「Protocol」の共起表現(2語左で並び替え)5ページ目 - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > Protocolの意味・解説 > Protocolに関連した共起表現

「Protocol」の共起表現一覧(2語左で並び替え)5ページ目

該当件数 : 1073



il discussed the implementation of the Lusaka Protocol, and extended the mandate of the United Natio
The IST protocol was developed by Nortel (now acquired by Avay
luded A Taste of Honey, Frenzy and The Fourth Protocol.
with the Boxer Rebellion and signed The Boxer Protocol on September 7, 1901 on behalf of Germany, ma
Spirit: for the Skype protocol on the n900.
from activities inconsistent with the Lusaka Protocol and to respect UNITA as a political party.
The Smuggling Protocol entered into force on 28 January 2004.
Agreement thereby pledging Sitka to the Kyoto Protocol goal of reducing greenhouse gas by 2012.
It is also referred to as the Smuggling protocol.
rgency of the strict observance of the Geneva Protocol, expecting both sides to refrain from the fut
The Fourth Protocol (film), 1987, Dir John Mackenzie
for each Traveline region with the JourneyWeb protocol being used to manage journeys between Traveli
s decision-making process during the Montreal Protocol Agreement, which has resulted in a near elimi
validates the approach to use of the Internet Protocol articulated by Keith Hogie with NASA Goddard
(often implemented using the two-phase-commit protocol), because although both types of transactions
References that cite the Istanbul Protocol as a useful tool in the efforts to combat tor
between two protocols calls the introductory protocol and the final protocol or eschatocol.
Adapting proofs-as-programs: The Curry-Howard Protocol, Iman Hafiz Poernomo, John Newsome Crossley a
As such, the Istanbul Protocol provides useful guidance for doctors and lawy
political wing of UNITA, violated the Lusaka Protocol as well as UN-imposed sanctions.
nment on April 4, 2002 relating to the Lusaka Protocol.
reamed on the internet either through the MMS protocol or the RTSP protocol.
cher must be aware that both: the observation protocol (recorded in writing and/or on videotape) and
zechoslovakia who declined to sign the Moscow Protocol.
ory Boys, Morons from Outer Space, The Fourth Protocol, There's Only One Jimmy Grimble, Family Portr
ands UTF-8 messages for message types the ICQ protocol does not use them for).
It runs in the Internet Protocol stack on any Windows XP, Mac OS X, or Linux P
known to be negligible, then the experimental protocol may specify that the interaction terms be ass
, which coincides with the month that the Rio Protocol was signed.
st's human right under Article 3 of the First Protocol.
provide the scp2 program, which uses the SFTP protocol instead of SCP, but provides the very same co
o become the 99th country to ratify the Kyoto Protocol on December 17, 2002 cast a cloud over the fu
es for the address range &60-&7F but the Tube protocol only used the lowest 3 bits.
g, through the use of “proxies,” the Internet Protocol addresses from which their attacks originated
The AIS-P protocol is an alternative to the ADS-B and Mode S bas
ratification and implementation of the Maputo Protocol on the Rights of Women in Africa.
e declared his personal support for the Kyoto Protocol during the 2004 federal election, despite his
It will be phased out soon under the Montreal Protocol, to be replaced by other refrigerants with lo
ng the Hungarians could explain the Byzantine protocol by which, in the exchange of ambassadors unde
rated copies of the film using the BitTorrent protocol over P2P networks.
The Kyoto Protocol includes additional requirements for national
Upon finalisation of the Istanbul Protocol in 1999, an article on the Protocol was publi
The interlock protocol, as described by Ron Rivest and Adi Shamir, w
the Clean Development Mechanism of the Kyoto Protocol.
ng with channel use arbitration, in the AIS-P protocol.
One of the clauses, the Fourth Protocol, forbids the non-conventional delivery of a n
ussen was extremely effective in the Montreal Protocol negotiations "because of her open, frank, and
ne of the requirements satisfied by the AIS-P protocol is that a missile with an ADS-B type target h
pe, he bore responsibility for the additional protocol to the European Convention of Human Rights de
FTP bounce attack is an exploit of the FTP protocol whereby an attacker is able to use the PORT c
The Ident Protocol, specified in RFC 1413, is an Internet protoc
cification is currently maintained by the XML Protocol Working Group of the World Wide Web Consortiu
The Art of the Metaobject Protocol (AMOP) is a 1991 book by Gregor Kiczales, Jim
entation of the upper layers of the Bluetooth protocol stack.
st cells that were cultured by the designated protocol, so-called '3T3 protocol'.
f the Lavoisier Group which opposes the Kyoto protocol on global warming.
Early versions of RSA padding used in the SSL protocol were vulnerable to a sophisticated adaptive c
Additionally, Ireland must, under the Kyoto Protocol reduce its greenhouse gas emissions to 13% ab
ured with key material generated with the SKE protocol or previously agreed upon key material (for e
, Z could choose to not perform the Interlock Protocol with B (opting to instead send his own Mb) bu
is mIRC's file sharing abilities, via the DCC protocol, featuring a built in file server.
stant messaging programs that support the MSN protocol (such as aMSN and Pidgin) allow this to be do
s adapted from Article 77.2 of the Additional Protocol I to the Geneva Conventions of 12 August 1949
The Hotline protocol was a binary protocol which accounted for its
s the implementation of aspects of the Lusaka Protocol, including the promulgation of a law granting
n invoked on network elements via the NETCONF protocol.
In addition to the SSH protocol, SFTPPlus supports file transfer using FTP, H
ve Nuclear-Test-Ban Treaty and the Additional Protocol to the Comprehensive Safeguards Agreement.
The agreement protocol or consensus protocol is an unforced dynamica
ere applicable, START I, including the Lisbon Protocol; and maintain fully effective export controls
The MECIF Protocol (Medical Computer Interface Protcol), is a ra
The DNS protocol requires that a query for a nonexistent domai
The TMS protocol fills a gap between the simplistic standard u
Marrakech, where the USA boycotted the Kyoto protocol and still ignores the Charter."
essaging client for GNOME supporting the XMPP protocol.
If the authentication protocol is not carefully designed, the target will ac
urther the nation's compliance with the Kyoto Protocol.
rison (drafter of article XIII of the Potsdam Protocol concerning population transfers), and Sir Den
uses Secure Shell (SSH) and supports the SCP protocol in addition to SFTP.
The Fourth Protocol is a novel written by Frederick Forsyth and p
2001 Cryptanalysis of WEP, the security protocol used in 802.11 "WiFi" networks (with Nikita B
ters Borisov and Pavel Petrovic in The Fourth Protocol (1987), TV presenter Ernest Weller in Reposse
ver was not a normal part of the experimental protocol.
The Istanbul Protocol was submitted to the UN High Commissioner for
is in computer timekeeping, including the NTP protocol.
Internet for the ICQ network (using the OSCAR protocol).
ess and the coming into force of the Optional Protocol on the Involvement of Children in Armed Confl
ectivity via EARN with DECnet as the dominant protocol.
It only works with the OSCAR protocol and if both chat partners use Trillian.
1995, updating it in 1997 to rebut the Kyoto Protocol.
Recently, under the Kyoto Protocol, garbage collecting companies in some develop
The office was established after the Kyoto Protocol came into force.
The Kyoto Protocol was the result of an international convention
97, but that the implementation of the Lusaka Protocol was behind schedule.
Parties to the Optional Protocol to the Convention on the Rights of Persons wi
t's non-standards-based extensions to the SIP protocol.
e was a main participant in putting the Kyoto Protocol together in 1997.
ts initial incarnation in the mid 90s, the I3 protocol has gone through 3 revisions, adding various
Work on the Z39.50 protocol began in the 1970s, and led to successive ver
gly inconsequential implementation of the IRC protocol is increasingly being seen as a means to evad
q further specified the nature of the earlier protocol by forming a joint committee on technical iss
This was contrary to the court's protocol rules which imposed a one year period of mour
The Brazzaville Protocol mandated the withdrawal of Cuban troops from
StreamCast, that originally used the Opennap protocol, but later supported many different peer-to-p
s delegation to the negotiations on the Kyoto Protocol to the Climate Convention.
here are identified deficiencies to the AIS-P protocol - it is worthless for purposes of billing and
Summit and the successor treaty to the Kyoto Protocol.
ore the country concerned joined the Optional Protocol are not permitted.
Plibersek said that acceding to the Optional Protocol "will send a strong message that Australia is
Negotiations on a successor to the Kyoto Protocol were the primary focus of the conference.
in negotiating and implementing the Montreal Protocol which curbed the production of CFCs and other
e DOS shell, and file transfer via the XMODEM protocol.
sten silently for weather alerts via the SAME protocol and then sound an alarm to warn the listener
a number of Microsoft's extensions to the SIP protocol for Enhanced Presence features.
e latest versions also support the BitTorrent protocol and Shoutcast radio stations.
Then, following the trial protocol, the specified statistical test is performed
nderson committed Salt Lake City to the Kyoto Protocol in 2002.
ents honor commitments set forth by the Kyoto Protocol, by conducting in unison peaceful demonstrati
Newer versions of the uTalk protocol have added social features found in most mess
The treaty's Protocol applies to aircraft which can carry at least
With the 1815 Protocol of the Conference of Paris, (signed on 20 Nov
to enact provisions giving effect to the 2003 Protocol by affirmative Order in Council.
he Internet to orbit, using both the Internet Protocol and Mobile IP.
s active in negotiations leading to the Kyoto Protocol of 1997.
describe the quantum version of the Byzantine protocol, which works in constant time.
log and present virtual channel, via the PSIP protocol.
nd thick-client email programs using the IMAP protocol.
racters which would not be allowed in the IRC protocol are escaped.
since January 1, 1994 as part of the Montreal Protocol on ozone depleting substances.
In 2001 he developed the MANOLITO protocol, Blubster and Piolet - two peer-to-peer file-
The Japan-Korea Protocol of August 1904 was made between the Empire of
dministration Similar objections to the Kyoto Protocol were why the Bush administration refused to s
It welcomed the signing of the Lusaka Protocol in Lusaka, Tanzania, on November 20, 1994 as
regarding a successor agreement to the Kyoto Protocol.
h contains a description of the communication protocol.
e effects on the implementation of the Lusaka Protocol, the civilian population and the mandate of U
itor the ceasefire provided for in the Lusaka Protocol, commending both the Government of Angola and
The syntax of the Z39.50 protocol allows for very complex queries.
ed on its digital channel, 28, using the PSIP protocol to display its virtual channel as 14.
with images, I'm unsure as to the appropriate protocol in this situation.
The Z-Push protocol is HTTP based, and uses WBXML (WAP Binary XML
endent Arab state as outlined in the Damascus Protocol during the correspondence with Hussein.
ently, it has been used in Zfone and the ZRTP protocol, the successor to PGPfone.
It features support for the BitTorrent protocol, Metalink, and PodCast support, along with bu
Moreover, the UDP protocol could be seen as increasing the anonymity in
carbon dioxide reduction targets of the Kyoto Protocol will require modifications to how coal is uti
The Compassion Protocol, 1993
thiam Inc., the company licensing the Prometa protocol, named Freeman-Wilson to its board of directo
Complying with the Montreal Protocol, its manufacture was banned in the United Sta
After entry into force of the 2010 protocol to the convention, it is open to any state pa
I'm not sure of the exact protocol, but they would have needed joint UK/US autho
mplementing the remaining tasks of the Lusaka Protocol.
The MQTT protocol is a technique for telemetry systems to provi
t Kit from Millipore is based on the standard protocol, but enables processing of a large number of
nto its CO2 reduction program under the Kyoto Protocol, mandating the installation of 5.2 million un
s as the co-inventor of the Needham-Schroeder protocol.
AICCU primarily uses the TIC protocol to retrieve the configuration parameters of t
Using the Z39.50 protocol it both accesses remote catalogs and makes it
author of the book The Art of the Metaobject Protocol, along with Jim Des Rivieres and Daniel G. Bo
The Machakos Protocol (or Chapter I), signed in Machakos, Kenya on
The SMLT protocol has been submitted to the IETF for considerat
rk, the first XML Processor, and APE the Atom Protocol Exerciser.
mber 15, 1994 to boost support for the Lusaka Protocol, a peace agreement signed in August that trie
When it was negotiated, the Geneva Protocol of 1925, which prohibits the use of biologica
e instant messaging client based on the OSCAR protocol.
two sites, a number of add-ons to the XMODEM protocol were implemented over time.
g subscribers to access it through the WebDAV protocol, which allows emails to be downloaded locally
The checksum used in the original protocol was extremely simple, and errors within the p
The SPARQL Protocol and RDF Query Language uses a similar N3 subs
Originally a Linux client for the eDonkey protocol, it now runs on many flavors of Unix-like, Ma
ng his tenure he was a supporter of the Kyoto Protocol.
The DisplayML protocol supports file transfer, which makes it possib
Media relaying with the TURN protocol
standard wire-level protocols, plus their own protocol called OpenWire.
iant network to provide all of their Internet Protocol (IP)-based services, such as Internet access
These include Protocol No. 13 to the European Convention on Human Ri
This IM protocol, which is a robust and widely extended protoc
Apologies if this breaches protocol I'm not aware of.
This additional protocol was the subject of negotiations in late 2001
Separation of Forces were condemned, though a protocol signed on May 12, 2005 to strengthen its impl
the DS among themselves communicate through a protocol called the Database Support Protocol.
The AR and the AS communicate through a protocol called the Application Support Protocol which
virtual channel appears as 55.1 through PSIP protocol.
Applications are submitted through the Protocol Department of the Royal Ministry of Foreign A
ging/Streaming - supports Real Time Messaging Protocol (RTMP) for chat messaging and video/audio str
ssaging, streaming media (Real Time Messaging Protocol) and many developer productivity tools.
lude parameters that configure the timing and protocol requirements for a memory model as specified
.0, TLS 1.1 protocols and the current TLS 1.2 protocol
give early and favorable consideration to the Protocol and give its advice and consent to ratificati
mes's Palace when it was so contrary to Royal Protocol?
According to the protocol of county police boss Zidor, rumors began to
r to juxtapose multiple shots, according to a protocol designed by the physician.
Worth, who buried them according to military protocol in his backyard.
Parties to the Protocol are further obligated to adopt measures to en
In addition, every Party to the Protocol was committed to inform the UN Secretary-Gene
petroleum jelly), when used according to its protocol.
Section 2 of Article 6 allows a Party to the Protocol at their discretion only to prosecute if the
o be phased out in 2015 according to Montreal Protocol.
This tracing is then transferred to a protocol where over twenty pieces of other information
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS