「Protocol」の共起表現一覧(2語右で並び替え)
該当件数 : 949件
The MOS | protocol allows a variety of devices to be controlled |
This | protocol uses a write-back policy. |
Netcare uses a two-factor authentication | protocol involving a username/password combination, an |
Today, files transferred using the BitTorrent | protocol constitute a significant slice of all Interne |
ogy, typically considered to be a 4G wireless | protocol, and a candidate for the replacement of curre |
Canonical | Protocol is a design pattern, applied within the servi |
onmental effects of plans and programmes, the | Protocol places a special emphasis on the consideratio |
"Protokoll einer Folter" ( | Protocol of a Torture) - 10:28 |
Beyond | Protocol is a Massively Multiplayer Online Real-Time S |
veterans in a 20-week double-blind crossover | protocol with a two-week drug washout to allow for ret |
The Damascus | Protocol was a document given to Faisal bin Hussein by |
References that cite the Istanbul | Protocol as a useful tool in the efforts to combat tor |
-based request/response protocols - a signing | protocol and a verifying protocol. |
The Transmission Control | Protocol uses a variant of Go-Back-N ARQ to ensure rel |
In computing, MCCP (Mud Client Compression | Protocol) is a network protocol that is used in text M |
P, originally defined as Simple Object Access | Protocol, is a protocol specification for exchanging s |
The 1999 Multi-effect ("Gothenburg") | Protocol is a multi-pollutant protocol designed to red |
SILC (Secure Internet Live Conferencing | protocol) is a protocol that provides secure synchrono |
is mIRC's file sharing abilities, via the DCC | protocol, featuring a built in file server. |
The | Protocol adds a provision to Article 36 allowing for " |
The Hotline | protocol was a binary protocol which accounted for its |
-service (DoS) attack using the User Datagram | Protocol (UDP), a stateless computer networking protoc |
By 17 February 2006 6 States had ratified the | Protocol and a further 24 had signed the Protocol but |
Reflecting these principles, the | Protocol embodies a major structural revision of the C |
The TMS | protocol fills a gap between the simplistic standard u |
The Fourth | Protocol is a novel written by Frederick Forsyth and p |
Each | protocol has a block of information, called a header, |
hough Arthur never officially granted her the | protocol of a formal position, she proved to be a popu |
ute Terminal Assembler and Recreator (AVATAR) | protocol is a system of escape sequences occasionally |
Dallas | Protocol is a public-private partnership between the C |
According to Canadian | protocol, as a former Prime Minister, she is styled "T |
The MQTT | protocol is a technique for telemetry systems to provi |
ifier, a URI-compatible scheme and resolution | protocol for abstract identifiers used to identify and |
Community Net has offered full Point-to-Point | Protocol Internet access since 1998. |
raries across the world using the NISO z39.50 | protocol for accessing bibliographic databases. |
onsiderable debate concerning what effect the | protocol will actually have. |
Newer versions of the Palringo | protocol have added social features found in most mess |
Newer versions of the uTalk | protocol have added social features found in most mess |
uses Secure Shell (SSH) and supports the SCP | protocol in addition to SFTP. |
The Kyoto | Protocol includes additional requirements for national |
IP TV (Internet | Protocol TV), Addressable System etc. are some of the |
CNNIC allocates Internet | Protocol (IP) addresses and AS Numbers to domestic ISP |
The | Protocol also addresses policies and legislation, thou |
n-profit corporation responsible for Internet | protocol (IP) addressing and the domain name system (D |
The | Protocol also adds a provision to Article 22 stating t |
It uses XMPP | protocol and adheres to GNOME's published human interf |
Final text of this | protocol was adopted by the Council of Europe Committe |
In November 2001 this | protocol was adopted by ICAO as a global standard. |
d only one experienced nurse who examined the | protocol in advance, correctly guessed the experimenta |
streaming, bidirectional, batch file transfer | protocol with advanced Full-Streaming-Error-Correction |
to enact provisions giving effect to the 2003 | Protocol by affirmative Order in Council. |
en they were used in the 1987 film The Fourth | Protocol, and after closure in numerous productions, i |
The | protocol was agreed by SADC leaders in Mauritius on Au |
circumstances of October far behind" and "the | Protocol then agreed must now be considered outmoded". |
e importance of the Acordos de Paz and Lusaka | Protocol peace agreements between the Government of An |
re to implement the Acordos de Paz and Lusaka | Protocol peace agreements, relevant Security Council r |
plementation of the Acordos de Paz and Lusaka | Protocol peace agreements. |
The | Protocol is aimed at the protection of rights of migra |
The ICAO standard for VDL Mode 4 specifies a | protocol enabling aircraft to exchange data with groun |
ll European countries have ratified the Kyoto | Protocol, and all have supported strong reductions in |
le task during this term was to supervise the | protocol for all world leaders who attended the Novemb |
ity and small footprint embedded USB software | protocol stack, allowing device manufactures to easily |
CTCP extends the original IRC | protocol by allowing users to query other clients for |
uTalk uses a proprietary | protocol that allows communication between other users |
Palringo uses a proprietary | protocol that allows communication between other Palri |
This | protocol also allows communication between multiple in |
gram and test result interpreter via a common | protocol which allows Perl programmers to develop so m |
g subscribers to access it through the WebDAV | protocol, which allows emails to be downloaded locally |
Continual improvements in | protocol identification along with a significant incre |
ufficient when an application-level messaging | protocol must also guarantee some level of reliability |
Clinical trials using a CDR | protocol are also reported for clinicians attempting t |
nthesis, including the Jung "non-aldol aldol" | protocol, an alternate method for obtaining aldol prod |
(often implemented using the two-phase-commit | protocol), because although both types of transactions |
In addition, the 1996 | protocol prohibits altogether the practice of incinera |
purpose was to bring experience in procedure, | protocol and amending and introducing legislation. |
The Byzantine agreement | protocol is an essential part of this task. |
The | protocol is an enhancement to the Multi-Link Trunking |
Note the difference between this | protocol, and an earlier (technologically unrelated) p |
The Optional | Protocol establishes an individual complaints mechanis |
nd used the challenge-dechallenge-rechallenge | protocol in an effort to verify the link. |
The Chief of | Protocol is an officer of the United States Department |
The AIS-P | protocol is an alternative to the ADS-B and Mode S bas |
other, shared by Ingolf Pernice, is that that | protocol is an interpretative protocol which will eith |
FTP bounce attack is an exploit of the FTP | protocol whereby an attacker is able to use the PORT c |
itecture (ICA), a Citrix-designed proprietary | protocol for an application server system. |
ey co-authored RFC 977, Network News Transfer | Protocol (NNTP), an Internet standard for transmission |
Southern African Development Community (SADC) | protocol 'Principles and Guidelines Governing Democrat |
h on Web robots and trends in Robot Exclusion | Protocol deployment and adherence. |
It can be used for computer network | protocol analysis and security auditing. |
, when the organization was created under the | protocol purposes and internal regulations were publis |
The HyperText Transfer | Protocol (HTTP) and HTTP client - server interactions. |
onventions Act 1957 to enable the addition of | Protocol I and Protocol II to the Geneva Conventions o |
Adding the | protocol overhead and blanking time, a standard link r |
chief elections officer, chief international | protocol officer, and Border Commerce Coordinator for |
verages existing Lightweight Directory Access | Protocol (LDAP) and X.500 directory technology to crea |
r obligations as nuclear weapons states under | Protocol I and Protocol II of the Treaty. |
FIPA defines markup for interaction | protocol diagrams and several standard interaction pro |
he position of Vice Chair of the UNFCCC Kyoto | Protocol negotiations, and in December 2010 was made C |
o indirectly support XMODEM, Ward Christensen | protocol, ZMODEM, and other advanced file transfer pro |
In 2001 he developed the MANOLITO | protocol, Blubster and Piolet - two peer-to-peer file- |
Stochastic simulation based on emulated | protocol stacks and traffic theory are the main analys |
It features support for the BitTorrent | protocol, Metalink, and PodCast support, along with bu |
United Kingdom have signed but never ratified | Protocol 4. Andorra, Greece and Switzerland have neith |
, an interface with the internet via Internet | Protocol, and any other point of communication involvi |
Because of this, Zmax may be used as a mailer | protocol without any modifications. |
en no longer necessary to run a spanning tree | protocol of any kind since there are no logical bridgi |
The | protocol is applicable to numerous display devices usi |
S) services application is Session Initiation | Protocol (SIP) application whereby a server receives S |
, Zephyr was designed as an instant messaging | protocol and application-suite with a heavy Unix backg |
ORBA services, application browsers, bridges ( | protocol converters), applications accessing huge numb |
hipwreck where the "women and children first" | protocol was applied. |
The | Protocol (which applies specifically to aircraft and a |
e obtained simultaneously and by a consistent | protocol and are therefore comparable across a large n |
e Atom Syndication Format and Atom Publishing | Protocol, which are standards for creating, editing, a |
y into getting House to conform with hospital | protocol, and argues that House's division is losing $ |
was originally intended to be a more complex | protocol where ARINC 615A messages would be encapsulat |
nstruction is entirely in accordance with the | Protocol to Article 69, but that the Improver question |
In addition, the | Protocol added Article 21 bis, Limitation of Productio |
d in the European Convention on Human Rights, | Protocol 1, Article 2 and several national constitutio |
Under the terms of the Boxer | Protocol, Japan as allowed to maintain a military garr |
to the refusal of countries to sign the Kyoto | protocol, such as the United States and Australia, Ver |
Her role as Chief of | Protocol began as a volunteer for then-San Francisco m |
stant messaging programs that support the MSN | protocol (such as aMSN and Pidgin) allow this to be do |
Simple Service Discovery | Protocol (SSDP) as used in Universal Plug and Play (UP |
He signed Amasya | Protocol and at the end of the Sivas Congress in 1920, |
The Order of Precedence in Sri Lanka the | protocol list at which Sri Lankan government officials |
While all Politburo members were obliged by | protocol to attend a fellow Politburo member's funeral |
The Japan-Korea | Protocol of August 1905 was made between representativ |
of the Kingdom were reiterated in the London | Protocol of August 30, 1832 signed by the Great Powers |
The Japan-Korea | Protocol of August 1904 was made between the Empire of |
23 countries have signed but not ratified the | protocol: Australia, Austria, Belgium, Burkina Faso, C |
The | Protocol also authorized the Commission on Narcotic Dr |
3, Go X or Go to XX is a satellite dish motor | protocol that automatically creates a list of availabl |
, Z could choose to not perform the Interlock | Protocol with B (opting to instead send his own Mb) bu |
offer products using the industry's standard | protocol - BACnet. |
For the Bandwidth Allocation and Control | Protocol, see Bandwidth Allocation Protocol. |
s Convention on Certain Conventional Weapons, | Protocol IV, banning blinding laser weapons, was passe |
mework Convention on Climate Change and Kyoto | Protocol were based on erroneous premises, and called |
hone-like voice conversations across Internet | Protocol (IP) based networks. |
t the bridges compute using the Spanning Tree | Protocol can be determined using the following rules. |
I.e. while the | protocol might be open, access to Apple's FaceTime ser |
oes not consider the web browser / web server | protocol to be important, and prefers to ensure that t |
For this reason, the interlock | protocol cannot be effectively used to provide authent |
The | protocol can be used to retrieve vital data from patie |
The KQML message format and | protocol can be used to interact with an intelligent s |
The | protocol can be implemented at different levels depend |
It will be phased out soon under the Montreal | Protocol, to be replaced by other refrigerants with lo |
Moreover, the UDP | protocol could be seen as increasing the anonymity in |
ntarily being added by 1991, years before the | protocol signed became compulsory. |
By October 2009, the | Protocol had been signed by 117 countries, and there w |
May 2006 it was revealed that the Second Life | protocol had been reverse-engineered. |
The Uppsala | Protocol has been focused in a similar direction. |
A summary of more recent improvements of the | protocol has been provided by H. Freeze. |
By 2006 the | protocol had been signed by 112 states, and ratified b |
The NTLMSSP and NTLM challenge-response | protocol have been fairly well documented in Microsoft |
The Oil Depletion | Protocol has been developed by Richard Heinberg to imp |
A high frequency direct plant regeneration | protocol has been described by Rakesh Yadav et al., 20 |
The SMLT | protocol has been submitted to the IETF for considerat |
97, but that the implementation of the Lusaka | Protocol was behind schedule. |
Application of the | Protocol is being supported by a number of measures in |
However, despite this | protocol potentially being faster than ZMODEM it was s |
RoF technology is also | protocol and bit-rate transparent, hence, can be emplo |
Marlinspike presented attacks on the SSL/TLS | protocol at Black Hat USA 2009, which demonstrated way |
The | Protocol on Blinding Laser Weapons, Protocol IV of the |
For the purpose of this | protocol "permanent blindness" means irreversible and |
In the new version of the | protocol, a block would only be retransmitted on timeo |
ons in the Kodori Valley and the signing of a | protocol by both parties on April 2, 2002. |
rgency of the strict observance of the Geneva | Protocol, expecting both sides to refrain from the fut |
alm in the Kodori Valley and the signing of a | protocol by both parties on April 2, 2002. |
itor the ceasefire provided for in the Lusaka | Protocol, commending both the Government of Angola and |
Using the Z39.50 | protocol it both accesses remote catalogs and makes it |
dministration (FDA) regulations and the study | protocol, the BrainGate device was removed from him af |
Indeed, as Chief of | Protocol, Mailliard brought back the city's Black and |
Cryptanalysis of Microsoft's PPTP tunnelling | protocol (with Bruce Schneier and "Mudge"). |
A similar | protocol between Bulgaria and the Republic of Macedoni |
MA Client Provisioning is a device management | protocol specified by the Open Mobile Alliance (OMA) D |
an be extended in subsequent revisions of the | protocol specification by appending extension addition |
The Arthur-Merlin | protocol, introduced by Laszlo Babai, is similar in na |
em", is a variant of the Xmodem file transfer | protocol developed by Peter Boswell optimized for high |
The Obby | protocol used by the collaborative text editor Gobby |
JMODEM is a file transfer | protocol developed by Richard Johnson in 1988. |
ML (commerce eXtensible Markup Language) is a | protocol, created by Ariba, intended for communication |
y Chat eXtensions) is an extension to the IRC | protocol developed by Microsoft. |
ersal communication format is a communication | protocol developed by the IEEE for multimedia communic |
r to juxtapose multiple shots, according to a | protocol designed by the physician. |
HS/Link is a file transfer | protocol developed by Samuel H. Smith in 1991-1992. |
decide" - was drawn up the famous preliminary | protocol signed by Austria, Russia and Prussia on Nove |
validates the approach to use of the Internet | Protocol articulated by Keith Hogie with NASA Goddard |
contain any number of entities defined by the | protocol, or by extensions to the protocol. |
Routed-SMLT (R-SMLT) is a computer networking | protocol designed by Nortel (now acquired by Avaya) as |
Registered Nurse Practitioner working under a | protocol signed by a Physician. |
It is the minimum version of the | protocol accepted by .NET Messenger Service after Micr |
It breaks Web Proxy Autodiscovery | Protocol (WPAD) by leading web browsers to believe inc |
) or Distributed MLT is a computer networking | protocol designed by Avaya used to load balance the ne |
NMODEM is a file transfer | protocol developed by L.B. Neal in 1990. |
CTCP is a common | protocol implemented by most major IRC clients in use |
urity Support Provider) is a binary messaging | protocol used by the Microsoft Security Support Provid |
d BASIC and included the Xmodem file transfer | protocol added by Jordan. |
UDT (acronym for UDP Data Transport) is a | protocol developed by the National Center for Data Min |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |