Login / Signup
Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs.
Takuji Tsuda
Yuka Komai
Takahiro Hara
Shojiro Nishio
Published in:
IEEE Access (2016)
Keyphrases
</>
query processing
intermediate nodes
directed graph
database systems
topology control
routing protocol
query evaluation
graph structure
social networks
xml documents
tree structure
cost model
mobile ad hoc networks