Evaluation of mutual anonymity in P2P networks (情報処理)
スポンサーリンク
概要
- 論文の詳細を見る
- 2010-03-04
著者
-
MORITA Hiroyoshi
Graduate School of Information Systems, University of Electro-Communications
-
KAWASHIMA Chigusa
Graduate School of Information Systems, the University of Electro-Communicatons
-
ALEXANDROVA Todorka
Information and Communications Systems Department, Graduate School of System design, Tokyo Metropali
-
NUGRAHA I
Graduate School of Information Systems, the University of Electro-Communicatons
関連論文
- Soft Decoding of Integer Codes and Their Application to Coded Modulation
- Evaluation of mutual anonymity in P2P networks (情報処理)
- Transcoding-after-Smoothing System for VBR MPEG Video Streaming
- Evaluation of mutual anonymity in P2P networks (情報セキュリティ)
- Evaluation of mutual anonymity in P2P networks (情報処理)
- Evaluation of mutual anonymity in P2P networks (ワイドバンドシステム)
- Multicast Communication for Video Broadcasting Service over IPv4 Network Using IP Option(Internet)
- Derivation on Bit Error Probability of Coded QAM Using Integer Codes(Communication Theory and Signals)
- Integer Codes Correcting Single Errors of Specific Types (±e_1, ±e_2,..., ±e_s)(Communication Theory and Signals)
- Codes over the Ring of Integers Modulo m (Special Section on Information Theory and Its Applications)
- On Analysis of Acceptable Region of a Statistical Multiplexer Based on Fractional Brownian Traffic Models
- On Construction of Reversible Variable-Length Codes Including Resynchronization Markers as Codewords
- On Multiple Smoothed Transmission of MPEG4 Video Stream
- On Multiple Smoothed Transmission of MPEG Video Streams(Image Coding, Information Theory and Its Applications)
- On Trimming Codewords of Arithmetic Codes
- Reversible Distribution Converter with Finite Precision Arithmetic
- Special Section on Information Theory and Its Applications
- On Increasing the Number of Users in (t, n) Threshold Secret Sharing Schemes
- On the Construction of an Antidictionary with Linear Complexity Using the Suffix Tree(Algorithms and Data Structures)
- Perfect (2, n) Threshold Secret Sharing Systems Based on Matrices with Constant Column Weight
- Soft Decoding of Integer Codes and Their Application to Coded Modulation