[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] tags (HTML) attributes categoryBag dc identifierBag META metadata support TITLE metadata support Tail class 2nd Tail entries existence take method JavaSpace interface takeIfExists method JavaSpace interface targetObject attributes taxonomies UDDI TCP addresses peers TCP sockets. [See sockets] TCP-based BEEP sessions creating TCP/IP interoperability Teacher class code 2nd 3rd 4th 5th 6th 7th 8th Distance Learning program methods tech support Distance Learning program technical fingerprints technologies P2P 2nd technology agent databases JavaSpaces, compared 2nd TextListener class The Theory of Nymity third parties trusted threads blocking Java 2nd multithread support Java threshold attribute Peer Discovery protocol thresholds Ticket Granting Service Exchange tickets tiers J2EE 2nd client 2nd EIS EJB 2nd Web 2nd layers Time Service CORBA timestamps digital TimeZone attribute (.NET Passport) TITLE tag metadata support TLS (Transport Layer Security) TLS Web site tModel data type UDDI 2nd tModel structures pulishing 2nd tModelInstanceDetails element tokens authentication authorization transferring between peers 2nd 3rd tolerance (fault) 2nd communication load balancing redundancy storage Tomcat personal portals toolkits Jena download tools analyzers sniffers topic-based publish-subscribe communication TopicConnectionFactory interface topics JMS topics. [See also destinations] topologies bus hierarchical mesh ring star TP monitors 2nd trading stocks traffic managing routing 2nd 3rd transaction services 2nd 3rd transactions JavaSpaces TP monitors 2nd transfer agents transferJailKey() method transferring tokens between peers 2nd 3rd transform() method transformations XML transport bandwidth communication models 2nd defined discovery implications 2nd routing 2nd 3rd virtual namespaces Transport Layer Security. [See TLS] trapdoor one-way function trees listmodel objects, creating Triple-DES troubleshooting integtration syntax 2nd trust 2nd 3rd 4th 5th direct web of trust trusted classes trusted third parties TTL (time-to-live) parameter broadcast messages tuple spaces Twofish symmetric algorithm Web site type conversions SOAP messages typing (strong) |