protocol造句91. CAN(Controller Area Network), one of the most famous field-bus protocol standard, was used widely in measurement and control network in industry field.
92. FTP client program, FTP protocol beginner can refer to the next friend.
93. This paper discusses formal description style of communication protocol for computer networks.
94. The web browser is notified as to which protocol to use.
95. A decision tree classifier was applied and a scalar product protocol was added, so that the need of privacy preserving is satisfied as well as the advantage of decision tree is retained.
96. MPI is a language-independent communications protocol used to program parallel computers . Many Java versions of the MPI standard have been developed.
97. Currently, the research on routing protocol of satellite network is still in an early stage.
98. An adjacent system reachable by traversal of a single subnetwork by a Protocol Data Unit ( PDU ).
99. This paper introduces a novel lightweight protocol for field sensor networks suit to Industrial ap - plication.
100. A new model of security protocol, layer-based security protocol model is presented. With this model, an efficient security protocol generation system and also an authentication system are designed.
101. Introduces the protocol of data link based on HDLC and the realization by using VB language. The protocol is used to realize the credible communication between singlechip and PC.
102. The design of architecture of firmware, GUI, data structure, communication protocol, and program of the instrument of line patrol are presented in the thesis.
103. Recall that the Internet Protocol (IP) is the core network layer protocol that sits below the transport protocol (most commonly the Transmission Control Protocol, or TCP).
104. The paper studies the English auction secure protocol. An efficient and secure English auction protocol is proposed with signature based on proof of knowledge.
105. Considering about the different versions of UMB protocol, the performance of the first edition is the worst.
106. To transmit data accurately in strong interference environments, a communication protocol based on Manchester code was designed.
107. The paper argues about SET protocol and CORBA security service.
108. Based on Protocol 4.1, a high-performance Protocol 5.1 is put forwarded, with the name Oblivious Transfer Based Scalar Product Protocol.
109. The test results show that the proposed higher layer protocol can guarantee a high reliable communication.
110. In the paper, a network topology model and an arithmetic based on it are presented, which are applied in OSPF protocol testing.
111. The Trivial File Transfer Protocol (or TFTP) can then be used to transfer the kernel image and the initial ramdisk image to the local device.
112. According to the standard of 3 GPP, WLAN users authenticate and distribute keys through EAP - AKA protocol.
113. AS2 is a transport protocol specification for the Internet, and is typically used to send Electronic Data Interchange (EDI) messages.
114. TTCN-3 test system specifies the standard implementation interface of Codec, leaving the implementation of codec to developing engineers of protocol testing tools.
115. The distance limitation and delay problems encountered in local area networks are eliminated by the use of broadband technology and a hybrid token-CSMA/CD protocol.
116. So establishing communication between systems employing different protocols. A media converter is a example of a sophisticated form of protocol converter.
117. The communication protocol between the master computer and the slave computer has been designed to transmit the data synchronously and modify the errors automatically.
118. The preliminary result shows,[.com] that the two-phase locking protocol can do well for supporting the transaction concurrency in XSQS.
119. We designed and implemented a simplified link-level protocol with elastic buffered flow-control and buffered wormhole routing switching, it can support to transmit variable-length packet.
120. Then, based on the RSA digital signature algorithm, we design an undeniable RSA encryption protocol with small public key for both sides.