• WordNet 3.6
    • n protocol code of correct conduct "safety protocols","academic protocol"
    • n protocol forms of ceremony and etiquette observed by diplomats and heads of state
    • n protocol (computer science) rules determining the format and transmission of data
    • ***
Webster's Revised Unabridged Dictionary
    • Protocol (Diplomacy) A convention not formally ratified.
    • Protocol (Diplomacy) A preliminary document upon the basis of which negotiations are carried on.
    • Protocol (Diplomacy) An agreement of diplomatists indicating the results reached by them at a particular stage of a negotiation.
    • Protocol The minutes, or rough draught, of an instrument or transaction.
    • Protocol The original copy of any writing, as of a deed, treaty, dispatch, or other instrument.
    • v. t Protocol To make a protocol of.
    • v. i Protocol To make or write protocols, or first draughts; to issue protocols.
    • ***
Century Dictionary and Cyclopedia
    • n protocol The original of any writing.
    • n protocol In diplomacy, the minutes or rough draft of an instrument or a transaction; hence, the original copy of any despatch, treaty, or other document; a document serving as a preliminary to or opening of any diplomatic transaction; also, a diplomatic document or minute of proceedings signed by friendly powers in order to secure certain diplomatic ends by peaceful means.
    • n protocol A record or registry; in law, a notary's record of copies of his acts.
    • n protocol In the parts of the United States acquired from Mexico, the original record of the transfer of land. Under Spanish laws the parties to a deed, or other instrument affecting land, appeared before a regidor, a sort of notary or alderman, accompanied by their neighbors as “instrumental witnesses,” and stated the terms of their agreement. That officer made a minute of the terms and entered the formal agreement in a book. This entry was called the protocol or matrix, and remained with the officer, the parties receiving from him a similar document called a testimonio.
    • protocol To form protocols or first drafts; issue protocols.
    • protocol To make a protocol of.
    • ***
Chambers's Twentieth Century Dictionary
    • n Protocol prō′tō-kol the first copy of any document: the rough draft of an instrument or transaction: the original copy
    • v.i Protocol to issue, form protocols
    • v.t Protocol to make a protocol of—also Prō′tocolīse
    • ***


Webster's Revised Unabridged Dictionary
F. protocole, LL. protocollum, fr. Gr. the first leaf glued to the rolls of papyrus and the notarial documents, on which the date was written; prw^tos the first (see Proto-) + glue


In literature:

There has been a question of such a Protocol, but great difficulties have arisen.
"The Greville Memoirs (Second Part)" by Charles C. F. Greville
Brunnow proposed the Protocol to me, and I have been in discussion with him about it.
"The Letters of Queen Victoria, Vol 2 (of 3), 1844-1853" by Queen Victoria
"Problems of Expansion" by Whitelaw Reid
Before either the new London protocol or the Alexandria convention could be carried into effect, further differences had arisen.
"The Political History of England - Vol XI" by George Brodrick
This decision, already declared in the secret protocol of London, was confirmed by the Congress of Vienna.
"Belgium" by Emile Cammaerts
Spain renounced claims, by Protocol, 1885.
"British Borneo" by W. H. Treacher
I know it's against protocol and all that ... but hell!
"We're Friends, Now" by Henry Hasse
We dispense with as much protocol here as practicable.
"Sjambak" by John Holbrook Vance
Question of protocols and of precedence.
"L'Aiglon" by Edmond Rostand
The protocol allowed no hints as to the un-protocol aspect of an ambassador's wardrobe.
"The Missourian" by Eugene P. (Eugene Percy) Lyle
Peace negotiations are nearing completion, a protocol having just been signed by representatives of the two countries.
"Porto Rico" by Arthur D. Hall
By the protocol of 1895 Chile agreed to give to Bolivia the port of Arica, or some other suitable position on the seaboard.
"Encyclopaedia Britannica, 11th Edition, Volume 6, Slice 2" by Various
These guarantees were the subject of the third Protocol of the Conference of London, February 3, 1830.
"Notes on the Diplomatic History of the Jewish Question" by Lucien Wolf
Here is the protocol.
"The Banished" by Wilhelm Hauff
Herman entered the protocol solemnly in his notes and kept going.
"Freudian Slip" by Franklin Abel
PROTOCOL is immediately attacked by a tall black domino, whose eyes sparkle with a lustre no mask can hide.
"Punch - Volume 25 (Jul-Dec 1853)" by Various
The pulpit was not the place for government protocols.
"Black Diamonds" by Mór Jókai
The Ministry of Foreign Trade is organized into nine bureaus, a legal office, and an office for protocol.
"Area Handbook for Romania" by Eugene K. Keefe, Donald W. Bernier, Lyle E. Brenneman, William Giloane, James M. Moore, and Neda A. Walpole
"The Greater Republic" by Charles Morris
Your men who pore over treaties and maps and protocols may plan and scheme to their hearts' content; but we can act.
"Sir Jasper Carew His Life and Experience" by Charles James Lever

In news:

Vietnam vet Gordon Smith, right, snubbed protocol to honor the rank-and-file troops who trained at Fort Ord .
Scintigraphic protocols should be tailored to the type of parathyroidectomy performed.
Once you've decided to switch to a phone system that uses voice-over-Internet Protocol technology, you must secure the system as well.
Part of a series of memos on protocol, it explained how to deal with writers researching books and articles on the White House.
Proprietary Protocols Hang Tough.
Pyx Technologies is expanding its thin-client support of the protocol deep into wireless and personal computing environments.
I've written about Polycom supporting TIP (Telepresence Interoperability Protocol) and Cisco's response to Polycom supporting it.
HSRP is Cisco's proprietary implementation of Virtual Router Redundancy Protocol (VRRP).
Wireless Application Protocol (WAP): The Gateway to an Exciting Wireless World.
DOHA, Qatar (December 8, 20120—A United Nations climate conference attended by representatives of nearly 200 countries has adopted an extension of the Kyoto Protocol through 2020.
Hewlett-Packard will add support for the OpenFlow protocol to its entire HP Networking line by the middle of next year, part of a broad push by HP to be a dominant player behind the software-defined networking (SDN) trend.
Write the SFWMD on Adaptive Protocols for Lake O.
The Adaptive Protocols for Lake Okeechobee Operations (AP) provide guidance to Lake Okeechobee water managers when deciding if, when and where to release water from the lake.
The village on Dec 10 became what Mayor Tom Brick said is the second-to-last invited municipality to adopt the Cuyahoga County anti -poaching protocol.
The MADI protocol has been around since 1991.

In science:

First of all, the main goal of such protocols is to allow Alice and Bob to create a secret key using a QKD protocol.
Authentication and routing in simple Quantum Key Distribution networks
For finite ∆t, however, the symmetry of the S-protocol guarantees the cancellation of lowest-order corrections O(∆t), resulting in superior averaging [2, 25, 43]. • Long symmetric cyclic protocol (LS), Fig. 1(c).
Dynamical control of qubit coherence: Random versus deterministic schemes
Still, in certain cases, the LS-protocol performs better than the A-protocol (see Sect. V.D), which motivates its separate consideration here. • Naive random protocol (R), Fig. 1(d).
Dynamical control of qubit coherence: Random versus deterministic schemes
As before, the A-protocol shows the best performance, followed by the H- and R-protocols.
Dynamical control of qubit coherence: Random versus deterministic schemes
Notice also that, in terms of coherence preservation and stability, the H-protocol shows (as intuitively expected) an intermediate performance between the A- and R-protocols.
Dynamical control of qubit coherence: Random versus deterministic schemes
For the latter choice, in particular, when M . 10, decoherence enhancement occurs and, interestingly, the results for the A-protocol are worse than those for the R-protocol.
Dynamical control of qubit coherence: Random versus deterministic schemes
For the LS-protocol, similar unfavorable circumstances happen for different values of ∆t and similar behaviors should be expected for other deterministic protocols and functions gk (t).
Dynamical control of qubit coherence: Random versus deterministic schemes
This is in contrast to, say, the “six-state protocol” or the “minimal qubit protocol” where Alice and Bob perform full tomography.4,5 There they can check all 15 parameters of their joint two-qubit state, and tomography uniquely characterizes the state.
Raw-data attacks in quantum cryptography with partial tomography
Among the essential anomalous events of VLAN infrastructure we can list violations in VLAN membership assignment, in address resolution protocol, in VLAN trunking protocol, router miscon figuration.
Analysis of Inter-Domain Traffic Correlations: Random Matrix Theory Approach
In a standard gossip protocol, the quantity R(k) ≡ R is simply a constant, whereas for our protocol, R(k) will be a random variable (with identical distribution for each time slot).
Geographic Gossip: Efficient Averaging for Sensor Networks
We first consider the protocol of (which we will refer to as the W protocol) for obtaining an EPR pair from a W state.
Random multiparty entanglement distillation
However, we see that if we apply the W protocol to a state ψ(M , N ) we can reliably obtain either a randomlyshared ψ(M − 1, N ) (applying the usual protocol) or ψ(M − 1, N − 1) (applying the W protocol but with |0i and |1i states reversed).
Random multiparty entanglement distillation
Jacobs’ protocol is deterministic, but other protocols exist which are stochastic and minimize the average time for a single qubit to reach a given purity .
Weak measurement and control of entanglement generation
Actually, traditional protocols such as ”TDMA” are based on the first moments of the signal, while the highlight of our protocol is that it can fully utilize the information of the second moments of the signals.
On the Information of the Second Moments Between Random Variables Using Mutually Unbiased Bases
For a protocol in the general form, O(n6 ) are sufficient for an attack, which can be proven by showing that any protocol can be transformed into its normal form with at most quadratic blow-up in the number of oracle queries made by the players.
Breaking One-Round Key-Agreement Protocols in the Random Oracle Model