[1] |
SUN Zeyu, XU Chen, SU Yanchao, LI Chuanfeng, NIE Yalin.
CCRP:Cross-Layer-Sensing Clustering Routing Protocol in Fog Computing
[J]. Computer Engineering and Applications, 2021, 57(9): 109-117.
|
[2] |
GONG Bencan, ZHOU Feng, CHEN Peng, REN Dong.
Routing Protocol Based on Path Quality in Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(6): 99-104.
|
[3] |
PENG Chunyan, DU Xiujuan.
Secure Routing Protocol Based on Depth in Underwater Acoustic Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(2): 76-81.
|
[4] |
QIN Feng, ZENG Hao, LIN Kaidong.
Load Balancing-Based Routing Protocol for LLN Under High-Load Scenario
[J]. Computer Engineering and Applications, 2020, 56(1): 121-126.
|
[5] |
WANG Yanjiao, TANG Qi.
Improved Routing Energy Algorithm for Heterogeneous Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2019, 55(22): 80-85.
|
[6] |
SUN Ling1, LUO Changyuan2.
Secure Geographic Information Based Routing Protocol of Aeronautical Ad Hoc Networks
[J]. Computer Engineering and Applications, 2019, 55(12): 77-82.
|
[7] |
ZHAN Jiacheng1, WANG Qiuhua2, OUYANG Xiaoqin1.
Source-Location Privacy Protection Routing Protocol in Wireless Sensor Networks by Avoiding Attackers
[J]. Computer Engineering and Applications, 2019, 55(12): 103-109.
|
[8] |
ZHENG Wenqing, JIN Hu, GUO Jianpeng, FENG Hui.
Backoff Algorithm for MAC Protocol Based on Channel Occupancy and Priority
[J]. Computer Engineering and Applications, 2019, 55(11): 80-84.
|
[9] |
WU Haotian, WANG Bo.
Partial multi-path QoS routing algorithm based on MSR
[J]. Computer Engineering and Applications, 2018, 54(8): 72-77.
|
[10] |
SUI Nannan1, WANG Cong1, ZHANG Dongmei1, ZHOU Xin2, XU Youyun1,3.
CMT-SC:Packet loss detection scheme for CMT in heterogeneous wireless environment
[J]. Computer Engineering and Applications, 2018, 54(3): 94-99.
|
[11] |
LIU Weilun, ZHANG Hengyang, ZHENG Bo, ZHAO Wei.
Statistical prediction mechanism for channel occupancy in airborne ad hoc network
[J]. Computer Engineering and Applications, 2018, 54(15): 78-83.
|
[12] |
LI Meng, ZHAI Jiangtao, DAI Yuewei.
Steganalysis to multipath encoding based on conditional entropy
[J]. Computer Engineering and Applications, 2018, 54(1): 117-121.
|
[13] |
LIU Qilie, JIA Mengfang, CHEN Lin, FENG Zhiyu.
Routing protocol for urban vehicular ad hoc networks
[J]. Computer Engineering and Applications, 2017, 53(9): 121-126.
|
[14] |
KANG Hongkai, WU Lifa, HONG Zheng, ZHUANG Honglin, ZHANG Yafeng.
Fuzzing method for BGP-4 protocol based on FSM
[J]. Computer Engineering and Applications, 2017, 53(6): 111-117.
|
[15] |
JIA Yingying1,2, WANG Jun1,2, WANG Xiaoxuan1,2, ZHANG Xin1,2.
Analysis of multicast routing protocols in wireless sensor networks
[J]. Computer Engineering and Applications, 2017, 53(18): 32-38.
|