「PROTOCOL」の共起表現一覧(1語右で並び替え)
該当件数 : 941件
| communicates using the Microsoft Notification | Protocol, a proprietary instant messaging protocol. |
| Nonetheless, for any more natural | protocol a proof of security in the random oracle mode |
| As part of the trial | protocol, a volunteer must have begun drug treatment i |
| hitects of the Secure Sockets Layer (SSL) 3.0 | protocol, a cryptographic protocol for secure communic |
| In the new version of the | protocol, a block would only be retransmitted on timeo |
| mber 15, 1994 to boost support for the Lusaka | Protocol, a peace agreement signed in August that trie |
| l traces back to 1986 with the signature of a | protocol about immediate sharing of information and mu |
| It is the minimum version of the | protocol accepted by .NET Messenger Service after Micr |
| In addition, the | Protocol added Article 21 bis, Limitation of Productio |
| d BASIC and included the Xmodem file transfer | protocol added by Jordan. |
| argued that the convention and Article 47 of | Protocol Additional to the Geneva Conventions of 12 Au |
| Furthermore, under | Protocol Additional to the Geneva Conventions of 12 Au |
| g, through the use of “proxies,” the Internet | Protocol addresses from which their attacks originated |
| The | Protocol adds a provision to Article 36 allowing for " |
| ailment itself, and the train operator failed | protocol after passing through the switch. |
| The | Protocol against the Smuggling of Migrants by Land, Se |
| wo Palermo protocols, the other one being the | Protocol against the Smuggling of Migrants by Land, Se |
| s decision-making process during the Montreal | Protocol Agreement, which has resulted in a near elimi |
| Erasmus Bilateral Agreements and other | protocol agreements were developed. |
| Twitter's OAuth (authentication | protocol) allowed instant registration for members who |
| entry for developers than the original Z39.50 | protocol, allowing the relatively small market for lib |
| an Internet chat system with an inter-server | protocol allowing clients to be distributed across man |
| The MOS | protocol allows a variety of devices to be controlled |
| The | protocol allows for a consumer to query a datasource o |
| The syntax of the Z39.50 | protocol allows for very complex queries. |
| author of the book The Art of the Metaobject | Protocol, along with Jim Des Rivieres and Daniel G. Bo |
| The | Protocol also adds a provision to Article 22 stating t |
| The | Protocol also addresses policies and legislation, thou |
| This | protocol also allows communication between multiple in |
| y of colleges and universitiesCreation of the | protocol also served as a common ground initiative on |
| The | Protocol also authorized the Commission on Narcotic Dr |
| Protocol also toured with New Order, Fisherspooner, Th | |
| hat captures the music and religious services | protocol among the Gullah community in Beaufort, South |
| Up to version 0.4 of the | protocol, an intermediate element between nodes and wa |
| nthesis, including the Jung "non-aldol aldol" | protocol, an alternate method for obtaining aldol prod |
| er work formed the basis of the U.N. Montreal | Protocol, an international agreement to protect the oz |
| Protocol analysis is considered with respect to an unb | |
| It can be used for computer network | protocol analysis and security auditing. |
| Assessment of awareness; | protocol analysis |
| Snort performs | protocol analysis, content searching, and content matc |
| Wireshark & Ethereal Network | Protocol Analyzer Toolkit, Syngress Publishing, ISBN 9 |
| the Syngress' Wireshark and Ethereal Network | Protocol Analyzer Toolkit and Ethereal Packet Sniffing |
| in Java, and contains plugins for I2C and SPI | protocol analyzers. |
| give early and favorable consideration to the | Protocol and give its advice and consent to ratificati |
| g his arm around Elizabeth II (breaking royal | protocol) and having his photo taken. |
| ginal development of RFB (remote framebuffer) | protocol and VNC, the desktop sharing technology |
| WASTE is a peer-to-peer and friend-to-friend | protocol and software application developed by Justin |
| ver the network using the standard remote X11 | protocol and rendered on the client machine. |
| nded Iraq of its obligations under the Geneva | Protocol and to unconditionally remove and destroy all |
| ll European countries have ratified the Kyoto | Protocol, and all have supported strong reductions in |
| he Angolan government to implement the Lusaka | Protocol and other agreements. |
| Note the difference between this | protocol, and an earlier (technologically unrelated) p |
| implementation of the Acordos de Paz, Lusaka | Protocol and relevant Security Council resolutions was |
| eed for the full implementation of the Lusaka | Protocol and other agreements, and supported adjustmen |
| It uses XMPP | protocol and adheres to GNOME's published human interf |
| , Zephyr was designed as an instant messaging | protocol and application-suite with a heavy Unix backg |
| en they were used in the 1987 film The Fourth | Protocol, and after closure in numerous productions, i |
| ws can then be built without knowledge of the | protocol and format with which messages are sent to an |
| Nevertheless, Sixtus IV quarrelled over | protocol and prerogatives of jurisdiction, was unhappy |
| plementation of the Peace Accords, the Lusaka | Protocol and relevant Security Council resolutions, an |
| the people of Saskatchewan, via the Office of | Protocol and Honours, to a royal person to mark a visi |
| ing to their website, "none have [cracked the | protocol], and plenty have tried." |
| Minister Stephen Harper criticizing the Kyoto | Protocol and the scientific basis of anthropogenic glo |
| ccess the on chip debug interface, a specific | protocol and tight timing with distinct voltage levels |
| ogy, typically considered to be a 4G wireless | protocol, and a candidate for the replacement of curre |
| Intelligent and scalable rule-based routing | protocol and matching algorithm |
| tely fulfill its obligations under the Lusaka | Protocol and Security Council resolutions, including f |
| eveloped standards such as the Internet Cache | Protocol and Summary Object Interchange Format, and sp |
| He signed Amasya | Protocol and at the end of the Sivas Congress in 1920, |
| propriate choice of suffix following language | protocol), and clause-final conjunctives or sentence e |
| il discussed the implementation of the Lusaka | Protocol, and extended the mandate of the United Natio |
| obligations under the Acordos de Paz, Lusaka | Protocol and relevant Security Council resolutions. |
| from activities inconsistent with the Lusaka | Protocol and to respect UNITA as a political party. |
| obligations under the Acordos de Paz, Lusaka | Protocol and relevant Security Council resolutions. |
| between two protocols calls the introductory | protocol and the final protocol or eschatocol. |
| -based request/response protocols - a signing | protocol and a verifying protocol. |
| implementation of the Accordos de Paz, Lusaka | Protocol and relevant Security Council resolutions was |
| uzzer text messaging employs the popular XMPP | protocol and its internet telephony employs the Sessio |
| author of the Zimmermann-Sassaman key-signing | protocol, and was an organizer of the protests followi |
| scaling as part of its PCL 5 printer control | protocol, and Intellifont technology was shipped with |
| , an interface with the internet via Internet | Protocol, and any other point of communication involvi |
| s the Senate Chair for the Joint Committee on | Protocol and he was the chair of the Frederick County |
| young children, they are largely governed by | protocol and cannot enjoy the freedom of the White Hou |
| e obtained simultaneously and by a consistent | protocol and are therefore comparable across a large n |
| By 17 February 2006 6 States had ratified the | Protocol and a further 24 had signed the Protocol but |
| This was regarded as a serious violation of | protocol, and Charlton was temporarily relegated to th |
| ere applicable, START I, including the Lisbon | Protocol; and maintain fully effective export controls |
| Marrakech, where the USA boycotted the Kyoto | protocol and still ignores the Charter." |
| nd video system, meeting rooms, banquet hall, | protocol and VIP lounge, business centre, information |
| he new DoD Sexual Assault Response policy and | protocol and submit their plan to the Services in acco |
| il reaffirmed that the Acordos de Paz, Lusaka | Protocol and relevant Security Council resolutions for |
| Area established by a Swaziland/South Africa | Protocol and will be known as "Lake Jozini Transfronti |
| d using the Mobile IP standard communications | protocol and including the IPSec security standards. |
| the Urs ceremony at the same time to maintain | protocol and to avoid a situation in which who would p |
| It only works with the OSCAR | protocol and if both chat partners use Trillian. |
| support version 3.8 of the Remote Framebuffer | Protocol and can handle most known VNC encodings. |
| ssaging, streaming media (Real Time Messaging | Protocol) and many developer productivity tools. |
| y into getting House to conform with hospital | protocol, and argues that House's division is losing $ |
| sten silently for weather alerts via the SAME | protocol and then sound an alarm to warn the listener |
| e latest versions also support the BitTorrent | protocol and Shoutcast radio stations. |
| is responsible for defining the HL7 standard | protocol and is composed of Standing Administrative Co |
| he Internet to orbit, using both the Internet | Protocol and Mobile IP. |
| purpose was to bring experience in procedure, | protocol and amending and introducing legislation. |
| xample, the TCP is a request-response pattern | protocol, and the UDP has a one-way pattern. |
| implementation of the Acordos de Paz, Lusaka | Protocol and relevant Security Council resolutions whi |
| isters begin to appear, the CDC is called per | protocol and institutes a lockdown. |
| S, SES, MFS and SAAS) is run on the FLEX 1600 | protocol, and can be monitored through several website |
| DomainKeys was issued as a "historical" | protocol and DKIM was issued as its standards-track re |
| Mizar uses the Chess Engine Communication | Protocol and can run under the popular chess interface |
| RoF technology is also | protocol and bit-rate transparent, hence, can be emplo |
| elivery and Financing, the Joint Committee on | Protocol, and the Joint Committee on Administrative, E |
| Australian | Protocol and Procedures, 1982 |
| The SPARQL | Protocol and RDF Query Language uses a similar N3 subs |
| s of the Euphrates-Tigris river system is the | protocol annexed to the 1946 Treaty of Friendship and |
| This breach of | protocol antagonized the French command. |
| The treaty's | Protocol applies to aircraft which can carry at least |
| Since late 2004 phonecalls through the VoIP | protocol are integrated. |
| Clinical trials using a CDR | protocol are also reported for clinicians attempting t |
| Parties to the | Protocol are further obligated to adopt measures to en |
| ore the country concerned joined the Optional | Protocol are not permitted. |
| everal traditions banned or deprecated by the | Protocol are common. |
| racters which would not be allowed in the IRC | protocol are escaped. |
| st European countries that did not ratify the | Protocol are expected to suffer from increasing air po |
| After approval by the director, the Office of | Protocol arranges for a new star to be placed on the W |
| validates the approach to use of the Internet | Protocol articulated by Keith Hogie with NASA Goddard |
| not need access to the exact rotor cited in a | protocol, as long as the K-factor can be calculated. |
| ng development of the BitTorrent peer-to-peer | protocol, as well as the ongoing development of µTorre |
| fections are treated with the same medication | protocol as the T. canis or T. catis roundworm infecti |
| ting the client-side of the SSH file transfer | protocol as implemented by the sftp-server command by |
| References that cite the Istanbul | Protocol as a useful tool in the efforts to combat tor |
| political wing of UNITA, violated the Lusaka | Protocol as well as UN-imposed sanctions. |
| erating officer of the Office of the Chief of | Protocol, as well as Acting Chief of Protocol in the a |
| The interlock | protocol, as described by Ron Rivest and Adi Shamir, w |
| on Sector (ITU-T) adopted the Common Alerting | Protocol as Recommendation X.1303. |
| A | protocol as defined in computer science uses a more fo |
| Bush dismissed Kyoto | Protocol as too costly, describing it as "an unrealist |
| According to Canadian | protocol, as a former Prime Minister, she is styled "T |
| The | protocol aspects of this should be coordinated closely |
| This | protocol assumes that it is run over a secure channel, |
| Marlinspike presented attacks on the SSL/TLS | protocol at Black Hat USA 2009, which demonstrated way |
| In March 1999: He became Chief of Royal | Protocol at the Royal Court. |
| Section 2 of Article 6 allows a Party to the | Protocol at their discretion only to prosecute if the |
| supports the HSDPA ("3.5G") mobile telephony | protocol at 7.2Mbps. |
| It originally used the Server Message Block | protocol atop either the NetBIOS Frames protocol (NBF) |
| 23 countries have signed but not ratified the | protocol: Australia, Austria, Belgium, Burkina Faso, C |
| e of the flexibility of the instant messaging | protocol, based on XML, and a number of extensions dev |
| HTTP(P2P) is a | protocol based on HTTP. |
| fone, Zfone and ZRTP, a newer and secure VoIP | protocol based on modern VoIP standards. |
| rticipants was high” and recommended that the | protocol be tested in controlled, double-blind trials. |
| anned since 1 January 1996 under the Montreal | Protocol because of its ozone-depleting potential. |
| (often implemented using the two-phase-commit | protocol), because although both types of transactions |
| Initial design of Beyond | Protocol began in 1991. |
| Her role as Chief of | Protocol began as a volunteer for then-San Francisco m |
| Work on the Z39.50 | protocol began in the 1970s, and led to successive ver |
| for each Traveline region with the JourneyWeb | protocol being used to manage journeys between Traveli |
| have detailed understanding of the format or | protocol being tested. |
| R, in 1989 the USSR condemned the 1939 secret | protocol between Nazi Germany and itself that had led |
| Following the LR reaction | protocol between the entry and the destination vectors |
| nt, where he served as provincial director of | protocol between 1979 and 1984 and as an assistant dep |
| It is, however, possible to execute SKE | protocol between two users and use the generated key t |
| A similar | protocol between Bulgaria and the Republic of Macedoni |
| el plus a set of generic services and several | protocol bindings for these services, including SOAP a |
| to: Antarctic Treaty, Antarctic-Environmental | Protocol, Biodiversity, Climate Change, Desertificatio |
| In 2001 he developed the MANOLITO | protocol, Blubster and Piolet - two peer-to-peer file- |
| In the North Berwick | Protocol Books (NAS-B56/1/1) Robert Lauder younger of |
| synchronous File Transfer (SAFT), an Internet | protocol bound to TCP port 487 |
| to 1928, he served as Director General of the | Protocol Branch. |
| oth the royals and the mayor deny any serious | protocol breach. |
| The | Protocol bringing under International Control Drugs Ou |
| uses Twisted for its low-level networking and | Protocol Buffers for protocol description. |
| Protocol buffers - "Google's lingua franca for data", | |
| Google's | protocol buffers use a similar format to have compact |
| messages demonstrate how composition works in | Protocol Buffers (they both use Point). |
| ized objects and objects created using Google | Protocol Buffers; |
| DG Scripts, Oasis OLC, Mud Client Compression | Protocol, bug fixes, and more. |
| purchased the property, formerly known as The | Protocol Building, in August 2008. |
| IETF by publishing 4 Internet Drafts of their | protocol, but the standard was never ratified. |
| at Japan might achieve the goals of the Kyoto | Protocol, but her idea has not been realized yet. |
| ut under the current schedule of the Montreal | Protocol, but can continue to be used in new HVAC equi |
| Many dosbots use the IRC | protocol, but some use their own custom protocols. |
| StreamCast, that originally used the Opennap | protocol, but later supported many different peer-to-p |
| I'm not sure of the exact | protocol, but they would have needed joint UK/US autho |
| t Kit from Millipore is based on the standard | protocol, but enables processing of a large number of |
| erpreting this as a personal attack, disobeys | protocol by taking a shuttle craft without Kathryn Jan |
| ons in the Kodori Valley and the signing of a | protocol by both parties on April 2, 2002. |
| After violating | protocol by meeting with her parents, she was transfer |
| d a native look, and support for the Kerberos | protocol by modified servers. |
| 1. Adoption of the Hiroshima-Nagasaki | Protocol by the 2010 NPT Review Conference |
| ng the Hungarians could explain the Byzantine | protocol by which, in the exchange of ambassadors unde |
| q further specified the nature of the earlier | protocol by forming a joint committee on technical iss |
| ents honor commitments set forth by the Kyoto | Protocol, by conducting in unison peaceful demonstrati |
| to Interior Director and Head of palaces and | protocol by decree of July 29, 1935 (Tunisia) . |
| to enact provisions giving effect to the 2003 | Protocol by affirmative Order in Council. |
| Austria declared Denmark in violation of the | Protocol, by the November Constitution, which Christia |
| alm in the Kodori Valley and the signing of a | protocol by both parties on April 2, 2002. |
| CTCP extends the original IRC | protocol by allowing users to query other clients for |
| the DS among themselves communicate through a | protocol called the Database Support Protocol. |
| company has evolved from using a proprietary | protocol called TSMP (Time Synchronized Mesh Protocol) |
| ing platform has its own native communication | protocol called Sola Access Information Language (SAIL |
| The AR and the AS communicate through a | protocol called the Application Support Protocol which |
こんにちは ゲスト さん
|
ログイン |
Weblio会員(無料)になると
|
こんにちは ゲスト さん
|
ログイン |
Weblio会員(無料)になると
|