[1] |
SHI Jiawen, WANG Yang, ZHANG Geng, WANG Yanan.
Distributed Simulation System for Power Communication Network
[J]. Computer Engineering and Applications, 2019, 55(19): 246-252.
|
[2] |
LIANG Chengjun, JIANG Hao, WU Jing.
Efficient mechanism for network simulation scenario modeling based on unified description
[J]. Computer Engineering and Applications, 2018, 54(7): 127-131.
|
[3] |
WENG Xiaolan1,2, WANG Zhijian1.
Research process of collaborative filtering recommendation algorithm
[J]. Computer Engineering and Applications, 2018, 54(1): 25-31.
|
[4] |
LIU Yi1, YANG Ling1, YANG Yubin2.
Scalable RFID mutual authentication protocol based on Rabin algorithm
[J]. Computer Engineering and Applications, 2017, 53(2): 15-20.
|
[5] |
JIA Yingying1,2, WANG Jun1,2, WANG Xiaoxuan1,2, ZHANG Xin1,2.
Analysis of multicast routing protocols in wireless sensor networks
[J]. Computer Engineering and Applications, 2017, 53(18): 32-38.
|
[6] |
LIU Kaiyu1, LIU Yuan1, WANG Xiaofeng2.
Method of network traffic simulation for topology focusing
[J]. Computer Engineering and Applications, 2016, 52(23): 123-129.
|
[7] |
LI Lanying, YI Chunhuan, SUN Jianda, LI Weijia.
Key management scheme based on unital for wireless sensor networks
[J]. Computer Engineering and Applications, 2015, 51(2): 94-98.
|
[8] |
FENG Huifang, WANG Mengru.
Impact of node mobility on topological properties for MANETs
[J]. Computer Engineering and Applications, 2014, 50(9): 73-76.
|
[9] |
WU Chenwen, RU Junnian, LIU Xiangli, LI Zhichang.
Algorithm of multicast network topology inference based on packet loss rate
[J]. Computer Engineering and Applications, 2014, 50(13): 118-120.
|
[10] |
ZHANG Qinglin.
Prediction model of mobility in MANET based on extreme learning machines
[J]. Computer Engineering and Applications, 2014, 50(12): 71-76.
|
[11] |
GAO Yuan, JIANG Ming, GE Yuan.
Simulation of DC motor networked control system based on NS2
[J]. Computer Engineering and Applications, 2013, 49(21): 83-86.
|
[12] |
LIU Yafeng, ZHONG Hong, SHI Runhua, SUN Su.
Dynamic trust evaluation for MANETs based on credibility
[J]. Computer Engineering and Applications, 2013, 49(17): 78-81.
|
[13] |
LIU Yu1, YIN Hui1,2.
Study of trusted routing mechanism in mobile Ad Hoc network
[J]. Computer Engineering and Applications, 2013, 49(11): 76-79.
|
[14] |
ZHAO Yuehua, ZHANG Chong.
Intrusion detection and response in mobile Ad Hoc network
[J]. Computer Engineering and Applications, 2012, 48(7): 109-111.
|
[15] |
XIAO Kejiang, XIONG Zhongyang, ZHANG Yufang.
Improvement and performance analysis of multipath AOMDV routing protocol
[J]. Computer Engineering and Applications, 2012, 48(6): 99-101.
|