•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
View Item 
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs

Author:
Tsuda, Takuji , Komai, Yuka , Sasaki, Yuya , Hara, Takahiro , Nishio, Shojiro
Publisher:
IEEE
Year
: 2014
DOI: 10.1109/ICSESS.2014.6933633
URI: http://libsearch.um.ac.ir:80/fum/handle/fum/1032625
Keyword(s): database indexing,face recognition,feature extraction,image matching,learning (artificial intelligence),principal component analysis,tree data structures,visual databases,LSH,PCA,complete binary tree,ethnic facial image database,face recognition,facial image feature extraction,global image feature indexing method,hash-based structures,image feature indexing structure,large-scale face image matching,local sensitive hash,machine learning based structures,principal component ana
Collections :
  • Latin Articles
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs

Show full item record

date accessioned2020-03-12T20:58:43Z
date available2020-03-12T20:58:43Z
date issued2014
identifier other6916931.pdf
identifier urihttp://libsearch.um.ac.ir:80/fum/handle/fum/1032625?locale-attribute=en
formatgeneral
languageEnglish
publisherIEEE
titleTop-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs
typeConference Paper
contenttypeMetadata Only
identifier padid8158303
subject keywordsdatabase indexing
subject keywordsface recognition
subject keywordsfeature extraction
subject keywordsimage matching
subject keywordslearning (artificial intelligence)
subject keywordsprincipal component analysis
subject keywordstree data structures
subject keywordsvisual databases
subject keywordsLSH
subject keywordsPCA
subject keywordscomplete binary tree
subject keywordsethnic facial image database
subject keywordsface recognition
subject keywordsfacial image feature extraction
subject keywordsglobal image feature indexing method
subject keywordshash-based structures
subject keywordsimage feature indexing structure
subject keywordslarge-scale face image matching
subject keywordslocal sensitive hash
subject keywordsmachine learning based structures
subject keywordsprincipal component ana
identifier doi10.1109/ICSESS.2014.6933633
journal titleobile Data Management (MDM), 2014 IEEE 15th International Conference on
filesize743360
citations0
contributor rawauthorTsuda, Takuji , Komai, Yuka , Sasaki, Yuya , Hara, Takahiro , Nishio, Shojiro
  • About Us
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
DSpace software copyright © 2019-2022  DuraSpace