[1] |
SUN Ling1, LUO Changyuan2.
Secure Geographic Information Based Routing Protocol of Aeronautical Ad Hoc Networks
[J]. Computer Engineering and Applications, 2019, 55(12): 77-82.
|
[2] |
WANG Xiaosa1, FU Xiaodong1, LIU Li1, YUE Kun2, LIU Lijun1.
Probabilistic analysis for stochastic QoS of Web service composition
[J]. Computer Engineering and Applications, 2017, 53(14): 70-75.
|
[3] |
ZHANG Fei1, WEI Yingjun2.
Car Ad Hoc network communication protocol with multi-link sensing
[J]. Computer Engineering and Applications, 2016, 52(8): 102-105.
|
[4] |
JIA Zhichun1, XING Xing1,2.
Automated verification of compositional compatibility for multiple Web service
[J]. Computer Engineering and Applications, 2016, 52(7): 67-73.
|
[5] |
ZHANG Chi, CHU Chu, TANG Yingjun, CHEN Sheng.
Research on behavioral compatibility of Web service composition based on behavioral projection
[J]. Computer Engineering and Applications, 2016, 52(20): 46-51.
|
[6] |
FENG Huifang, WANG Rui.
Connectivity analysis for vehicular ad hoc networks in fading channels
[J]. Computer Engineering and Applications, 2016, 52(18): 133-138.
|
[7] |
ZHANG Gang, SHI Runhua, ZHONG Hong.
Anonymous authentication scheme based on identity in VANET
[J]. Computer Engineering and Applications, 2016, 52(17): 101-106.
|
[8] |
YANG Bo1,2, WANG Shan1, SHI Xinxin1.
Vehicle-speed-and-network-status-sensing based backoff algorithm for vehicular netwok access
[J]. Computer Engineering and Applications, 2016, 52(14): 105-109.
|
[9] |
ZHUANG Yaou, XU Hanchuan, XU Xiaofei, WANG Zhongjie, HE Ting.
Research on service pattern-based rapid service composition approach
[J]. Computer Engineering and Applications, 2016, 52(1): 1-6.
|
[10] |
YANG Shuxin, XU Liping, WANG Peng.
Software fault localization research based on graph mining and decision tree
[J]. Computer Engineering and Applications, 2015, 51(20): 67-71.
|
[11] |
CUI Miao1,2, LI Lan2, ZHANG Guangchi1.
PHY/MAC combination simulation research of MIMO MAC protocol
[J]. Computer Engineering and Applications, 2015, 51(14): 84-88.
|
[12] |
LIU Yu.
Study of fast certificate revocation in vehicular Ad Hoc networks
[J]. Computer Engineering and Applications, 2014, 50(5): 65-69.
|
[13] |
HU Taoying1, CHENG Yun’an1, GUAN Junming2,3.
Admission control based on bandwidth policy for ad hoc networks
[J]. Computer Engineering and Applications, 2014, 50(21): 85-90.
|
[14] |
WANG Ying, ZHANG Qian.
Path outage probability-based VANETs connection model and performance analysis
[J]. Computer Engineering and Applications, 2014, 50(21): 100-105.
|
[15] |
LU Jinjun1, LONG Yingyan2, PAN Hongli1.
Evolving graph-based reliable routing for vehicular Ad hoc networks
[J]. Computer Engineering and Applications, 2014, 50(13): 96-102.
|