单词 | Protocol |
例句 | 1. We must observe the correct protocol. 2. The organizer was familiar with the protocol of royal visits. 3. The Ukranians put their signatures to the Lisbon Protocol. 4. The delegates have to be seated according to protocol. 5. The statesmen signed a protocol. 6. It is set out in a legally binding protocol which forms part of the treaty. 7. The Geneva Protocol of 1925 prohibits the use of poisonous gases in war. 8. It was an egregious breach of protocol. 9. The moves are in compliance with the Montreal Protocol. 10. So they argue about protocol and diplomatic good manners instead. 11. The protocol was accepted by proponents of provocation testing, and clinicians who used this method participated in the study. 12. Dana fights his way through the protocol surrounding the medicine chest, has a recipe drawn up, and delivers his balm. 13. The protocol aimed to cut emissions of greenhouse gases to a few percentage points beneath levels a decade ago. 14. The new network management protocol will now become a Request for Comment. 15. SunLink Point-to-Point Protocol is designed to let small companies do away with dedicated routers when linking their local area networks. 16. Protocol 2 studied the phenomenon of adaptive cytoprotection in response to mild irritation of the duodenal mucosa in the three experimental groups. 17. To make it legally binding the protocol requires ratification by countries with at least 55 % of the developed world's emissions. 18. The Toronto Protocol is entitled: Public Transport -- a major contributor to liveable communities and sustainable development. 19. The protocol at Ingard House was far more elaborate than at the head office of the bank. 20. If a Protocol party acts in material breach of the Protocol, who has the right of termination or suspension? 21. This protocol tested mucosal resistance to acid after mild irritation. 22. It is set out in a legally binding protocol which forms an integral part of the treaty. 23. He has become something of a stickler for the finer observances of royal protocol. 24. Having suffered grievously from biological weapons attacks in the past, China supports work that helps comprehensively to strengthen the effectiveness of the convention. It has actively participated in the work of drawing up a Protocol of the Ad Hoc Group of States Parties to the BWC established in 1994, and has made contributions to the progress of the negotiations on the Protocol. 25. A list of 33 hydrochlorofluorocarbons was annexed to the protocol at the London meeting. 26. Burying it all under a thick shell of bluster, bullying, slavish adherence to protocol and discipline. 27. Big business joined together to form a climate change coalition to lobby successfully against the protocol. 28. Data from the 159 patients adhering fully to the protocol gave similar conclusions. 29. Her rank, though high,[http://] did not meet the level protocol demanded of future empress. 30. George Bush's three-year-old grandchild, Marshal, has been enrolled in an etiquette class, Petite Protocol. 1. We must observe the correct protocol. 2. The statesmen signed a protocol. 31. There is a standard protocol, to ensure consistency between doctors and hospitals. 32. It also discussed the possibility of a World Bank grant to help industry to adapt to the demands of the protocol. 33. Many issues, however, were not well defined in the Protocol, or were deliberately left ambiguous. 34. William Evans designed pharmacological studies and was a principal investigator on the primary leukaemia protocol. 35. This requirement to keep nuclear weapons out of the southern part of the western hemisphere is reinforced by Protocol 11 of the treaty. 36. Ever a stickler for protocol, he and his wife took umbrage at the democratic etiquette of President Thomas Jefferson's administration. 37. We have modified the recently completed St Jude protocol to withhold systemic antimetabolites during radiotherapy. 38. The other Protocol parties might not be so concerned about the breach and not take any steps in response. 39. Marc's protocol was observed to the letter after Jimmy's rashness. 40. This protocol is deemed insufficient for dealing with the needs of commerce, where strong authentication and message integrity are necessary. 41. They signed a protocol on interim measures to establish peacekeeping forces and military observers. 42. The Prime Minister I can confirm the hon. Gentleman's remarks about the protocol. 43. Laboratory protocol should include procedures that assure that the correct specimen is collected and that the specimen is correctly labeled. 44. Thus, secondary alterations in sodium transport were also corrected to wild-type levels by the transfection protocol used. 45. They allow browser programmers to ignore the complex networking code necessary to support every firewall protocol and concentrate on important client issues. 46. Brown tapped veteran social maven Charlotte Mailliard Swig to her former post as protocol chief. 47. Informed consent was obtained from each person and the protocol was approved by the ethics committee of Leiden University Hospital. 48. A subsidiary analysis evaluated those patients adhering fully to the protocol. 49. One analysis is that a party to the Protocol has agreed to accept some treaty obligations. 50. These are briefly outlined in the protocol under each drug mentioned. 51. Complex protocol demanded that Court dress conform to a set of governing principles. 52. Protocol 3 studied the effects of indomethacin pretreatment on adaptive cytoprotection in the three experimental groups. 53. That would make a mockery of the Kyoto protocol: instead of cuts, it could lead to huge increases of emissions. 54. If breeding is part of the experimental protocol then the premises must be designated for both breeding and scientific procedures. 55. The protocol incorporates yet another type of error correction and aspects of handling files. 56. Data from patients adhering fully to the protocol were also analysed, and where results differ, these are also presented. 57. This protocol differed from previous protocols, in that more intensive systemic antimetabolite therapy was given before and during radiotherapy. 58. The rhythm is responding to an external influence that has not been controlled in the experimental protocol. 59. This has allowed the protocol definition to evolve in a controlled way by the incorporation of tested ideas. 60. However,[] the Protocol system does not encourage additional enquiries on detailed and pernickety points. 61. The host protocol lets the terminal server communicate with the computer systems on the network. 62. Transmission Control Protocol/Internet Protocol on the host is a prerequisite. 63. But protocol called for the opening push, like soup before the main course. 64. The escorts handle all logistic details and also dispense advice on matters of protocol and decorum. 65. His reaction was that this was a diminution of the occasion in protocol terms. 66. Their purpose is to encourage countries to ratify the Kyoto protocol on reducing carbon emissions. 67. ZigBee Alliance to integrate Internet protocol standards. 68. HTTP is a kind of stateless protocol. 69. Any differences ? compared with the Protocol Obfuscation version? 70. Method: Treadmill exercise test was used by Bruce protocol. 71. The PPP link control protocol terminated. 72. This paper describes Oakley key determination protocol. 73. Another facet of your system's vulnerability would relate to the communications protocol being used and what security mechanisms it supports. 74. Introduce network time protocol ( NTP ) and four representational time synchronization protocol for wireless sensor networks. 75. Embedded access network interface protocol development based on Real Time Operation System is a promising area and has far-reaching theory research and practical application value. 76. The communication program used for communication between pocket computer and instrument with HART protocol and its programming are introduced. 77. Semaphore and priority inheritance protocol ( PIP ) priority ceiling protocol ( PCP ) is supported. 78. The gateway generally performs protocol conversion between the Internet backbone and the network, data translation or conversion, and message handling. 79. The long - range communication between the upper device and Data receiving system goes through RS - 485 protocol. 80. The article has done detailed research to Neuron chip, LonTalk communication protocol, network variables etc. 81. By mathematical induction, we have proved that this protocol semantically satisfies the sequential consistency. 82. An example of semiautomatic protocol implementation based on Estelle is given. 83. EAP is a general protocol for PPP authentication which supports multiple authentication mechanisms. 84. Except for binary attachments, the message must be carried by SOAP (a simple XML-based protocol specification that defines a uniform way of passing information between applications). 85. Montreal Protocol and Tokyo Protocol have great effects on the ongoing refrigerant substitution process. 86. By analyzing DICOM protocol architecture model and its working mechanism, we design a DICOM network communication model. 87. Ubuntu has MAPI Exchange protocol compatibility, so the server infrastructure would not need to be modified during any migration. 88. The networks which emerged from this research became the basis for what we know as the Internet,[ ] and the protocols developed during this time became known as the TCP/IP Protocol Suite. 89. Zone Routing Protocol in MANET consists of IntrAzone and IntErzone routing. 90. The Kyoto Protocol established a trading system for intangible goods flowing worldwide which are typified by carbon credit. 91. CAN(Controller Area Network), one of the most famous field-bus protocol standard, was used widely in measurement and control network in industry field. 92. FTP client program, FTP protocol beginner can refer to the next friend. 93. This paper discusses formal description style of communication protocol for computer networks. 94. The web browser is notified as to which protocol to use. 95. A decision tree classifier was applied and a scalar product protocol was added, so that the need of privacy preserving is satisfied as well as the advantage of decision tree is retained. 96. MPI is a language-independent communications protocol used to program parallel computers . Many Java versions of the MPI standard have been developed. 97. Currently, the research on routing protocol of satellite network is still in an early stage. 98. An adjacent system reachable by traversal of a single subnetwork by a Protocol Data Unit ( PDU ). 99. This paper introduces a novel lightweight protocol for field sensor networks suit to Industrial ap - plication. 100. A new model of security protocol, layer-based security protocol model is presented. With this model, an efficient security protocol generation system and also an authentication system are designed. 101. Introduces the protocol of data link based on HDLC and the realization by using VB language. The protocol is used to realize the credible communication between singlechip and PC. 102. The design of architecture of firmware, GUI, data structure, communication protocol, and program of the instrument of line patrol are presented in the thesis. 103. Recall that the Internet Protocol (IP) is the core network layer protocol that sits below the transport protocol (most commonly the Transmission Control Protocol, or TCP). 104. The paper studies the English auction secure protocol. An efficient and secure English auction protocol is proposed with signature based on proof of knowledge. 105. Considering about the different versions of UMB protocol, the performance of the first edition is the worst. 106. To transmit data accurately in strong interference environments, a communication protocol based on Manchester code was designed. 107. The paper argues about SET protocol and CORBA security service. 108. Based on Protocol 4.1, a high-performance Protocol 5.1 is put forwarded, with the name Oblivious Transfer Based Scalar Product Protocol. 109. The test results show that the proposed higher layer protocol can guarantee a high reliable communication. 110. In the paper, a network topology model and an arithmetic based on it are presented, which are applied in OSPF protocol testing. 111. The Trivial File Transfer Protocol (or TFTP) can then be used to transfer the kernel image and the initial ramdisk image to the local device. 112. According to the standard of 3 GPP, WLAN users authenticate and distribute keys through EAP - AKA protocol. 113. AS2 is a transport protocol specification for the Internet, and is typically used to send Electronic Data Interchange (EDI) messages. 114. TTCN-3 test system specifies the standard implementation interface of Codec, leaving the implementation of codec to developing engineers of protocol testing tools. 115. The distance limitation and delay problems encountered in local area networks are eliminated by the use of broadband technology and a hybrid token-CSMA/CD protocol. 116. So establishing communication between systems employing different protocols. A media converter is a example of a sophisticated form of protocol converter. 117. The communication protocol between the master computer and the slave computer has been designed to transmit the data synchronously and modify the errors automatically. 118. The preliminary result shows,[sentencedict .com] that the two-phase locking protocol can do well for supporting the transaction concurrency in XSQS. 119. We designed and implemented a simplified link-level protocol with elastic buffered flow-control and buffered wormhole routing switching, it can support to transmit variable-length packet. 120. Then, based on the RSA digital signature algorithm, we design an undeniable RSA encryption protocol with small public key for both sides. 121. Radio Link Protocol . A protocol used over the air interface. 122. Finally, the analysis results show that the new protocol is provably secure under DDH assumption and has a much better performance than the current solution. 123. Scalar Product Protocol is the keystone in building privacy-preserving decision tree. 124. According to the USB1.1 protocol, this paper analyzes the function of SIE module in USB device controller. 125. The paper describes the analytical models of all kinds of transmission control protocol ( TCP ) congestion controls. 126. This method and performing protocol is outstanding with less damage to the patients, higher success rate and distinct image compared with other vesiculography methods. 127. PPP , the Point - to - Point Protocol, corrects all the deficiencies in SLIP. PPP consists of three components. 128. Therefore it is a hot topic that researches the network protocol stack based on OS. 129. TDMA - based MAC protocol is inherently collision free but it has poor scalability. 130. The operations of the two roles are discussed. Additionally, the relationship between IGP and EGP Graceful Restart and the advantage as well as disadvantage of protocol Graceful Restart are analyzed. 131. The system composition, line warning device, main warning device and inner data communication protocol were introduced. 132. MAKAP protocolagreement protocol . An attack that makes the adversary to personate the receiver successfully is proposed. 133. TURN protocol is a technique for simple traversal of UDP through NAT. 134. These voltage changes on the trunk circuit would cause pops or clicks that were audible to the subscriber as the electrical handshaking stepped through its protocol. 135. This synthetic strategy compared with traditional solution protocol has advantages of no organic solvent pollution, elevating reaction rate, high yield and simple work-up procedure. 136. Finally, It'shows the formal verification of the improved protocol and proves its fairness and non - repudiation. 137. A transport protocol and its formal description techniques for local networks are discussed. 138. Wireshark, formerly known as Ethereal, is a multiplatform network protocol analyzer. 139. Transmission Control Protocol ( TCP ) is a reliable, robust and end - to - end transmission protocol designed for Internet. 140. The PPP control protocol for this network protocol is not available on the server. 141. The paper proposes a new kind of media access protocol without collision as to fiber network. 142. We offer the formal description of negotiation protocol, negotiation strategies and the decision model for negotiation. 143. Conduct to prepare and modify SOPs, Method Validation Protocol and Report, GMP Documents, etc. 144. It introduces its structure, proposes network protocol stack model, the composing of a home gateway and the application design of remote control. Finally, it points out the next step work. 145. The protocol is called FAST , standing for Fast Active queue management Scalable Transmission Control Protocol ( TCP ) . 146. This paper proposes the concept of Internet Smart Card, describes its architecture, and emphatically analyzes the protocol hierarchy of the Smart Card Protocol Stack. 147. The FPGA is the core of the system. The hardware circuits for the multi-force sensor data, voice data and radar video data are designed respectively, and the communications protocol is established. 148. The idea of TTCN-3 universal decoder supporting different types of protocol is proposed in this thesis, which is a research-oriented beneficial attempt for TTCN-3 protocol testing. 149. The technique of time slot is the key technique of the TDMA network protocol. 150. Method handles act as both function pointers and as function combinators, allowing a built-in way to construct a call protocol flow from a caller to a callee. 151. The RFCOMM protocol emulates the serial cable line settings and status of an RS-232 serial port. 152. Non - repudiation protocol is a special network protocol which provides non - repudiation service. 153. HTTP is a text - based protocol for a Web browser to access Web pages. 154. By means of the verbal protocol method, the researchers have found that both cognitive and metacognitive strategies have their own roles to play in the different stages of translation. 155. PPP protocol is a widely supported WAN datagram encapsulating protocol. 156. NEMA communication protocol based on serial communication routines, and they hope to have everyone help! 157. The proposed protocol is based on CSMA/CA basis. The dynamic channel selection scheme is implemented and the number of the data channel is independent of the network topology. 158. Side note: UDP port 2873 uses the Datagram Protocol, a communications protocol for the Internet network layer, transport layer, and session layer. |
随便看 |
|
英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。