date accessioned | 2020-03-12T20:58:43Z | |
date available | 2020-03-12T20:58:43Z | |
date issued | 2014 | |
identifier other | 6916931.pdf | |
identifier uri | http://libsearch.um.ac.ir:80/fum/handle/fum/1032625?show=full | |
format | general | |
language | English | |
publisher | IEEE | |
title | Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs | |
type | Conference Paper | |
contenttype | Metadata Only | |
identifier padid | 8158303 | |
subject keywords | database indexing | |
subject keywords | face recognition | |
subject keywords | feature extraction | |
subject keywords | image matching | |
subject keywords | learning (artificial intelligence) | |
subject keywords | principal component analysis | |
subject keywords | tree data structures | |
subject keywords | visual databases | |
subject keywords | LSH | |
subject keywords | PCA | |
subject keywords | complete binary tree | |
subject keywords | ethnic facial image database | |
subject keywords | face recognition | |
subject keywords | facial image feature extraction | |
subject keywords | global image feature indexing method | |
subject keywords | hash-based structures | |
subject keywords | image feature indexing structure | |
subject keywords | large-scale face image matching | |
subject keywords | local sensitive hash | |
subject keywords | machine learning based structures | |
subject keywords | principal component ana | |
identifier doi | 10.1109/ICSESS.2014.6933633 | |
journal title | obile Data Management (MDM), 2014 IEEE 15th International Conference on | |
filesize | 743360 | |
citations | 0 | |
contributor rawauthor | Tsuda, Takuji , Komai, Yuka , Sasaki, Yuya , Hara, Takahiro , Nishio, Shojiro | |