Learn More
Application identification in the middle is one of key challenges for network operators to manage application based traffic and policy controls in the Internet. However, it is becoming harder according to the increase of end-to-end encrypted traffic in which we hardly read application specific information from packets. We previously proposed a method to(More)
Low-density generator-matrix (LDGM) codes have advantages - fast encoding and parallel decoding, however the performance of the LDGM code is asymptotically bad. This problem can be solved by concatenating two LDGM codes serially. However, little is known about the construction of the concatenated LDGM codes - component LDGM codes, the combination of inner(More)
The identification of network application is important for network management such as traffic controls and anomaly traffic detection. To apply application-based traffic control promptly, the technique to progressive application identification is important. We previously proposed a method of timeliness identification of application, which can achieve to use(More)
Concise and informative title Effect of daily setup errors on the individual dose distribution Abstract Recent linear accelerators can perform cone beam computed tomography to correct setup errors immediately before dose delivery. We calculated the dose distribution with setup errors acquired from cone beam computed tomography to determine more realistic(More)
  • 1