hat USA 2009, which demonstrated way
MXit has been included as a standard protocol in Pidgin since version 2.6.4.
offer products using the industry's standard protocol - BACnet.
s an early proposal to the IETF of a standard protocol for instant messaging.
is responsible for defining the HL7 standard protocol and is composed of Standing Administrative Co
t Kit from Millipore is based on the standard protocol, but enables processing of a large number of
Portugal is now a Republic, but state protocol in general grants her the style of HRH The Du
nted attacks on the Online Certificate Status Protocol that enable attackers to defeat the protocol
minary experience with a low-cost stimulation protocol that includes letrozole and human menopausal
Supports STOMP protocol for cross language clients
re-implementation of the Tabular Data Stream protocol.
osecutor's office, to follow a more stringent protocol for dealing with future allegations of abuse
"Indian Strings" ( Protocol demo) - 4:06
dministration (FDA) regulations and the study protocol, the BrainGate device was removed from him af
A supplementary protocol, reducing the amount of reparations, was sign
The concordat was modified by a supplementary protocol signed on 25 January 1938.
based interface and built-in customer support protocol.
CLX is an X Window System protocol client library in the Common Lisp programming
The distributed hash table protocol Koorde uses a De Bruijn graph.
erent data-gathering method is the talk-aloud protocol.
heir own processor and memory, and ran TCP/IP protocol software that was downloaded onto the cards f
commitment to the use of the underlying TDML protocol in its national policy for management of most
supports the HSDPA ("3.5G") mobile telephony protocol at 7.2Mbps.
tiated during the connection using the Telnet protocol.
tiated during the connection using the telnet protocol.
llenge-rechallenge (CDR) is a medical testing protocol in which a medicine or drug is administered,
other, shared by Ingolf Pernice, is that that protocol is an interpretative protocol which will eith
give early and favorable consideration to the Protocol and give its advice and consent to ratificati
The Protocol subsequently failed to materialize.
ntarily being added by 1991, years before the protocol signed became compulsory.
on certain types of civilian targets and the Protocol I states that civilian objects are not accept
Article 6, Section 1 of the Protocol specifically covers the denial of the Holocau
By October 2009, the Protocol had been signed by 117 countries, and there w
an be extended in subsequent revisions of the protocol specification by appending extension addition
The Protocol for SYnchronous Conferencing (PSYC);
The protocol was agreed by SADC leaders in Mauritius on Au
1 States have signed but not yet ratified the Protocol.
The protocol was rebranded as the Bay Network Management P
At the heart of the protocol is the 'Manifest' - an XML document that enca
The Protocol requires participating States to criminalize
The protocol supports networks designed with SMLT or DSMLT
According to the protocol of county police boss Zidor, rumors began to
The Protocol was terminated by the Single Convention on Na
The protocol is an enhancement to the Multi-Link Trunking
and are well tested, so their use within the protocol ensure easy implementation and interoperabili
The Protocol was superseded by the 1961 Single Convention
I.e. while the protocol might be open, access to Apple's FaceTime ser
le task during this term was to supervise the protocol for all world leaders who attended the Novemb
The Protocol against the Smuggling of Migrants by Land, Se
The protocol can be used to retrieve vital data from patie
The Protocol consisted of three declarations, all issued o
The protocol came into force on 12 February 2002.
Up to version 0.4 of the protocol, an intermediate element between nodes and wa
Text of declaration No. 2 of the protocol
, when the organization was created under the protocol purposes and internal regulations were publis
Text of declaration No. 1 of the protocol
ional Assembly and the Prime Minister, on the protocol of the Republic of Turkey.
The protocol of the random drug testing program the distri
e programs without knowing the details of the protocol.
Under the protocol signed on May 7, 1832 between Bavaria and the
The protocol ordered the execution of 10 high-ranking offi
ws can then be built without knowledge of the protocol and format with which messages are sent to an
no restriction on trade to the parties of the protocol within the Archipelago and North Borneo.
The Protocol is aimed at the protection of rights of migra
The protocol is not an Internet standard but it is still w
wo Palermo protocols, the other one being the Protocol to Prevent, Suppress and Punish Trafficking i
IETF Internet Draft defines version 5 of the protocol.
Adding the protocol overhead and blanking time, a standard link r
and the United States who have not signed the Protocol or does not have any mandatory reductions set
The Protocol for the Reconstruction of Hungary was an agre
Apologies if the protocol for this is incorrect.
The protocol can be implemented at different levels depend
companies were honor guard companies for the protocol service, the honor guard at the "Memorial to
ing to their website, "none have [cracked the protocol], and plenty have tried."
As of September 2010 the Protocol has 66 signatories and 55 parties.
nst the Ottoman Empire, if the demands in the protocol were submitted to the British.
The protocol is defined by FidoNet technical standard prop
The protocol aspects of this should be coordinated closely
The Protocol opened on 28 January 2003 and entry into forc
The image data's transfer is based on the protocol SBP-2.
onmental effects of plans and programmes, the Protocol places a special emphasis on the consideratio
With the advent of USB 3.0, the protocol was revised to add full-duplex signaling and
The ICRC had suggested that the Protocol require parties to "take all necessary measur
Does anyone know what the protocol is for succession boxes?
"Where possible, the protocol makes use of existing Internet and Web techno
nstruction is entirely in accordance with the Protocol to Article 69, but that the Improver question
is true then V will accept when P follows the protocol.
A summary of more recent improvements of the protocol has been provided by H. Freeze.
Ownership of the protocol has changed hands many times and was most rec
Due to the complexity of the protocol, very few software applications currently sup
The Protocol also adds a provision to Article 22 stating t
In addition, the Protocol added Article 21 bis, Limitation of Productio
rticipants was high” and recommended that the protocol be tested in controlled, double-blind trials.
purchased the property, formerly known as The Protocol Building, in August 2008.
ich define the behavior of the program by the protocol of their interactions.
The Protocol to the 1979 Convention on Long-Range Transbou
The British signatory of the Protocol was Sir Ernest Satow.
By 2006 the protocol had been signed by 112 states, and ratified b
The Convention was amended by the Protocol entering into force on 7 July 1955.
The Protocol for Limiting and Regulating the Cultivation o
The protocol allows for a consumer to query a datasource o
Application of the Protocol is being supported by a number of measures in
Parties to the Protocol are further obligated to adopt measures to en
contain any number of entities defined by the protocol, or by extensions to the protocol.
Although not part of the protocol, the occasion allowed Israel to secure French
ch usually proved sufficient to establish the protocol of partner interaction.
The Protocol bringing under International Control Drugs Ou
In addition, every Party to the Protocol was committed to inform the UN Secretary-Gene
The protocol lays down a specification for passing data be
To the extent possible, the protocol uses XML to represent the protocol data being
nex V, Area Protection and Management, of the protocol on Environmental Protection of Antarctica (Th
The protocol is used when statistical testing is inappropr
The Protocol to Prevent, Suppress and Punish Trafficking i
The protocol is included in the Heathrow Manual of Air Tra
23 countries have signed but not ratified the protocol: Australia, Austria, Belgium, Burkina Faso, C
e Council of Europe Explanatory Report of the Protocol states the "European Court of Human Rights ha
Section 2 of Article 6 allows a Party to the Protocol at their discretion only to prosecute if the
but differences in the implementation of the protocol made it difficult
g tools without having prior knowledge of the protocol grammar.
one of the three main components of UDDI, the protocol used to discover Web Services (the other two
The Protocol adds a provision to Article 36 allowing for "
The protocol is maintained by Zugg Software, though they h
The protocol was designed to sit on top of User Datagram P
By 17 February 2006 6 States had ratified the Protocol and a further 24 had signed the Protocol but
ation in charge of the standardization of the protocol extensions of XMPP, the open standard of inst
Reflecting these principles, the Protocol embodies a major structural revision of the C
The Protocol on Blinding Laser Weapons, Protocol IV of the
It is the minimum version of the protocol accepted by .NET Messenger Service after Micr
Pollution From Ships, 1973 as modified by the Protocol of 1978.
etherlands, pancuronium is recommended in the protocol for euthanasia.
The Protocol also addresses policies and legislation, thou
The Protocol on Strategic Environmental Assessment supplem
in training to ensure people step outside the protocol when necessary.
nt; Mrs. Ute Schmidt, a representative of the Protocol; Councilor Ministeriale Mr Raju Sharrna, Refe
In the new version of the protocol, a block would only be retransmitted on timeo
d only one experienced nurse who examined the protocol in advance, correctly guessed the experimenta
The revised conventions and the protocol entered into force 12 months after ratificati
escriptor Specification now only contains the protocol for communicating with a WMS about how to sty
ommittee on Federal Relations, 1999-2004; the Protocol Committee, 2007-11, the Liaison Work Group of
A Commentary to the Protocol was written by Adolf Lande, former Secretary
The protocol consists of an immediate recall task, a triad
The protocol for subculturing cells depends heavily on the
The protocol determining the amount of reparations to be e
The Order of Precedence in Sri Lanka the protocol list at which Sri Lankan government officials
The protocol provided the control and management of the Eu
The protocol does not include the full breadth of interact
onsiderable debate concerning what effect the protocol will actually have.
s of the Euphrates-Tigris river system is the protocol annexed to the 1946 Treaty of Friendship and
The Protocol consisted of two declarations, both issued on
table BAN logic, i.e. it attempts to move the protocol implementation effort closer to the abstracti
The Protocol to the 1979 Convention on Long-Range Transbou
Article 8, Section 1 of the protocol specifically covers the denial of the Holocau
wo Palermo protocols, the other one being the Protocol against the Smuggling of Migrants by Land, Se
other player may deviate arbitrarily from the protocol in his or her local computation), then the ot
Although negotiated under UNECE, the Protocol is open to all UN Member States.
The Protocol provides for extensive public participation i
The Treaty of Brussels was amended by the Protocol signed in Paris at the conclusion of the Lond
hough Arthur never officially granted her the protocol of a formal position, she proved to be a popu
The adoption of the Protocol would mean that oil-importing nations should
However, the version of the protocol implemented in libjingle differs from that pu
tly is often essential to the security of the protocol.
rief neuropsychological test derived from the protocol of the CERAD 10-word recall test.
The protocol was faster than YMODEM because no error-check
The Protocol (which applies specifically to aircraft and a
y of colleges and universitiesCreation of the protocol also served as a common ground initiative on
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS