Tweet | |
T. Tsuda, Y. Komai, T. Hara, and S. Nishio, "Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs," IEEE Access, 4, pp. 993-1007 March 2016. | |
ID | 727 |
分類 | 論文誌 |
タグ | grouping identification malicious manets node processing query top-k |
表題 (title) |
Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs |
表題 (英文) |
|
著者名 (author) |
Takuji Tsuda,Yuka Komai,Takahiro Hara,Shojiro Nishio |
英文著者名 (author) |
,Yuka Komai,Takahiro Hara,Shojiro Nishio |
キー (key) |
,Yuka Komai,Takahiro Hara,Shojiro Nishio |
定期刊行物名等 |
IEEE Access |
定期刊行物名等 |
|
巻数 (volume) |
4 |
号数 (number) |
|
ページ範囲 (pages) |
993-1007 |
刊行月 (month) |
3 |
出版年 (year) |
2016 |
Impact Factor (JCR) |
|
URL |
|
付加情報 (note) |
the Grant-in-Aid for Challenging Exploratory Research (26540035) |
発表年度 |
2015年度 |
内容梗概 (abstract) |
|
論文電子ファイル | 利用できません. |
BiBTeXエントリ |
@article{id727, title = {{Top-k} Query Processing and Malicious Node Identification Based on Node Grouping in {MANETs}}, author = {Takuji Tsuda and Yuka Komai and Takahiro Hara and Shojiro Nishio}, journal = {IEEE Access}, volume = {4}, pages = {993-1007}, month = {3}, year = {2016}, note = {the Grant-in-Aid for Challenging Exploratory Research (26540035)}, annote = {2015年度}, } |