Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs

Takuji Tsuda, Yuka Komai, Takahiro Hara, Shojiro Nishio. Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs. IEEE Access, 4:993-1007, 2016. [doi]

@article{TsudaKHN16,
  title = {Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs},
  author = {Takuji Tsuda and Yuka Komai and Takahiro Hara and Shojiro Nishio},
  year = {2016},
  doi = {10.1109/ACCESS.2016.2541864},
  url = {http://dx.doi.org/10.1109/ACCESS.2016.2541864},
  researchr = {https://researchr.org/publication/TsudaKHN16},
  cites = {0},
  citedby = {0},
  journal = {IEEE Access},
  volume = {4},
  pages = {993-1007},
}