「Protocol」の共起表現(2語右で並び替え) - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > Protocolの意味・解説 > Protocolに関連した共起表現

「Protocol」の共起表現一覧(2語右で並び替え)

該当件数 : 949



The MOS protocol allows a variety of devices to be controlled
This protocol uses a write-back policy.
Netcare uses a two-factor authentication protocol involving a username/password combination, an
Today, files transferred using the BitTorrent protocol constitute a significant slice of all Interne
ogy, typically considered to be a 4G wireless protocol, and a candidate for the replacement of curre
Canonical Protocol is a design pattern, applied within the servi
onmental effects of plans and programmes, the Protocol places a special emphasis on the consideratio
"Protokoll einer Folter" ( Protocol of a Torture) - 10:28
Beyond Protocol is a Massively Multiplayer Online Real-Time S
veterans in a 20-week double-blind crossover protocol with a two-week drug washout to allow for ret
The Damascus Protocol was a document given to Faisal bin Hussein by
References that cite the Istanbul Protocol as a useful tool in the efforts to combat tor
-based request/response protocols - a signing protocol and a verifying protocol.
The Transmission Control Protocol uses a variant of Go-Back-N ARQ to ensure rel
In computing, MCCP (Mud Client Compression Protocol) is a network protocol that is used in text M
P, originally defined as Simple Object Access Protocol, is a protocol specification for exchanging s
The 1999 Multi-effect ("Gothenburg") Protocol is a multi-pollutant protocol designed to red
SILC (Secure Internet Live Conferencing protocol) is a protocol that provides secure synchrono
is mIRC's file sharing abilities, via the DCC protocol, featuring a built in file server.
The Protocol adds a provision to Article 36 allowing for "
The Hotline protocol was a binary protocol which accounted for its
-service (DoS) attack using the User Datagram Protocol (UDP), a stateless computer networking protoc
By 17 February 2006 6 States had ratified the Protocol and a further 24 had signed the Protocol but
Reflecting these principles, the Protocol embodies a major structural revision of the C
The TMS protocol fills a gap between the simplistic standard u
The Fourth Protocol is a novel written by Frederick Forsyth and p
Each protocol has a block of information, called a header,
hough Arthur never officially granted her the protocol of a formal position, she proved to be a popu
ute Terminal Assembler and Recreator (AVATAR) protocol is a system of escape sequences occasionally
Dallas Protocol is a public-private partnership between the C
According to Canadian protocol, as a former Prime Minister, she is styled "T
The MQTT protocol is a technique for telemetry systems to provi
ifier, a URI-compatible scheme and resolution protocol for abstract identifiers used to identify and
Community Net has offered full Point-to-Point Protocol Internet access since 1998.
raries across the world using the NISO z39.50 protocol for accessing bibliographic databases.
onsiderable debate concerning what effect the protocol will actually have.
Newer versions of the Palringo protocol have added social features found in most mess
Newer versions of the uTalk protocol have added social features found in most mess
uses Secure Shell (SSH) and supports the SCP protocol in addition to SFTP.
The Kyoto Protocol includes additional requirements for national
IP TV (Internet Protocol TV), Addressable System etc. are some of the
CNNIC allocates Internet Protocol (IP) addresses and AS Numbers to domestic ISP
The Protocol also addresses policies and legislation, thou
n-profit corporation responsible for Internet protocol (IP) addressing and the domain name system (D
The Protocol also adds a provision to Article 22 stating t
It uses XMPP protocol and adheres to GNOME's published human interf
Final text of this protocol was adopted by the Council of Europe Committe
In November 2001 this protocol was adopted by ICAO as a global standard.
d only one experienced nurse who examined the protocol in advance, correctly guessed the experimenta
streaming, bidirectional, batch file transfer protocol with advanced Full-Streaming-Error-Correction
to enact provisions giving effect to the 2003 Protocol by affirmative Order in Council.
en they were used in the 1987 film The Fourth Protocol, and after closure in numerous productions, i
The protocol was agreed by SADC leaders in Mauritius on Au
circumstances of October far behind" and "the Protocol then agreed must now be considered outmoded".
e importance of the Acordos de Paz and Lusaka Protocol peace agreements between the Government of An
re to implement the Acordos de Paz and Lusaka Protocol peace agreements, relevant Security Council r
plementation of the Acordos de Paz and Lusaka Protocol peace agreements.
The Protocol is aimed at the protection of rights of migra
The ICAO standard for VDL Mode 4 specifies a protocol enabling aircraft to exchange data with groun
ll European countries have ratified the Kyoto Protocol, and all have supported strong reductions in
le task during this term was to supervise the protocol for all world leaders who attended the Novemb
ity and small footprint embedded USB software protocol stack, allowing device manufactures to easily
CTCP extends the original IRC protocol by allowing users to query other clients for
uTalk uses a proprietary protocol that allows communication between other users
Palringo uses a proprietary protocol that allows communication between other Palri
This protocol also allows communication between multiple in
gram and test result interpreter via a common protocol which allows Perl programmers to develop so m
g subscribers to access it through the WebDAV protocol, which allows emails to be downloaded locally
Continual improvements in protocol identification along with a significant incre
ufficient when an application-level messaging protocol must also guarantee some level of reliability
Clinical trials using a CDR protocol are also reported for clinicians attempting t
nthesis, including the Jung "non-aldol aldol" protocol, an alternate method for obtaining aldol prod
(often implemented using the two-phase-commit protocol), because although both types of transactions
In addition, the 1996 protocol prohibits altogether the practice of incinera
purpose was to bring experience in procedure, protocol and amending and introducing legislation.
The Byzantine agreement protocol is an essential part of this task.
The protocol is an enhancement to the Multi-Link Trunking
Note the difference between this protocol, and an earlier (technologically unrelated) p
The Optional Protocol establishes an individual complaints mechanis
nd used the challenge-dechallenge-rechallenge protocol in an effort to verify the link.
The Chief of Protocol is an officer of the United States Department
The AIS-P protocol is an alternative to the ADS-B and Mode S bas
other, shared by Ingolf Pernice, is that that protocol is an interpretative protocol which will eith
FTP bounce attack is an exploit of the FTP protocol whereby an attacker is able to use the PORT c
itecture (ICA), a Citrix-designed proprietary protocol for an application server system.
ey co-authored RFC 977, Network News Transfer Protocol (NNTP), an Internet standard for transmission
Southern African Development Community (SADC) protocol 'Principles and Guidelines Governing Democrat
h on Web robots and trends in Robot Exclusion Protocol deployment and adherence.
It can be used for computer network protocol analysis and security auditing.
, when the organization was created under the protocol purposes and internal regulations were publis
The HyperText Transfer Protocol (HTTP) and HTTP client - server interactions.
onventions Act 1957 to enable the addition of Protocol I and Protocol II to the Geneva Conventions o
Adding the protocol overhead and blanking time, a standard link r
chief elections officer, chief international protocol officer, and Border Commerce Coordinator for
verages existing Lightweight Directory Access Protocol (LDAP) and X.500 directory technology to crea
r obligations as nuclear weapons states under Protocol I and Protocol II of the Treaty.
FIPA defines markup for interaction protocol diagrams and several standard interaction pro
he position of Vice Chair of the UNFCCC Kyoto Protocol negotiations, and in December 2010 was made C
o indirectly support XMODEM, Ward Christensen protocol, ZMODEM, and other advanced file transfer pro
In 2001 he developed the MANOLITO protocol, Blubster and Piolet - two peer-to-peer file-
Stochastic simulation based on emulated protocol stacks and traffic theory are the main analys
It features support for the BitTorrent protocol, Metalink, and PodCast support, along with bu
United Kingdom have signed but never ratified Protocol 4. Andorra, Greece and Switzerland have neith
, an interface with the internet via Internet Protocol, and any other point of communication involvi
Because of this, Zmax may be used as a mailer protocol without any modifications.
en no longer necessary to run a spanning tree protocol of any kind since there are no logical bridgi
The protocol is applicable to numerous display devices usi
S) services application is Session Initiation Protocol (SIP) application whereby a server receives S
, Zephyr was designed as an instant messaging protocol and application-suite with a heavy Unix backg
ORBA services, application browsers, bridges ( protocol converters), applications accessing huge numb
hipwreck where the "women and children first" protocol was applied.
The Protocol (which applies specifically to aircraft and a
e obtained simultaneously and by a consistent protocol and are therefore comparable across a large n
e Atom Syndication Format and Atom Publishing Protocol, which are standards for creating, editing, a
y into getting House to conform with hospital protocol, and argues that House's division is losing $
was originally intended to be a more complex protocol where ARINC 615A messages would be encapsulat
nstruction is entirely in accordance with the Protocol to Article 69, but that the Improver question
In addition, the Protocol added Article 21 bis, Limitation of Productio
d in the European Convention on Human Rights, Protocol 1, Article 2 and several national constitutio
Under the terms of the Boxer Protocol, Japan as allowed to maintain a military garr
to the refusal of countries to sign the Kyoto protocol, such as the United States and Australia, Ver
Her role as Chief of Protocol began as a volunteer for then-San Francisco m
stant messaging programs that support the MSN protocol (such as aMSN and Pidgin) allow this to be do
Simple Service Discovery Protocol (SSDP) as used in Universal Plug and Play (UP
He signed Amasya Protocol and at the end of the Sivas Congress in 1920,
The Order of Precedence in Sri Lanka the protocol list at which Sri Lankan government officials
While all Politburo members were obliged by protocol to attend a fellow Politburo member's funeral
The Japan-Korea Protocol of August 1905 was made between representativ
of the Kingdom were reiterated in the London Protocol of August 30, 1832 signed by the Great Powers
The Japan-Korea Protocol of August 1904 was made between the Empire of
23 countries have signed but not ratified the protocol: Australia, Austria, Belgium, Burkina Faso, C
The Protocol also authorized the Commission on Narcotic Dr
3, Go X or Go to XX is a satellite dish motor protocol that automatically creates a list of availabl
, Z could choose to not perform the Interlock Protocol with B (opting to instead send his own Mb) bu
offer products using the industry's standard protocol - BACnet.
For the Bandwidth Allocation and Control Protocol, see Bandwidth Allocation Protocol.
s Convention on Certain Conventional Weapons, Protocol IV, banning blinding laser weapons, was passe
mework Convention on Climate Change and Kyoto Protocol were based on erroneous premises, and called
hone-like voice conversations across Internet Protocol (IP) based networks.
t the bridges compute using the Spanning Tree Protocol can be determined using the following rules.
I.e. while the protocol might be open, access to Apple's FaceTime ser
oes not consider the web browser / web server protocol to be important, and prefers to ensure that t
For this reason, the interlock protocol cannot be effectively used to provide authent
The protocol can be used to retrieve vital data from patie
The KQML message format and protocol can be used to interact with an intelligent s
The protocol can be implemented at different levels depend
It will be phased out soon under the Montreal Protocol, to be replaced by other refrigerants with lo
Moreover, the UDP protocol could be seen as increasing the anonymity in
ntarily being added by 1991, years before the protocol signed became compulsory.
By October 2009, the Protocol had been signed by 117 countries, and there w
May 2006 it was revealed that the Second Life protocol had been reverse-engineered.
The Uppsala Protocol has been focused in a similar direction.
A summary of more recent improvements of the protocol has been provided by H. Freeze.
By 2006 the protocol had been signed by 112 states, and ratified b
The NTLMSSP and NTLM challenge-response protocol have been fairly well documented in Microsoft
The Oil Depletion Protocol has been developed by Richard Heinberg to imp
A high frequency direct plant regeneration protocol has been described by Rakesh Yadav et al., 20
The SMLT protocol has been submitted to the IETF for considerat
97, but that the implementation of the Lusaka Protocol was behind schedule.
Application of the Protocol is being supported by a number of measures in
However, despite this protocol potentially being faster than ZMODEM it was s
RoF technology is also protocol and bit-rate transparent, hence, can be emplo
Marlinspike presented attacks on the SSL/TLS protocol at Black Hat USA 2009, which demonstrated way
The Protocol on Blinding Laser Weapons, Protocol IV of the
For the purpose of this protocol "permanent blindness" means irreversible and
In the new version of the protocol, a block would only be retransmitted on timeo
ons in the Kodori Valley and the signing of a protocol by both parties on April 2, 2002.
rgency of the strict observance of the Geneva Protocol, expecting both sides to refrain from the fut
alm in the Kodori Valley and the signing of a protocol by both parties on April 2, 2002.
itor the ceasefire provided for in the Lusaka Protocol, commending both the Government of Angola and
Using the Z39.50 protocol it both accesses remote catalogs and makes it
dministration (FDA) regulations and the study protocol, the BrainGate device was removed from him af
Indeed, as Chief of Protocol, Mailliard brought back the city's Black and
Cryptanalysis of Microsoft's PPTP tunnelling protocol (with Bruce Schneier and "Mudge").
A similar protocol between Bulgaria and the Republic of Macedoni
MA Client Provisioning is a device management protocol specified by the Open Mobile Alliance (OMA) D
an be extended in subsequent revisions of the protocol specification by appending extension addition
The Arthur-Merlin protocol, introduced by Laszlo Babai, is similar in na
em", is a variant of the Xmodem file transfer protocol developed by Peter Boswell optimized for high
The Obby protocol used by the collaborative text editor Gobby
JMODEM is a file transfer protocol developed by Richard Johnson in 1988.
ML (commerce eXtensible Markup Language) is a protocol, created by Ariba, intended for communication
y Chat eXtensions) is an extension to the IRC protocol developed by Microsoft.
ersal communication format is a communication protocol developed by the IEEE for multimedia communic
r to juxtapose multiple shots, according to a protocol designed by the physician.
HS/Link is a file transfer protocol developed by Samuel H. Smith in 1991-1992.
decide" - was drawn up the famous preliminary protocol signed by Austria, Russia and Prussia on Nove
validates the approach to use of the Internet Protocol articulated by Keith Hogie with NASA Goddard
contain any number of entities defined by the protocol, or by extensions to the protocol.
Routed-SMLT (R-SMLT) is a computer networking protocol designed by Nortel (now acquired by Avaya) as
Registered Nurse Practitioner working under a protocol signed by a Physician.
It is the minimum version of the protocol accepted by .NET Messenger Service after Micr
It breaks Web Proxy Autodiscovery Protocol (WPAD) by leading web browsers to believe inc
) or Distributed MLT is a computer networking protocol designed by Avaya used to load balance the ne
NMODEM is a file transfer protocol developed by L.B. Neal in 1990.
CTCP is a common protocol implemented by most major IRC clients in use
urity Support Provider) is a binary messaging protocol used by the Microsoft Security Support Provid
d BASIC and included the Xmodem file transfer protocol added by Jordan.
UDT (acronym for UDP Data Transport) is a protocol developed by the National Center for Data Min
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS