Search: 簡易 | 詳細 || Language: 英語 | 日本語 || Login: ログイン | Help: ヘルプ |

 

8 件の該当がありました. : このページのURL : HTML


国際会議
[1] Takuji Tsuda, Yuka Komai, Takahiro Hara, and Shojiro Nishio, "Signature-Based Top-K Query Processing Against Data Replacement Attacks in Manets," Proc. of Int'l Symposium on Reliable Distributed Systems (SRDS 2015), pages 130-139 September 2015.
[2] Yuka Komai, Takahiro Hara, and Shojiro Nishio, "Processing Convex Hull Queries in MANETs," Proc of IEEE Int'l Conf. on Mobile Data Management (MDM2015), pages 64-73 June 2015.
[3] Daichi Amagata, Yuya Sasaki, Takahiro Hara, and Shojiro Nishio, "CTR: an Efficient Top-k Query Routing in MANETs," International Conference on Advanced Mobile Computing & Multimedia (MoMM 2014), pages 225-234 December 2014.
[4] Yuka Komai, Takahiro Hara, and Shojiro Nishio, "A Convex Hull Query Processing Method in MANETs," Proc. of Int'l Symposium on Reliable Distributed Systems (SRDS 2014), pages 331-332 October 2014.
[5] Takuji Tsuda, Yuka Komai, Yuya Sasaki, Takahiro Hara, and Shojiro Nishio, "Top-K Query Processing and Malicious Node Identification Against Data Replacement Attack in MANETs," Proc of IEEE Int'l Conf. on Mobile Data Management (MDM-2014), pages 279-288 July 2014.
[6] Yuka Komai, Yuya Sasaki, Takahiro Hara, and Shojiro Nishio, "Processing k Nearest Neighbor Queries for Location-Dependent Data in MANETs," Proc. of Int'l Conf. on Database and Expert Systems Applications (DEXA 2013), volume 2013, number 2, pages 213-227 August 2013.
国内会議(査読付き)
[1] 津田 琢士, 駒井 友香, 佐々木 勇和, 原 隆浩, 西尾 章治郎, "アドホックネットワークにおけるデータ差替え攻撃を考慮したTop-k検索手法および攻撃端末特定手法," 情報処理学会マルチメディア, 分散, 協調とモバイル(DICOMO 2013)シンポジウム論文集, volume 2013, number 1, pages 569-576 2013年7月.
全国大会
[1] 佐々木 勇和, 原 隆浩, 西尾章治郎, "モバイルアドホックネットワークにおけるTop-k検索のための位置情報を用いた複製配置手法," FIT2013 第12回情報科学技術フォーラム, pages 383-386 2013年9月.