[1] |
ZHENG Zupeng, WANG Zumin, PENG Yang, JI Changqing, QIN Jing.
Survey of MAC Protocols for Energy Harvesting Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(15): 24-29.
|
[2] |
ZHENG Wenqing, JIN Hu, GUO Jianpeng, FENG Hui.
Backoff Algorithm for MAC Protocol Based on Channel Occupancy and Priority
[J]. Computer Engineering and Applications, 2019, 55(11): 80-84.
|
[3] |
XU Lang, SHEN Bin, ZHOU Xiaoyong, JIN Chun.
Key technology analysis of LWA
[J]. Computer Engineering and Applications, 2018, 54(15): 6-12.
|
[4] |
LIU Yonglei1, JIN Zhigang2, DU Lei2.
Secure and trusted access for Access Point(AP)in open system authentication
[J]. Computer Engineering and Applications, 2016, 52(6): 99-101.
|
[5] |
CAO Dun1,2, TANG Yulong2, LEI Zhengbao1.
Channel access backoff algorithm considered remaining time for DSRC
[J]. Computer Engineering and Applications, 2016, 52(13): 126-130.
|
[6] |
TAO Zhiyong1, YUAN Yongcai2.
Research of two step exponential backoff algorithm in periodic sampling
[J]. Computer Engineering and Applications, 2015, 51(1): 102-105.
|
[7] |
SHI Chun, HE Shuqian, DENG Zhengjie.
Adaptive access mechanism based on IEEE 802.11 in non-saturated conditions
[J]. Computer Engineering and Applications, 2014, 50(22): 17-21.
|
[8] |
MA Kang, JIN Jie, SU Hansong, LI Yuanyuan.
Reallocation of ARQ retransmission resources in LTE system
[J]. Computer Engineering and Applications, 2014, 50(12): 106-110.
|
[9] |
YAO Weixi1, CAI Baoguo2, MIAO Xuening2.
Staged collision resolution algorithm with linearly varying contention window
[J]. Computer Engineering and Applications, 2013, 49(22): 72-76.
|
[10] |
LIU Yonglei1,2, JIN Zhigang3.
Security analysis of WPS in WLAN
[J]. Computer Engineering and Applications, 2013, 49(21): 87-89.
|
[11] |
ZHAI Chongzheng, WANG Ze, WEI Xixi.
Special WMN authentication scheme for roaming
[J]. Computer Engineering and Applications, 2012, 48(7): 102-105.
|
[12] |
WANG Yun, LE Yanfen, SHI Weibin.
Experimental study of IEEE 802.15.4 anti-interference ability to WLAN
[J]. Computer Engineering and Applications, 2012, 48(5): 99-101.
|
[13] |
CAI Baoguo1,2, MIAO Xuening2.
GDCF based backoff algorithm with contention window fast increasing
[J]. Computer Engineering and Applications, 2012, 48(27): 31-37.
|
[14] |
ZHAO Xiaochao1,2, ZHENG Mingcai3, LIAO Ruihua3.
MAC protocol based on orderly competition in wireless sensor networks
[J]. Computer Engineering and Applications, 2012, 48(18): 76-80.
|
[15] |
CUI Miao1,2,CAO Yinglie1,2,FENG Suili3.
Novel MAC protocol for MIMO Ad Hoc networks with multi-packet reception
[J]. Computer Engineering and Applications, 2011, 47(6): 15-19.
|