(Status: UNKNOWN) (DOI: 10.17487/RFC0010)
0011 Implementation of the Host - Host Software Procedures in GORDO. ... NOWN) (DOI: 10.17487/RFC0054)
0055 Prototypical implementation of the NCP. J. Newkirk, M. Kraley, J.
Postel... (Status: UNKNOWN) (DOI: 10.17487/RFC0102)
0103 Implementation of Interrupt Keys. R.B. Kalin. February 1971.
... /RFC0165)
0166 Data Reconfiguration Service: An implementation specification. R.H.
Anderson, V.G. Cerf, E.
/info/rfc10>.
RFC0011 | RFC0033 | Deloche, G., "Implementation of the Host - Host Software Procedures in GORDO",... ey, M., Postel, J., and S. Crocker, "Prototypical implementation of the NCP", RFC 55, DOI 10.17487/RFC0055, June 1... g/info/rfc102>.
RFC0103 | | Kalin, R., "Implementation of Interrupt Keys", RFC 103, DOI 10.17487/RFC0103... ., and D. Wood, "Data Reconfiguration Service: An implementation specification", RFC 166, DOI 10.17487/RFC0166, Ma
ion engine.
This document aims to remove such implementation-specific
dependencies and serve as a common JS... Unicode scalar values as described in [RFC3629]; implementation
approaches that lead to an equivalent result a... described in
Section 2.4.3.
A JSONPath implementation MUST raise an error for any query that is
not ... ing the cause of empty results.
Obviously, an implementation can still fail when executing a JSONPath
query
analyzes the timeline of the specification and
implementation of different types of "transient numeric identifi... a packet must be fragmented and
that it is an implementation choice whether to use a global or a per-
desti... Pv6 Identification values and notes that it is an implementation
choice whether to maintain a single counter... September 2002:
[Fyodor2002] documents the implementation of the "idle scan"
technique in the popular
ond for that website. If the recursive server
implementation joins these outstanding queries together, then it... ng
stub-to-recursive queries. However, if the implementation does not
join outstanding queries together, th... does not place any requirements on how long an
implementation should wait before retrying a query (aka a timeout
value), which may be implementation or configuration dependent. It
is generally e
4.1. Combating the Congestion Problem
2.5. Implementation and Operational Context
3. Traffic-Engineerin... , prescription, and
resolution.
4. An implementation and operational context in which the solutions
are instantiated. The implementation and operational context
includes planning,...
Dropping (AFD) [AFD03]) have seen some implementation. Advice
on the use of Active Queue Man
trinsic part of IPsec. However, a given
IPsec implementation might not support all identity types. In
part... sockopt()
calls) -- depending on the AH or ESP implementation being used.
Unfortunately, APIs for controllin... easily
ensure its presence by including a TLS implementation in his package.
In the special-case of IPv6, ... nagement has been
compromised), from incorrect implementation, compromise of the
security technology used fo
by the provider, although most aspects of
the implementation in the underlying network layers remain a free
... Network Slice Service customers.
Layered Implementation: The underlay network comprises network
el... ms of one or more connectivity constructs. An
implementation or operator is free to limit the number of
con... ty
construct in the IETF Network Slice, but an implementation or
operator is free to require that all connec
received in the Map-Request (which one is implementation
specific).
As a reminder, the initial ... characterize such policies
are deployment and implementation specific. Likewise, this document
does not sp...
fails (for whichever reason), it is up to the implementation of the
xTR to try to subscribe again.
If t... with the xTR-ID of the subscriber (which one is implementation
specific).
2. The Map-Server incremen
4.5. Verification
5. RSABSSA Variants
6. Implementation and Usage Considerations
6.1. Errors
6...
produces a randomized message input_msg. Its implementation is shown
below.
PrepareRandomize(msg)
... ants with
randomized message preparation.
6. Implementation and Usage Considerations
This section documen... re not an exhaustive list
of all the errors an implementation might emit. For example,
implementations migh
iven depth d.
There are multiple ways that an implementation might represent a
ratchet tree in memory. A c... internal representations
of ratchet trees. An implementation may use any tree representation
and associated... The concrete
algorithms are non-normative. An implementation may use any
algorithm that produces the correc... (k-1)) - 1
Appendix D. Link-Based Trees
An implementation may choose to store ratchet trees in a "link-base
Censorship circumvention also impacts the cost of implementation of a
censorship measure, and we include mentio... tent providers and can be regional or worldwide. Implementation
is occasionally voluntary, but normally it is ... ak et al. even
probed the firewall to discover implementation details like how much
state it stores [Khattak... work.
Taken as a whole, the apparent costs of implementation of censorship
techniques indicate a need for b
L. and R. Sparks, "Guidance on Interoperation and Implementation Reports for Advancement to Draft Standard", BCP 9... fo/bcp23>.
BCP24 | Berger, L., "RSVP over ATM Implementation Guidelines", BCP 24, RFC 2379, August 1998, <http... /info/bcp151>.
BCP152 | Bellis, R., "DNS Proxy Implementation Guidelines", BCP 152, RFC 5625, August 2009, <htt... Farrel, "Improving Awareness of Running Code: The Implementation Status Section", BCP 205, RFC 7942, July 2016, <h
service parameters MUST be supported by a DNR
implementation:
alpn: Used to indicate the set of supported... ameter is RECOMMENDED to be
supported by a DNR implementation:
dohpath: Used to supply a relative DoH URI ... passed to a local resolution library is
| implementation specific.
3.1.7. Ordering of Encrypted DNS Opti... itor.org/info/rfc6731>.
[RFC7113] Gont, F., "Implementation Advice for IPv6 Router
Advertisemen