Search: 簡易 | 詳細 || Language: 英語 | 日本語 || Login: ログイン | Help: ヘルプ |


8 件の該当がありました. : このページのURL : HTML

[1] Tomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, and Yuuichi Teranishi, "A Node Replication Method to Guarantee Reachability for P2p Sensor Data Stream Delivery System on Heterogeneous Churn Situations," IEEE International Computers, Software and Applications Conference (COMPSAC2015), pages 529-534 July 2015.
[2] Takuji Tsuda, Yuka Komai, Yuya Sasaki, Takahiro Hara, and Shojiro Nishio, "Top-K Query Processing and Malicious Node Identification Against Data Replacement Attack in MANETs," Proc of IEEE Int'l Conf. on Mobile Data Management (MDM-2014), pages 279-288 July 2014.
[3] Yuka Komai, Yuya Sasaki, Takahiro Hara, and Shojiro Nishio, "Searching K-Nearest Neighbor Nodes Based on Node Density in Ad Hoc Networks," Proc. of Int'l Conf. on Advances in Mobile Computing & Multimedia (MoMM2012), pages 199-207 December 2012.
[4] Yusuke Gotoh, Tomoki Yoshihisa, Hideo Taniguchi, Masanori Kanazawa, W. Rahayu, and Y.P.P. Chen, "A Scheduling Method for Node Relay-Based Webcast Considering Reconnection," 26th IEEE International Conference on Advanced Information Networking and Applications (AINA-2012), pages 787-794 March 2012.
[5] Shoji Sano, Tomoki Yoshihisa, Tsutomu Terada, and Masahiko Tsukamoto, "Tracking Methods of Movable Node Using Relative Distances," Proc. of FTRA Intrnational Conference on Advanced IT engineering and Management (AIM 2012), pages 45-46 February 2012.
[6] Jinfang Jiang, Guangjie Han, Huihui Xu, Lei Shu, and Mohsen Guizani, "LMAT: Localization with a Mobile Anchor Node Based on Triangulation in Wireless Sensor Networks," Proc. of IEEE Global Communication Conference (Globecom 2011), pages 1-6 December 2011.
[7] Yusuke Gotoh, Tomoki Yoshihisa, Hideo Taniguchi, and Masanori Kanazawa, "A Scheduling Method to Reduce Waiting Time for Node Relay-Based Webcast Considering Available Bandwidth," Proc. of Int'l Workshop on Streaming Media Delivery and Management Systems (SMDMS 2010), pages 489-494 November 2010.
[1] 津田 琢士, 駒井 友香, 佐々木 勇和, 原 隆浩, 西尾 章治郎, "アドホックネットワークにおけるデータ差替え攻撃を考慮したTop-k検索手法および攻撃端末特定手法," 情報処理学会マルチメディア, 分散, 協調とモバイル(DICOMO 2013)シンポジウム論文集, volume 2013, number 1, pages 569-576 2013年7月.