메뉴 건너뛰기




Volumn , Issue , 2011, Pages 50-54

Embedding information flows into renewal traffic

Author keywords

[No Author keywords available]

Indexed keywords

ANALYTICAL FORMULAS; DELAY CONSTRAINTS; EMBEDDING CAPACITY; EMBEDDING INFORMATION; MATCHED POINTS; MATCHING PROBLEMS; POINT PROCESS; REAL NETWORKS; RENEWAL FUNCTIONS; RENEWAL MODEL; RENEWAL PROCESS; SECURE NETWORKING;

EID: 83655202655     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITW.2011.6089514     Document Type: Conference Paper
Times cited : (2)

References (15)
  • 1
    • 45249083605 scopus 로고    scopus 로고
    • Anonymous networking amidst eavesdroppers
    • Jun.
    • P. Venkitasubramaniam, T. He, and L. Tong, "Anonymous networking amidst eavesdroppers," IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2770-2784, Jun. 2008.
    • (2008) IEEE Trans. Inform. Theory , vol.54 , Issue.6 , pp. 2770-2784
    • Venkitasubramaniam, P.1    He, T.2    Tong, L.3
  • 2
    • 49549085794 scopus 로고    scopus 로고
    • Detection of information flows
    • Nov.
    • T. He and L. Tong, "Detection of information flows," IEEE Trans. Inform. Theory, vol. 54, no. 11, pp. 4925-4945, Nov. 2008.
    • (2008) IEEE Trans. Inform. Theory , vol.54 , Issue.11 , pp. 4925-4945
    • He, T.1    Tong, L.2
  • 3
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital pseudonyms
    • Feb.
    • D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Communications of the ACM, vol. 24, no. 2, pp. 84-88, Feb. 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 7
    • 33745802064 scopus 로고    scopus 로고
    • Detection of interactive stepping stones: Algorithms and confidence bounds
    • Sophia Antipolis, French Riviera, France, Sep.
    • A. Blum, D. Song, and S. Venkataraman, "Detection of interactive stepping stones: Algorithms and confidence bounds," in Proc. of the Conference of Recent Advances in Intrusion Detection, Sophia Antipolis, French Riviera, France, Sep. 2004, pp. 39-49.
    • (2004) Proc. of the Conference of Recent Advances in Intrusion Detection , pp. 39-49
    • Blum, A.1    Song, D.2    Venkataraman, S.3
  • 9
    • 0003778293 scopus 로고    scopus 로고
    • 2nd ed. New York: John Wiley & Sons, Inc.
    • S. Ross, Stochastic Processes, 2nd ed. New York: John Wiley & Sons, Inc., 1996.
    • (1996) Stochastic Processes
    • Ross, S.1
  • 13
    • 0010014049 scopus 로고    scopus 로고
    • A sufficient condition for Lorenz ordering
    • B. Wilfling, "A sufficient condition for Lorenz ordering," The Indian Journal of Statistics, vol. 58, pp. 62-69, 1996.
    • (1996) The Indian Journal of Statistics , vol.58 , pp. 62-69
    • Wilfling, B.1
  • 14
    • 0029323403 scopus 로고
    • Wide-area traffic: The failure of Poisson modeling
    • Jun.
    • V. Paxson and S. Floyd, "Wide-area traffic: The failure of Poisson modeling," IEEE/ACM Trans. Networking, vol. 3, pp. 226-244, Jun. 1995.
    • (1995) IEEE/ACM Trans. Networking , vol.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 15
    • 84873934451 scopus 로고    scopus 로고
    • The embedding capacity of information flows under renewal traffic
    • arXiv:1103.2431v2, submitted to
    • S. Marano, V. Matta, T. He and L. Tong, "The Embedding Capacity of Information Flows Under Renewal Traffic," arXiv:1103.2431v2, submitted to IEEE Trans. Inform. Theory.
    • IEEE Trans. Inform. Theory
    • Marano, S.1    Matta, V.2    He, T.3    Tong, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.