「Protocol」の共起表現一覧(2語右で並び替え)5ページ目
該当件数 : 949件
Parties to the Optional | Protocol to the Convention on the Rights of Persons wi |
The | protocol provided the control and management of the Eu |
The | Protocol to the 1979 Convention on Long-Range Transbou |
ng from the Diplomatic Service he was Head of | Protocol for the Hong Kong Government (1985-1988). |
The Brazzaville | Protocol mandated the withdrawal of Cuban troops from |
s delegation to the negotiations on the Kyoto | Protocol to the Climate Convention. |
wo Palermo protocols, the other one being the | Protocol against the Smuggling of Migrants by Land, Se |
acebook IM, as well as its own proprietary IM | protocol under the same name; |
Negotiations on a successor to the Kyoto | Protocol were the primary focus of the conference. |
ure and governance, DeNardis is the author of | Protocol Politics: The Globalization of Internet Gover |
rief neuropsychological test derived from the | protocol of the CERAD 10-word recall test. |
With the 1815 | Protocol of the Conference of Paris, (signed on 20 Nov |
Martinez was sworn in as Deputy Chief of | Protocol of the United States on December 12, 2005. |
e Rights of the Child (1989) and its Optional | Protocol on the Sale of Children, Child Prostitution a |
Austria declared Denmark in violation of the | Protocol, by the November Constitution, which Christia |
xample, the TCP is a request-response pattern | protocol, and the UDP has a one-way pattern. |
This | protocol recognised the Bolivian territories occupied |
endent Arab state as outlined in the Damascus | Protocol during the correspondence with Hussein. |
Was there a similar dual-control | protocol for the Jupiters, or were they entirely under |
After entry into force of the 2010 | protocol to the convention, it is open to any state pa |
nto its CO2 reduction program under the Kyoto | Protocol, mandating the installation of 5.2 million un |
elivery and Financing, the Joint Committee on | Protocol, and the Joint Committee on Administrative, E |
y did in the beginning call for adoption of a | protocol to the ECHR. |
that convert requests from Java programs to a | protocol that the DBMS can understand. |
The | Protocol to the Paris Agreement detailed the functions |
ortationis, Libri III contra Felicem, and the | protocol of the conference with Pepin and the bishops |
ich define the behavior of the program by the | protocol of their interactions. |
Section 2 of Article 6 allows a Party to the | Protocol at their discretion only to prosecute if the |
sten silently for weather alerts via the SAME | protocol and then sound an alarm to warn the listener |
I'm not sure of the exact | protocol, but they would have needed joint UK/US autho |
Apologies if the | protocol for this is incorrect. |
The AIS-P | protocol does this by eliminating a requirement for mu |
with images, I'm unsure as to the appropriate | protocol in this situation. |
observed in a subsequent experiment, but the | protocol in this latter experiment has since been crit |
ccess the on chip debug interface, a specific | protocol and tight timing with distinct voltage levels |
are the most popular, and changes its display | protocol over time to reflect this. |
is dependent on the length of time a routing | protocol requires to successfully converge (change or |
SSH is a | protocol designed to allow remote access to shells and |
nded Iraq of its obligations under the Geneva | Protocol and to unconditionally remove and destroy all |
on on attacks against civilians in Additional | Protocol I to the Geneva Conventions) |
tated that its objective of SSH File Transfer | Protocol was to provide a secure file transfer functio |
argued that the convention and Article 47 of | Protocol Additional to the Geneva Conventions of 12 Au |
Furthermore, under | Protocol Additional to the Geneva Conventions of 12 Au |
rn the white elephant, however Indra bound by | protocol refused to accept a gift that he had made, an |
e use of First Virtual's Simple MIME Exchange | Protocol (SMXP) to verify accounts and initiate paymen |
to "dumb terminals", they could use formatted | protocol packets to send information to each other, so |
it-switched network layer computer networking | protocol similar to X.25, developed at Bell Labs for b |
from activities inconsistent with the Lusaka | Protocol and to respect UNITA as a political party. |
erPlanetary Network, is a computer networking | protocol designed to operate at interplanetary distanc |
one of the three main components of UDDI, the | protocol used to discover Web Services (the other two |
s adapted from Article 77.2 of the Additional | Protocol I to the Geneva Conventions of 12 August 1949 |
Chairman of the Joint Chiefs of Staff and is | protocol equivalent to a three-star vice admiral. |
the Urs ceremony at the same time to maintain | protocol and to avoid a situation in which who would p |
ld this post as a full-time appointment since | Protocol 11 to the European Convention on Human Rights |
It uses a metaobject | protocol (MOP) to provide services for language extens |
s of the Euphrates-Tigris river system is the | protocol annexed to the 1946 Treaty of Friendship and |
n 1990, with a view to developing an Optional | Protocol similar to those of other UN human rights ins |
The treaty's | Protocol applies to aircraft which can carry at least |
ses: to give effect to the Supplementary Fund | Protocol 2003, to give effect to Annex IV of the MARPO |
s the interface at mechanical, electrical and | protocol levels to establish communication between met |
Data-Link Switching (DLSw) is a tunneling | protocol designed to tunnel unroutable, non-IP based p |
synchronous File Transfer (SAFT), an Internet | protocol bound to TCP port 487 |
Bush dismissed Kyoto | Protocol as too costly, describing it as "an unrealist |
the Syngress' Wireshark and Ethereal Network | Protocol Analyzer Toolkit and Ethereal Packet Sniffing |
Wireshark & Ethereal Network | Protocol Analyzer Toolkit, Syngress Publishing, ISBN 9 |
emencies (Baton Rouge: LSU Press, 2007) and A | Protocol for Touch (Denton: UNT Press, 2000). |
Protocol also toured with New Order, Fisherspooner, Th | |
FSS) is a humorous proposal to carry Internet | Protocol (IP) traffic by semaphores. |
Media Object Server (MOS) is an XML-based | protocol for transferring information between newsroom |
ity when compared to the Transmission Control | Protocol (TCP) transport protocol. |
company has evolved from using a proprietary | protocol called TSMP (Time Synchronized Mesh Protocol) |
ters Borisov and Pavel Petrovic in The Fourth | Protocol (1987), TV presenter Ernest Weller in Reposse |
It is, however, possible to execute SKE | protocol between two users and use the generated key t |
wraps an ODBC driver around a Java-based wire | protocol library, typically from the DBMS vendor. |
The | Protocol bringing under International Control Drugs Ou |
a, a re-implementation of SMB/CIFS networking | protocol, released under the GNU General Public Licens |
Datakit offers a packet-switched | protocol called Universal Receiver Protocol (URP) that |
were never sent to headquarters, as military | protocol required, until an Americal veteran named Ron |
ipal investigator for the anthrax vaccination | protocol set up by the Centers for Disease Control fol |
The | protocol, drawn up under the auspices of the Internati |
Though it remains an official Internet | protocol, its use is considered a security vulnerabili |
XMPP (Any client supporting XMPP | protocol can use transports to connect to .NET Messeng |
"Where possible, the | protocol makes use of existing Internet and Web techno |
iveX; the program automatically chooses which | protocol to use based on the needs and capabilities of |
ically tailored to support the SIP signalling | protocol for use in an IMS network. |
Google's | protocol buffers use a similar format to have compact |
SIP, a signaling | protocol commonly used for Voice over IP; |
for each Traveline region with the JourneyWeb | protocol being used to manage journeys between Traveli |
The | protocol is used when statistical testing is inappropr |
es for the address range &60-&7F but the Tube | protocol only used the lowest 3 bits. |
TCP/IP is the | protocol set used for email and web browsing. |
As such, the Istanbul | Protocol provides useful guidance for doctors and lawy |
It is a client-server based | protocol that uses a modified RS-232 cable to allow a |
The distributed hash table | protocol Koorde uses a De Bruijn graph. |
ML-RPC is a Java implementation of XML-RPC, a | protocol that uses XML over HTTP to implement remote p |
He found that his SMR | protocol, which uses visual and auditory EEG biofeedba |
Protocol will vary from one society to another. | |
Java JMS specifications do not specify a wire | protocol, each vendor's JMS implementation is distinct |
t the URL interface provided by its companion | protocol Search/Retrieve via URL (SRU). |
With the combination of IP (Internet | Protocol) -based VIDA networks and the Unity XG-100 mu |
nd video system, meeting rooms, banquet hall, | protocol and VIP lounge, business centre, information |
As such, he took charge of | protocol, state visits, investitures, garden parties, |
ginal development of RFB (remote framebuffer) | protocol and VNC, the desktop sharing technology |
software application for Voice over Internet | Protocol (VoIP) voice communications in IP networks, s |
Both programs use the Session Initiation | Protocol for VoIP call signalisation. |
As part of the trial | protocol, a volunteer must have begun drug treatment i |
Early versions of RSA padding used in the SSL | protocol were vulnerable to a sophisticated adaptive c |
The OMA CP | protocol covers WAP provisioning with minimal user int |
The Internet Content Adaptation | Protocol (ICAP) was developed in the late 1990s to pro |
paper proposed using it as an authentication | protocol, which was subsequently broken. |
author of the Zimmermann-Sassaman key-signing | protocol, and was an organizer of the protests followi |
Instant Messaging and Presence | Protocol (IMPP) was a protocol for instant messaging p |
anisms that would address non-compliance with | Protocol provisions was deferred to COP 7, but include |
WS-Eventing defines a | protocol for web services to subscribe to another web |
ng development of the BitTorrent peer-to-peer | protocol, as well as the ongoing development of µTorre |
political wing of UNITA, violated the Lusaka | Protocol as well as UN-imposed sanctions. |
erating officer of the Office of the Chief of | Protocol, as well as Acting Chief of Protocol in the a |
Erasmus Bilateral Agreements and other | protocol agreements were developed. |
Protocol specifications were proposed and iterated thr | |
onal Performance Measurement and Verification | Protocol (IPMVP), which defines common terminology and |
s decision-making process during the Montreal | Protocol Agreement, which has resulted in a near elimi |
llenge-rechallenge (CDR) is a medical testing | protocol in which a medicine or drug is administered, |
t powerful feature of JGroups is its flexible | protocol stack, which allows developers to adapt it to |
The treaty includes a | protocol under which the five nuclear-weapon states re |
This was contrary to the court's | protocol rules which imposed a one year period of mour |
Baron wrote a 500 page report on NASA safety | protocol violation, which he gave to Rep. Olin E. Teag |
ng the Hungarians could explain the Byzantine | protocol by which, in the exchange of ambassadors unde |
contains an explanation of what a metaobject | protocol is, why it is desirable, and the de facto sta |
dministration Similar objections to the Kyoto | Protocol were why the Bush administration refused to s |
Equivalent Privacy (WEP), the first security | protocol for Wi-Fi, proved vulnerable to several attac |
XRD metadata discovery, the Portable Contacts | protocol, OpenSocial widget APIs, microformats like XF |
By the use of this | protocol, it will enable developers program their own |
Area established by a Swaziland/South Africa | Protocol and will be known as "Lake Jozini Transfronti |
In 1997 he became Chief Executive of | Protocol Multimedia with diverse media divisions that |
Tmodem is derived from the HTMS | protocol Translink with special modifications so that |
cryptanalyses of the WEP wireless encryption | protocol together with Ian Goldberg and David Wagner, |
Dallas | Protocol works with the Office of the Mayor, City offi |
author of the book The Art of the Metaobject | Protocol, along with Jim Des Rivieres and Daniel G. Bo |
In addition to | protocol development work, Woodcock has developed netw |
describe the quantum version of the Byzantine | protocol, which works in constant time. |
as part of an effort to create one liturgical | protocol that would be practised throughout the entire |
elopment of a greenhouse gas emissions offset | protocol that would include the restoration of tidal w |
ace DLSw tunneling with the more modern IPDLC | protocol, which wraps DLC traffic at the Transport Lay |
A Commentary to the | Protocol was written by Adolf Lande, former Secretary |
To the extent possible, the | protocol uses XML to represent the protocol data being |
The Extensible User Interface | Protocol, or XUP, is a proposed web standard. |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |