「Protocol」の共起表現一覧(2語左で並び替え)5ページ目
該当件数 : 1073件
il discussed the implementation of the Lusaka | Protocol, and extended the mandate of the United Natio |
The IST | protocol was developed by Nortel (now acquired by Avay |
luded A Taste of Honey, Frenzy and The Fourth | Protocol. |
with the Boxer Rebellion and signed The Boxer | Protocol on September 7, 1901 on behalf of Germany, ma |
Spirit: for the Skype | protocol on the n900. |
from activities inconsistent with the Lusaka | Protocol and to respect UNITA as a political party. |
The Smuggling | Protocol entered into force on 28 January 2004. |
Agreement thereby pledging Sitka to the Kyoto | Protocol goal of reducing greenhouse gas by 2012. |
It is also referred to as the Smuggling | protocol. |
rgency of the strict observance of the Geneva | Protocol, expecting both sides to refrain from the fut |
The Fourth | Protocol (film), 1987, Dir John Mackenzie |
for each Traveline region with the JourneyWeb | protocol being used to manage journeys between Traveli |
s decision-making process during the Montreal | Protocol Agreement, which has resulted in a near elimi |
validates the approach to use of the Internet | Protocol articulated by Keith Hogie with NASA Goddard |
(often implemented using the two-phase-commit | protocol), because although both types of transactions |
References that cite the Istanbul | Protocol as a useful tool in the efforts to combat tor |
between two protocols calls the introductory | protocol and the final protocol or eschatocol. |
Adapting proofs-as-programs: The Curry-Howard | Protocol, Iman Hafiz Poernomo, John Newsome Crossley a |
As such, the Istanbul | Protocol provides useful guidance for doctors and lawy |
political wing of UNITA, violated the Lusaka | Protocol as well as UN-imposed sanctions. |
nment on April 4, 2002 relating to the Lusaka | Protocol. |
reamed on the internet either through the MMS | protocol or the RTSP protocol. |
cher must be aware that both: the observation | protocol (recorded in writing and/or on videotape) and |
zechoslovakia who declined to sign the Moscow | Protocol. |
ory Boys, Morons from Outer Space, The Fourth | Protocol, There's Only One Jimmy Grimble, Family Portr |
ands UTF-8 messages for message types the ICQ | protocol does not use them for). |
It runs in the Internet | Protocol stack on any Windows XP, Mac OS X, or Linux P |
known to be negligible, then the experimental | protocol may specify that the interaction terms be ass |
, which coincides with the month that the Rio | Protocol was signed. |
st's human right under Article 3 of the First | Protocol. |
provide the scp2 program, which uses the SFTP | protocol instead of SCP, but provides the very same co |
o become the 99th country to ratify the Kyoto | Protocol on December 17, 2002 cast a cloud over the fu |
es for the address range &60-&7F but the Tube | protocol only used the lowest 3 bits. |
g, through the use of “proxies,” the Internet | Protocol addresses from which their attacks originated |
The AIS-P | protocol is an alternative to the ADS-B and Mode S bas |
ratification and implementation of the Maputo | Protocol on the Rights of Women in Africa. |
e declared his personal support for the Kyoto | Protocol during the 2004 federal election, despite his |
It will be phased out soon under the Montreal | Protocol, to be replaced by other refrigerants with lo |
ng the Hungarians could explain the Byzantine | protocol by which, in the exchange of ambassadors unde |
rated copies of the film using the BitTorrent | protocol over P2P networks. |
The Kyoto | Protocol includes additional requirements for national |
Upon finalisation of the Istanbul | Protocol in 1999, an article on the Protocol was publi |
The interlock | protocol, as described by Ron Rivest and Adi Shamir, w |
the Clean Development Mechanism of the Kyoto | Protocol. |
ng with channel use arbitration, in the AIS-P | protocol. |
One of the clauses, the Fourth | Protocol, forbids the non-conventional delivery of a n |
ussen was extremely effective in the Montreal | Protocol negotiations "because of her open, frank, and |
ne of the requirements satisfied by the AIS-P | protocol is that a missile with an ADS-B type target h |
pe, he bore responsibility for the additional | protocol to the European Convention of Human Rights de |
FTP bounce attack is an exploit of the FTP | protocol whereby an attacker is able to use the PORT c |
The Ident | Protocol, specified in RFC 1413, is an Internet protoc |
cification is currently maintained by the XML | Protocol Working Group of the World Wide Web Consortiu |
The Art of the Metaobject | Protocol (AMOP) is a 1991 book by Gregor Kiczales, Jim |
entation of the upper layers of the Bluetooth | protocol stack. |
st cells that were cultured by the designated | protocol, so-called '3T3 protocol'. |
f the Lavoisier Group which opposes the Kyoto | protocol on global warming. |
Early versions of RSA padding used in the SSL | protocol were vulnerable to a sophisticated adaptive c |
Additionally, Ireland must, under the Kyoto | Protocol reduce its greenhouse gas emissions to 13% ab |
ured with key material generated with the SKE | protocol or previously agreed upon key material (for e |
, Z could choose to not perform the Interlock | Protocol with B (opting to instead send his own Mb) bu |
is mIRC's file sharing abilities, via the DCC | protocol, featuring a built in file server. |
stant messaging programs that support the MSN | protocol (such as aMSN and Pidgin) allow this to be do |
s adapted from Article 77.2 of the Additional | Protocol I to the Geneva Conventions of 12 August 1949 |
The Hotline | protocol was a binary protocol which accounted for its |
s the implementation of aspects of the Lusaka | Protocol, including the promulgation of a law granting |
n invoked on network elements via the NETCONF | protocol. |
In addition to the SSH | protocol, SFTPPlus supports file transfer using FTP, H |
ve Nuclear-Test-Ban Treaty and the Additional | Protocol to the Comprehensive Safeguards Agreement. |
The agreement | protocol or consensus protocol is an unforced dynamica |
ere applicable, START I, including the Lisbon | Protocol; and maintain fully effective export controls |
The MECIF | Protocol (Medical Computer Interface Protcol), is a ra |
The DNS | protocol requires that a query for a nonexistent domai |
The TMS | protocol fills a gap between the simplistic standard u |
Marrakech, where the USA boycotted the Kyoto | protocol and still ignores the Charter." |
essaging client for GNOME supporting the XMPP | protocol. |
If the authentication | protocol is not carefully designed, the target will ac |
urther the nation's compliance with the Kyoto | Protocol. |
rison (drafter of article XIII of the Potsdam | Protocol concerning population transfers), and Sir Den |
uses Secure Shell (SSH) and supports the SCP | protocol in addition to SFTP. |
The Fourth | Protocol is a novel written by Frederick Forsyth and p |
2001 Cryptanalysis of WEP, the security | protocol used in 802.11 "WiFi" networks (with Nikita B |
ters Borisov and Pavel Petrovic in The Fourth | Protocol (1987), TV presenter Ernest Weller in Reposse |
ver was not a normal part of the experimental | protocol. |
The Istanbul | Protocol was submitted to the UN High Commissioner for |
is in computer timekeeping, including the NTP | protocol. |
Internet for the ICQ network (using the OSCAR | protocol). |
ess and the coming into force of the Optional | Protocol on the Involvement of Children in Armed Confl |
ectivity via EARN with DECnet as the dominant | protocol. |
It only works with the OSCAR | protocol and if both chat partners use Trillian. |
1995, updating it in 1997 to rebut the Kyoto | Protocol. |
Recently, under the Kyoto | Protocol, garbage collecting companies in some develop |
The office was established after the Kyoto | Protocol came into force. |
The Kyoto | Protocol was the result of an international convention |
97, but that the implementation of the Lusaka | Protocol was behind schedule. |
Parties to the Optional | Protocol to the Convention on the Rights of Persons wi |
t's non-standards-based extensions to the SIP | protocol. |
e was a main participant in putting the Kyoto | Protocol together in 1997. |
ts initial incarnation in the mid 90s, the I3 | protocol has gone through 3 revisions, adding various |
Work on the Z39.50 | protocol began in the 1970s, and led to successive ver |
gly inconsequential implementation of the IRC | protocol is increasingly being seen as a means to evad |
q further specified the nature of the earlier | protocol by forming a joint committee on technical iss |
This was contrary to the court's | protocol rules which imposed a one year period of mour |
The Brazzaville | Protocol mandated the withdrawal of Cuban troops from |
StreamCast, that originally used the Opennap | protocol, but later supported many different peer-to-p |
s delegation to the negotiations on the Kyoto | Protocol to the Climate Convention. |
here are identified deficiencies to the AIS-P | protocol - it is worthless for purposes of billing and |
Summit and the successor treaty to the Kyoto | Protocol. |
ore the country concerned joined the Optional | Protocol are not permitted. |
Plibersek said that acceding to the Optional | Protocol "will send a strong message that Australia is |
Negotiations on a successor to the Kyoto | Protocol were the primary focus of the conference. |
in negotiating and implementing the Montreal | Protocol which curbed the production of CFCs and other |
e DOS shell, and file transfer via the XMODEM | protocol. |
sten silently for weather alerts via the SAME | protocol and then sound an alarm to warn the listener |
a number of Microsoft's extensions to the SIP | protocol for Enhanced Presence features. |
e latest versions also support the BitTorrent | protocol and Shoutcast radio stations. |
Then, following the trial | protocol, the specified statistical test is performed |
nderson committed Salt Lake City to the Kyoto | Protocol in 2002. |
ents honor commitments set forth by the Kyoto | Protocol, by conducting in unison peaceful demonstrati |
Newer versions of the uTalk | protocol have added social features found in most mess |
The treaty's | Protocol applies to aircraft which can carry at least |
With the 1815 | Protocol of the Conference of Paris, (signed on 20 Nov |
to enact provisions giving effect to the 2003 | Protocol by affirmative Order in Council. |
he Internet to orbit, using both the Internet | Protocol and Mobile IP. |
s active in negotiations leading to the Kyoto | Protocol of 1997. |
describe the quantum version of the Byzantine | protocol, which works in constant time. |
log and present virtual channel, via the PSIP | protocol. |
nd thick-client email programs using the IMAP | protocol. |
racters which would not be allowed in the IRC | protocol are escaped. |
since January 1, 1994 as part of the Montreal | Protocol on ozone depleting substances. |
In 2001 he developed the MANOLITO | protocol, Blubster and Piolet - two peer-to-peer file- |
The Japan-Korea | Protocol of August 1904 was made between the Empire of |
dministration Similar objections to the Kyoto | Protocol were why the Bush administration refused to s |
It welcomed the signing of the Lusaka | Protocol in Lusaka, Tanzania, on November 20, 1994 as |
regarding a successor agreement to the Kyoto | Protocol. |
h contains a description of the communication | protocol. |
e effects on the implementation of the Lusaka | Protocol, the civilian population and the mandate of U |
itor the ceasefire provided for in the Lusaka | Protocol, commending both the Government of Angola and |
The syntax of the Z39.50 | protocol allows for very complex queries. |
ed on its digital channel, 28, using the PSIP | protocol to display its virtual channel as 14. |
with images, I'm unsure as to the appropriate | protocol in this situation. |
The Z-Push | protocol is HTTP based, and uses WBXML (WAP Binary XML |
endent Arab state as outlined in the Damascus | Protocol during the correspondence with Hussein. |
ently, it has been used in Zfone and the ZRTP | protocol, the successor to PGPfone. |
It features support for the BitTorrent | protocol, Metalink, and PodCast support, along with bu |
Moreover, the UDP | protocol could be seen as increasing the anonymity in |
carbon dioxide reduction targets of the Kyoto | Protocol will require modifications to how coal is uti |
The Compassion | Protocol, 1993 |
thiam Inc., the company licensing the Prometa | protocol, named Freeman-Wilson to its board of directo |
Complying with the Montreal | Protocol, its manufacture was banned in the United Sta |
After entry into force of the 2010 | protocol to the convention, it is open to any state pa |
I'm not sure of the exact | protocol, but they would have needed joint UK/US autho |
mplementing the remaining tasks of the Lusaka | Protocol. |
The MQTT | protocol is a technique for telemetry systems to provi |
t Kit from Millipore is based on the standard | protocol, but enables processing of a large number of |
nto its CO2 reduction program under the Kyoto | Protocol, mandating the installation of 5.2 million un |
s as the co-inventor of the Needham-Schroeder | protocol. |
AICCU primarily uses the TIC | protocol to retrieve the configuration parameters of t |
Using the Z39.50 | protocol it both accesses remote catalogs and makes it |
author of the book The Art of the Metaobject | Protocol, along with Jim Des Rivieres and Daniel G. Bo |
The Machakos | Protocol (or Chapter I), signed in Machakos, Kenya on |
The SMLT | protocol has been submitted to the IETF for considerat |
rk, the first XML Processor, and APE the Atom | Protocol Exerciser. |
mber 15, 1994 to boost support for the Lusaka | Protocol, a peace agreement signed in August that trie |
When it was negotiated, the Geneva | Protocol of 1925, which prohibits the use of biologica |
e instant messaging client based on the OSCAR | protocol. |
two sites, a number of add-ons to the XMODEM | protocol were implemented over time. |
g subscribers to access it through the WebDAV | protocol, which allows emails to be downloaded locally |
The checksum used in the original | protocol was extremely simple, and errors within the p |
The SPARQL | Protocol and RDF Query Language uses a similar N3 subs |
Originally a Linux client for the eDonkey | protocol, it now runs on many flavors of Unix-like, Ma |
ng his tenure he was a supporter of the Kyoto | Protocol. |
The DisplayML | protocol supports file transfer, which makes it possib |
Media relaying with the TURN | protocol |
standard wire-level protocols, plus their own | protocol called OpenWire. |
iant network to provide all of their Internet | Protocol (IP)-based services, such as Internet access |
These include | Protocol No. 13 to the European Convention on Human Ri |
This IM | protocol, which is a robust and widely extended protoc |
Apologies if this breaches | protocol I'm not aware of. |
This additional | protocol was the subject of negotiations in late 2001 |
Separation of Forces were condemned, though a | protocol signed on May 12, 2005 to strengthen its impl |
the DS among themselves communicate through a | protocol called the Database Support Protocol. |
The AR and the AS communicate through a | protocol called the Application Support Protocol which |
virtual channel appears as 55.1 through PSIP | protocol. |
Applications are submitted through the | Protocol Department of the Royal Ministry of Foreign A |
ging/Streaming - supports Real Time Messaging | Protocol (RTMP) for chat messaging and video/audio str |
ssaging, streaming media (Real Time Messaging | Protocol) and many developer productivity tools. |
lude parameters that configure the timing and | protocol requirements for a memory model as specified |
.0, TLS 1.1 protocols and the current TLS 1.2 | protocol |
give early and favorable consideration to the | Protocol and give its advice and consent to ratificati |
mes's Palace when it was so contrary to Royal | Protocol? |
According to the | protocol of county police boss Zidor, rumors began to |
r to juxtapose multiple shots, according to a | protocol designed by the physician. |
Worth, who buried them according to military | protocol in his backyard. |
Parties to the | Protocol are further obligated to adopt measures to en |
In addition, every Party to the | Protocol was committed to inform the UN Secretary-Gene |
petroleum jelly), when used according to its | protocol. |
Section 2 of Article 6 allows a Party to the | Protocol at their discretion only to prosecute if the |
o be phased out in 2015 according to Montreal | Protocol. |
This tracing is then transferred to a | protocol where over twenty pieces of other information |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |