「Protocol」の共起表現一覧(1語右で並び替え)

Protocol

1 2 3 4 5 次へ>

1語右で並び替え

該当件数:941件

  • communicates using the Microsoft Notification Protocol, a proprietary instant messaging protocol.
  • Nonetheless, for any more natural protocol a proof of security in the random oracle mode
  • As part of the trial protocol, a volunteer must have begun drug treatment i
  • hitects of the Secure Sockets Layer (SSL) 3.0 protocol, a cryptographic protocol for secure communic
  • In the new version of the protocol, a block would only be retransmitted on timeo
  • mber 15, 1994 to boost support for the Lusaka Protocol, a peace agreement signed in August that trie
  • l traces back to 1986 with the signature of a protocol about immediate sharing of information and mu
  • It is the minimum version of the protocol accepted by .NET Messenger Service after Micr
  • In addition, the Protocol added Article 21 bis, Limitation of Productio
  • d BASIC and included the Xmodem file transfer protocol added by Jordan.
  • argued that the convention and Article 47 of Protocol Additional to the Geneva Conventions of 12 Au
  • Furthermore, under Protocol Additional to the Geneva Conventions of 12 Au
  • g, through the use of “proxies,” the Internet Protocol addresses from which their attacks originated
  • The Protocol adds a provision to Article 36 allowing for "
  • ailment itself, and the train operator failed protocol after passing through the switch.
  • The Protocol against the Smuggling of Migrants by Land, Se
  • wo Palermo protocols, the other one being the Protocol against the Smuggling of Migrants by Land, Se
  • s decision-making process during the Montreal Protocol Agreement, which has resulted in a near elimi
  • Erasmus Bilateral Agreements and other protocol agreements were developed.
  • Twitter's OAuth (authentication protocol) allowed instant registration for members who
  • entry for developers than the original Z39.50 protocol, allowing the relatively small market for lib
  • an Internet chat system with an inter-server protocol allowing clients to be distributed across man
  • The MOS protocol allows a variety of devices to be controlled
  • The protocol allows for a consumer to query a datasource o
  • The syntax of the Z39.50 protocol allows for very complex queries.
  • author of the book The Art of the Metaobject Protocol, along with Jim Des Rivieres and Daniel G. Bo
  • The Protocol also adds a provision to Article 22 stating t
  • The Protocol also addresses policies and legislation, thou
  • This protocol also allows communication between multiple in
  • y of colleges and universitiesCreation of the protocol also served as a common ground initiative on
  • The Protocol also authorized the Commission on Narcotic Dr
  • Protocol also toured with New Order, Fisherspooner, Th
  • hat captures the music and religious services protocol among the Gullah community in Beaufort, South
  • Up to version 0.4 of the protocol, an intermediate element between nodes and wa
  • nthesis, including the Jung "non-aldol aldol" protocol, an alternate method for obtaining aldol prod
  • er work formed the basis of the U.N. Montreal Protocol, an international agreement to protect the oz
  • Protocol analysis is considered with respect to an unb
  • It can be used for computer network protocol analysis and security auditing.
  • Assessment of awareness; protocol analysis
  • Snort performs protocol analysis, content searching, and content matc
  • Wireshark & Ethereal Network Protocol Analyzer Toolkit, Syngress Publishing, ISBN 9
  • the Syngress' Wireshark and Ethereal Network Protocol Analyzer Toolkit and Ethereal Packet Sniffing
  • in Java, and contains plugins for I2C and SPI protocol analyzers.
  • give early and favorable consideration to the Protocol and give its advice and consent to ratificati
  • g his arm around Elizabeth II (breaking royal protocol) and having his photo taken.
  • ginal development of RFB (remote framebuffer) protocol and VNC, the desktop sharing technology
  • WASTE is a peer-to-peer and friend-to-friend protocol and software application developed by Justin
  • ver the network using the standard remote X11 protocol and rendered on the client machine.
  • nded Iraq of its obligations under the Geneva Protocol and to unconditionally remove and destroy all
  • ll European countries have ratified the Kyoto Protocol, and all have supported strong reductions in
  • he Angolan government to implement the Lusaka Protocol and other agreements.
  • Note the difference between this protocol, and an earlier (technologically unrelated) p
  • implementation of the Acordos de Paz, Lusaka Protocol and relevant Security Council resolutions was
  • eed for the full implementation of the Lusaka Protocol and other agreements, and supported adjustmen
  • It uses XMPP protocol and adheres to GNOME's published human interf
  • , Zephyr was designed as an instant messaging protocol and application-suite with a heavy Unix backg
  • en they were used in the 1987 film The Fourth Protocol, and after closure in numerous productions, i
  • ws can then be built without knowledge of the protocol and format with which messages are sent to an
  • Nevertheless, Sixtus IV quarrelled over protocol and prerogatives of jurisdiction, was unhappy
  • plementation of the Peace Accords, the Lusaka Protocol and relevant Security Council resolutions, an
  • the people of Saskatchewan, via the Office of Protocol and Honours, to a royal person to mark a visi
  • ing to their website, "none have [cracked the protocol], and plenty have tried."
  • Minister Stephen Harper criticizing the Kyoto Protocol and the scientific basis of anthropogenic glo
  • ccess the on chip debug interface, a specific protocol and tight timing with distinct voltage levels
  • ogy, typically considered to be a 4G wireless protocol, and a candidate for the replacement of curre
  • Intelligent and scalable rule-based routing protocol and matching algorithm
  • tely fulfill its obligations under the Lusaka Protocol and Security Council resolutions, including f
  • eveloped standards such as the Internet Cache Protocol and Summary Object Interchange Format, and sp
  • He signed Amasya Protocol and at the end of the Sivas Congress in 1920,
  • propriate choice of suffix following language protocol), and clause-final conjunctives or sentence e
  • il discussed the implementation of the Lusaka Protocol, and extended the mandate of the United Natio
  • obligations under the Acordos de Paz, Lusaka Protocol and relevant Security Council resolutions.
  • from activities inconsistent with the Lusaka Protocol and to respect UNITA as a political party.
  • obligations under the Acordos de Paz, Lusaka Protocol and relevant Security Council resolutions.
  • between two protocols calls the introductory protocol and the final protocol or eschatocol.
  • -based request/response protocols - a signing protocol and a verifying protocol.
  • implementation of the Accordos de Paz, Lusaka Protocol and relevant Security Council resolutions was
  • uzzer text messaging employs the popular XMPP protocol and its internet telephony employs the Sessio
  • author of the Zimmermann-Sassaman key-signing protocol, and was an organizer of the protests followi
  • scaling as part of its PCL 5 printer control protocol, and Intellifont technology was shipped with
  • , an interface with the internet via Internet Protocol, and any other point of communication involvi
  • s the Senate Chair for the Joint Committee on Protocol and he was the chair of the Frederick County
  • young children, they are largely governed by protocol and cannot enjoy the freedom of the White Hou
  • e obtained simultaneously and by a consistent protocol and are therefore comparable across a large n
  • By 17 February 2006 6 States had ratified the Protocol and a further 24 had signed the Protocol but
  • This was regarded as a serious violation of protocol, and Charlton was temporarily relegated to th
  • ere applicable, START I, including the Lisbon Protocol; and maintain fully effective export controls
  • Marrakech, where the USA boycotted the Kyoto protocol and still ignores the Charter."
  • nd video system, meeting rooms, banquet hall, protocol and VIP lounge, business centre, information
  • he new DoD Sexual Assault Response policy and protocol and submit their plan to the Services in acco
  • il reaffirmed that the Acordos de Paz, Lusaka Protocol and relevant Security Council resolutions for
  • Area established by a Swaziland/South Africa Protocol and will be known as "Lake Jozini Transfronti
  • d using the Mobile IP standard communications protocol and including the IPSec security standards.
  • the Urs ceremony at the same time to maintain protocol and to avoid a situation in which who would p
  • It only works with the OSCAR protocol and if both chat partners use Trillian.
  • support version 3.8 of the Remote Framebuffer Protocol and can handle most known VNC encodings.
  • ssaging, streaming media (Real Time Messaging Protocol) and many developer productivity tools.
  • y into getting House to conform with hospital protocol, and argues that House's division is losing $
  • sten silently for weather alerts via the SAME protocol and then sound an alarm to warn the listener
  • e latest versions also support the BitTorrent protocol and Shoutcast radio stations.
  • is responsible for defining the HL7 standard protocol and is composed of Standing Administrative Co
  • he Internet to orbit, using both the Internet Protocol and Mobile IP.
  • purpose was to bring experience in procedure, protocol and amending and introducing legislation.
  • xample, the TCP is a request-response pattern protocol, and the UDP has a one-way pattern.
  • implementation of the Acordos de Paz, Lusaka Protocol and relevant Security Council resolutions whi
  • isters begin to appear, the CDC is called per protocol and institutes a lockdown.
  • S, SES, MFS and SAAS) is run on the FLEX 1600 protocol, and can be monitored through several website
  • DomainKeys was issued as a "historical" protocol and DKIM was issued as its standards-track re
  • Mizar uses the Chess Engine Communication Protocol and can run under the popular chess interface
  • RoF technology is also protocol and bit-rate transparent, hence, can be emplo
  • elivery and Financing, the Joint Committee on Protocol, and the Joint Committee on Administrative, E
  • Australian Protocol and Procedures, 1982
  • The SPARQL Protocol and RDF Query Language uses a similar N3 subs
  • s of the Euphrates-Tigris river system is the protocol annexed to the 1946 Treaty of Friendship and
  • This breach of protocol antagonized the French command.
  • The treaty's Protocol applies to aircraft which can carry at least
  • Since late 2004 phonecalls through the VoIP protocol are integrated.
  • Clinical trials using a CDR protocol are also reported for clinicians attempting t
  • Parties to the Protocol are further obligated to adopt measures to en
  • ore the country concerned joined the Optional Protocol are not permitted.
  • everal traditions banned or deprecated by the Protocol are common.
  • racters which would not be allowed in the IRC protocol are escaped.
  • st European countries that did not ratify the Protocol are expected to suffer from increasing air po
  • After approval by the director, the Office of Protocol arranges for a new star to be placed on the W
  • validates the approach to use of the Internet Protocol articulated by Keith Hogie with NASA Goddard
  • not need access to the exact rotor cited in a protocol, as long as the K-factor can be calculated.
  • ng development of the BitTorrent peer-to-peer protocol, as well as the ongoing development of µTorre
  • fections are treated with the same medication protocol as the T. canis or T. catis roundworm infecti
  • ting the client-side of the SSH file transfer protocol as implemented by the sftp-server command by
  • References that cite the Istanbul Protocol as a useful tool in the efforts to combat tor
  • political wing of UNITA, violated the Lusaka Protocol as well as UN-imposed sanctions.
  • erating officer of the Office of the Chief of Protocol, as well as Acting Chief of Protocol in the a
  • The interlock protocol, as described by Ron Rivest and Adi Shamir, w
  • on Sector (ITU-T) adopted the Common Alerting Protocol as Recommendation X.1303.
  • A protocol as defined in computer science uses a more fo
  • Bush dismissed Kyoto Protocol as too costly, describing it as "an unrealist
  • According to Canadian protocol, as a former Prime Minister, she is styled "T
  • The protocol aspects of this should be coordinated closely
  • This protocol assumes that it is run over a secure channel,
  • Marlinspike presented attacks on the SSL/TLS protocol at Black Hat USA 2009, which demonstrated way
  • In March 1999: He became Chief of Royal Protocol at the Royal Court.
  • Section 2 of Article 6 allows a Party to the Protocol at their discretion only to prosecute if the
  • supports the HSDPA ("3.5G") mobile telephony protocol at 7.2Mbps.
  • It originally used the Server Message Block protocol atop either the NetBIOS Frames protocol (NBF)
  • 23 countries have signed but not ratified the protocol: Australia, Austria, Belgium, Burkina Faso, C
  • e of the flexibility of the instant messaging protocol, based on XML, and a number of extensions dev
  • HTTP(P2P) is a protocol based on HTTP.
  • fone, Zfone and ZRTP, a newer and secure VoIP protocol based on modern VoIP standards.
  • rticipants was high” and recommended that the protocol be tested in controlled, double-blind trials.
  • anned since 1 January 1996 under the Montreal Protocol because of its ozone-depleting potential.
  • (often implemented using the two-phase-commit protocol), because although both types of transactions
  • Initial design of Beyond Protocol began in 1991.
  • Her role as Chief of Protocol began as a volunteer for then-San Francisco m
  • Work on the Z39.50 protocol began in the 1970s, and led to successive ver
  • for each Traveline region with the JourneyWeb protocol being used to manage journeys between Traveli
  • have detailed understanding of the format or protocol being tested.
  • R, in 1989 the USSR condemned the 1939 secret protocol between Nazi Germany and itself that had led
  • Following the LR reaction protocol between the entry and the destination vectors
  • nt, where he served as provincial director of protocol between 1979 and 1984 and as an assistant dep
  • It is, however, possible to execute SKE protocol between two users and use the generated key t
  • A similar protocol between Bulgaria and the Republic of Macedoni
  • el plus a set of generic services and several protocol bindings for these services, including SOAP a
  • to: Antarctic Treaty, Antarctic-Environmental Protocol, Biodiversity, Climate Change, Desertificatio
  • In 2001 he developed the MANOLITO protocol, Blubster and Piolet - two peer-to-peer file-
  • In the North Berwick Protocol Books (NAS-B56/1/1) Robert Lauder younger of
  • synchronous File Transfer (SAFT), an Internet protocol bound to TCP port 487
  • to 1928, he served as Director General of the Protocol Branch.
  • oth the royals and the mayor deny any serious protocol breach.
  • The Protocol bringing under International Control Drugs Ou
  • uses Twisted for its low-level networking and Protocol Buffers for protocol description.
  • Protocol buffers - "Google's lingua franca for data",
  • Google's protocol buffers use a similar format to have compact
  • messages demonstrate how composition works in Protocol Buffers (they both use Point).
  • ized objects and objects created using Google Protocol Buffers;
  • DG Scripts, Oasis OLC, Mud Client Compression Protocol, bug fixes, and more.
  • purchased the property, formerly known as The Protocol Building, in August 2008.
  • IETF by publishing 4 Internet Drafts of their protocol, but the standard was never ratified.
  • at Japan might achieve the goals of the Kyoto Protocol, but her idea has not been realized yet.
  • ut under the current schedule of the Montreal Protocol, but can continue to be used in new HVAC equi
  • Many dosbots use the IRC protocol, but some use their own custom protocols.
  • StreamCast, that originally used the Opennap protocol, but later supported many different peer-to-p
  • I'm not sure of the exact protocol, but they would have needed joint UK/US autho
  • t Kit from Millipore is based on the standard protocol, but enables processing of a large number of
  • erpreting this as a personal attack, disobeys protocol by taking a shuttle craft without Kathryn Jan
  • ons in the Kodori Valley and the signing of a protocol by both parties on April 2, 2002.
  • After violating protocol by meeting with her parents, she was transfer
  • d a native look, and support for the Kerberos protocol by modified servers.
  • 1. Adoption of the Hiroshima-Nagasaki Protocol by the 2010 NPT Review Conference
  • ng the Hungarians could explain the Byzantine protocol by which, in the exchange of ambassadors unde
  • q further specified the nature of the earlier protocol by forming a joint committee on technical iss
  • ents honor commitments set forth by the Kyoto Protocol, by conducting in unison peaceful demonstrati
  • to Interior Director and Head of palaces and protocol by decree of July 29, 1935 (Tunisia) .
  • to enact provisions giving effect to the 2003 Protocol by affirmative Order in Council.
  • Austria declared Denmark in violation of the Protocol, by the November Constitution, which Christia
  • alm in the Kodori Valley and the signing of a protocol by both parties on April 2, 2002.
  • CTCP extends the original IRC protocol by allowing users to query other clients for
  • the DS among themselves communicate through a protocol called the Database Support Protocol.
  • company has evolved from using a proprietary protocol called TSMP (Time Synchronized Mesh Protocol)
  • ing platform has its own native communication protocol called Sola Access Information Language (SAIL
  • The AR and the AS communicate through a protocol called the Application Support Protocol which
1 2 3 4 5 次へ>