「Protocol」の共起表現(2語右で並び替え)5ページ目 - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > Protocolの意味・解説 > Protocolに関連した共起表現

「Protocol」の共起表現一覧(2語右で並び替え)5ページ目

該当件数 : 949



Parties to the Optional Protocol to the Convention on the Rights of Persons wi
The protocol provided the control and management of the Eu
The Protocol to the 1979 Convention on Long-Range Transbou
ng from the Diplomatic Service he was Head of Protocol for the Hong Kong Government (1985-1988).
The Brazzaville Protocol mandated the withdrawal of Cuban troops from
s delegation to the negotiations on the Kyoto Protocol to the Climate Convention.
wo Palermo protocols, the other one being the Protocol against the Smuggling of Migrants by Land, Se
acebook IM, as well as its own proprietary IM protocol under the same name;
Negotiations on a successor to the Kyoto Protocol were the primary focus of the conference.
ure and governance, DeNardis is the author of Protocol Politics: The Globalization of Internet Gover
rief neuropsychological test derived from the protocol of the CERAD 10-word recall test.
With the 1815 Protocol of the Conference of Paris, (signed on 20 Nov
Martinez was sworn in as Deputy Chief of Protocol of the United States on December 12, 2005.
e Rights of the Child (1989) and its Optional Protocol on the Sale of Children, Child Prostitution a
Austria declared Denmark in violation of the Protocol, by the November Constitution, which Christia
xample, the TCP is a request-response pattern protocol, and the UDP has a one-way pattern.
This protocol recognised the Bolivian territories occupied
endent Arab state as outlined in the Damascus Protocol during the correspondence with Hussein.
Was there a similar dual-control protocol for the Jupiters, or were they entirely under
After entry into force of the 2010 protocol to the convention, it is open to any state pa
nto its CO2 reduction program under the Kyoto Protocol, mandating the installation of 5.2 million un
elivery and Financing, the Joint Committee on Protocol, and the Joint Committee on Administrative, E
y did in the beginning call for adoption of a protocol to the ECHR.
that convert requests from Java programs to a protocol that the DBMS can understand.
The Protocol to the Paris Agreement detailed the functions
ortationis, Libri III contra Felicem, and the protocol of the conference with Pepin and the bishops
ich define the behavior of the program by the protocol of their interactions.
Section 2 of Article 6 allows a Party to the Protocol at their discretion only to prosecute if the
sten silently for weather alerts via the SAME protocol and then sound an alarm to warn the listener
I'm not sure of the exact protocol, but they would have needed joint UK/US autho
Apologies if the protocol for this is incorrect.
The AIS-P protocol does this by eliminating a requirement for mu
with images, I'm unsure as to the appropriate protocol in this situation.
observed in a subsequent experiment, but the protocol in this latter experiment has since been crit
ccess the on chip debug interface, a specific protocol and tight timing with distinct voltage levels
are the most popular, and changes its display protocol over time to reflect this.
is dependent on the length of time a routing protocol requires to successfully converge (change or
SSH is a protocol designed to allow remote access to shells and
nded Iraq of its obligations under the Geneva Protocol and to unconditionally remove and destroy all
on on attacks against civilians in Additional Protocol I to the Geneva Conventions)
tated that its objective of SSH File Transfer Protocol was to provide a secure file transfer functio
argued that the convention and Article 47 of Protocol Additional to the Geneva Conventions of 12 Au
Furthermore, under Protocol Additional to the Geneva Conventions of 12 Au
rn the white elephant, however Indra bound by protocol refused to accept a gift that he had made, an
e use of First Virtual's Simple MIME Exchange Protocol (SMXP) to verify accounts and initiate paymen
to "dumb terminals", they could use formatted protocol packets to send information to each other, so
it-switched network layer computer networking protocol similar to X.25, developed at Bell Labs for b
from activities inconsistent with the Lusaka Protocol and to respect UNITA as a political party.
erPlanetary Network, is a computer networking protocol designed to operate at interplanetary distanc
one of the three main components of UDDI, the protocol used to discover Web Services (the other two
s adapted from Article 77.2 of the Additional Protocol I to the Geneva Conventions of 12 August 1949
Chairman of the Joint Chiefs of Staff and is protocol equivalent to a three-star vice admiral.
the Urs ceremony at the same time to maintain protocol and to avoid a situation in which who would p
ld this post as a full-time appointment since Protocol 11 to the European Convention on Human Rights
It uses a metaobject protocol (MOP) to provide services for language extens
s of the Euphrates-Tigris river system is the protocol annexed to the 1946 Treaty of Friendship and
n 1990, with a view to developing an Optional Protocol similar to those of other UN human rights ins
The treaty's Protocol applies to aircraft which can carry at least
ses: to give effect to the Supplementary Fund Protocol 2003, to give effect to Annex IV of the MARPO
s the interface at mechanical, electrical and protocol levels to establish communication between met
Data-Link Switching (DLSw) is a tunneling protocol designed to tunnel unroutable, non-IP based p
synchronous File Transfer (SAFT), an Internet protocol bound to TCP port 487
Bush dismissed Kyoto Protocol as too costly, describing it as "an unrealist
the Syngress' Wireshark and Ethereal Network Protocol Analyzer Toolkit and Ethereal Packet Sniffing
Wireshark & Ethereal Network Protocol Analyzer Toolkit, Syngress Publishing, ISBN 9
emencies (Baton Rouge: LSU Press, 2007) and A Protocol for Touch (Denton: UNT Press, 2000).
Protocol also toured with New Order, Fisherspooner, Th
FSS) is a humorous proposal to carry Internet Protocol (IP) traffic by semaphores.
Media Object Server (MOS) is an XML-based protocol for transferring information between newsroom
ity when compared to the Transmission Control Protocol (TCP) transport protocol.
company has evolved from using a proprietary protocol called TSMP (Time Synchronized Mesh Protocol)
ters Borisov and Pavel Petrovic in The Fourth Protocol (1987), TV presenter Ernest Weller in Reposse
It is, however, possible to execute SKE protocol between two users and use the generated key t
wraps an ODBC driver around a Java-based wire protocol library, typically from the DBMS vendor.
The Protocol bringing under International Control Drugs Ou
a, a re-implementation of SMB/CIFS networking protocol, released under the GNU General Public Licens
Datakit offers a packet-switched protocol called Universal Receiver Protocol (URP) that
were never sent to headquarters, as military protocol required, until an Americal veteran named Ron
ipal investigator for the anthrax vaccination protocol set up by the Centers for Disease Control fol
The protocol, drawn up under the auspices of the Internati
Though it remains an official Internet protocol, its use is considered a security vulnerabili
XMPP (Any client supporting XMPP protocol can use transports to connect to .NET Messeng
"Where possible, the protocol makes use of existing Internet and Web techno
iveX; the program automatically chooses which protocol to use based on the needs and capabilities of
ically tailored to support the SIP signalling protocol for use in an IMS network.
Google's protocol buffers use a similar format to have compact
SIP, a signaling protocol commonly used for Voice over IP;
for each Traveline region with the JourneyWeb protocol being used to manage journeys between Traveli
The protocol is used when statistical testing is inappropr
es for the address range &60-&7F but the Tube protocol only used the lowest 3 bits.
TCP/IP is the protocol set used for email and web browsing.
As such, the Istanbul Protocol provides useful guidance for doctors and lawy
It is a client-server based protocol that uses a modified RS-232 cable to allow a
The distributed hash table protocol Koorde uses a De Bruijn graph.
ML-RPC is a Java implementation of XML-RPC, a protocol that uses XML over HTTP to implement remote p
He found that his SMR protocol, which uses visual and auditory EEG biofeedba
Protocol will vary from one society to another.
Java JMS specifications do not specify a wire protocol, each vendor's JMS implementation is distinct
t the URL interface provided by its companion protocol Search/Retrieve via URL (SRU).
With the combination of IP (Internet Protocol) -based VIDA networks and the Unity XG-100 mu
nd video system, meeting rooms, banquet hall, protocol and VIP lounge, business centre, information
As such, he took charge of protocol, state visits, investitures, garden parties,
ginal development of RFB (remote framebuffer) protocol and VNC, the desktop sharing technology
software application for Voice over Internet Protocol (VoIP) voice communications in IP networks, s
Both programs use the Session Initiation Protocol for VoIP call signalisation.
As part of the trial protocol, a volunteer must have begun drug treatment i
Early versions of RSA padding used in the SSL protocol were vulnerable to a sophisticated adaptive c
The OMA CP protocol covers WAP provisioning with minimal user int
The Internet Content Adaptation Protocol (ICAP) was developed in the late 1990s to pro
paper proposed using it as an authentication protocol, which was subsequently broken.
author of the Zimmermann-Sassaman key-signing protocol, and was an organizer of the protests followi
Instant Messaging and Presence Protocol (IMPP) was a protocol for instant messaging p
anisms that would address non-compliance with Protocol provisions was deferred to COP 7, but include
WS-Eventing defines a protocol for web services to subscribe to another web
ng development of the BitTorrent peer-to-peer protocol, as well as the ongoing development of µTorre
political wing of UNITA, violated the Lusaka Protocol as well as UN-imposed sanctions.
erating officer of the Office of the Chief of Protocol, as well as Acting Chief of Protocol in the a
Erasmus Bilateral Agreements and other protocol agreements were developed.
Protocol specifications were proposed and iterated thr
onal Performance Measurement and Verification Protocol (IPMVP), which defines common terminology and
s decision-making process during the Montreal Protocol Agreement, which has resulted in a near elimi
llenge-rechallenge (CDR) is a medical testing protocol in which a medicine or drug is administered,
t powerful feature of JGroups is its flexible protocol stack, which allows developers to adapt it to
The treaty includes a protocol under which the five nuclear-weapon states re
This was contrary to the court's protocol rules which imposed a one year period of mour
Baron wrote a 500 page report on NASA safety protocol violation, which he gave to Rep. Olin E. Teag
ng the Hungarians could explain the Byzantine protocol by which, in the exchange of ambassadors unde
contains an explanation of what a metaobject protocol is, why it is desirable, and the de facto sta
dministration Similar objections to the Kyoto Protocol were why the Bush administration refused to s
Equivalent Privacy (WEP), the first security protocol for Wi-Fi, proved vulnerable to several attac
XRD metadata discovery, the Portable Contacts protocol, OpenSocial widget APIs, microformats like XF
By the use of this protocol, it will enable developers program their own
Area established by a Swaziland/South Africa Protocol and will be known as "Lake Jozini Transfronti
In 1997 he became Chief Executive of Protocol Multimedia with diverse media divisions that
Tmodem is derived from the HTMS protocol Translink with special modifications so that
cryptanalyses of the WEP wireless encryption protocol together with Ian Goldberg and David Wagner,
Dallas Protocol works with the Office of the Mayor, City offi
author of the book The Art of the Metaobject Protocol, along with Jim Des Rivieres and Daniel G. Bo
In addition to protocol development work, Woodcock has developed netw
describe the quantum version of the Byzantine protocol, which works in constant time.
as part of an effort to create one liturgical protocol that would be practised throughout the entire
elopment of a greenhouse gas emissions offset protocol that would include the restoration of tidal w
ace DLSw tunneling with the more modern IPDLC protocol, which wraps DLC traffic at the Transport Lay
A Commentary to the Protocol was written by Adolf Lande, former Secretary
To the extent possible, the protocol uses XML to represent the protocol data being
The Extensible User Interface Protocol, or XUP, is a proposed web standard.
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS