[1] |
SUN Zeyu, XU Chen, SU Yanchao, LI Chuanfeng, NIE Yalin.
CCRP:Cross-Layer-Sensing Clustering Routing Protocol in Fog Computing
[J]. Computer Engineering and Applications, 2021, 57(9): 109-117.
|
[2] |
GONG Bencan, ZHOU Feng, CHEN Peng, REN Dong.
Routing Protocol Based on Path Quality in Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(6): 99-104.
|
[3] |
PENG Chunyan, DU Xiujuan.
Secure Routing Protocol Based on Depth in Underwater Acoustic Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(2): 76-81.
|
[4] |
QIN Feng, ZENG Hao, LIN Kaidong.
Load Balancing-Based Routing Protocol for LLN Under High-Load Scenario
[J]. Computer Engineering and Applications, 2020, 56(1): 121-126.
|
[5] |
WANG Yanjiao, TANG Qi.
Improved Routing Energy Algorithm for Heterogeneous Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2019, 55(22): 80-85.
|
[6] |
SUN Ling1, LUO Changyuan2.
Secure Geographic Information Based Routing Protocol of Aeronautical Ad Hoc Networks
[J]. Computer Engineering and Applications, 2019, 55(12): 77-82.
|
[7] |
ZHAN Jiacheng1, WANG Qiuhua2, OUYANG Xiaoqin1.
Source-Location Privacy Protection Routing Protocol in Wireless Sensor Networks by Avoiding Attackers
[J]. Computer Engineering and Applications, 2019, 55(12): 103-109.
|
[8] |
KANG Hongkai, WU Lifa, HONG Zheng, ZHUANG Honglin, ZHANG Yafeng.
Fuzzing method for BGP-4 protocol based on FSM
[J]. Computer Engineering and Applications, 2017, 53(6): 111-117.
|
[9] |
JIA Yingying1,2, WANG Jun1,2, WANG Xiaoxuan1,2, ZHANG Xin1,2.
Analysis of multicast routing protocols in wireless sensor networks
[J]. Computer Engineering and Applications, 2017, 53(18): 32-38.
|
[10] |
ZHANG Fei1, WEI Yingjun2.
Car Ad Hoc network communication protocol with multi-link sensing
[J]. Computer Engineering and Applications, 2016, 52(8): 102-105.
|
[11] |
FENG Huifang, WANG Rui.
Connectivity analysis for vehicular ad hoc networks in fading channels
[J]. Computer Engineering and Applications, 2016, 52(18): 133-138.
|
[12] |
ZHANG Gang, SHI Runhua, ZHONG Hong.
Anonymous authentication scheme based on identity in VANET
[J]. Computer Engineering and Applications, 2016, 52(17): 101-106.
|
[13] |
YANG Bo1,2, WANG Shan1, SHI Xinxin1.
Vehicle-speed-and-network-status-sensing based backoff algorithm for vehicular netwok access
[J]. Computer Engineering and Applications, 2016, 52(14): 105-109.
|
[14] |
ZHANG Shuling, ZHU Quan, ZOU Fumin, CHEN Yu.
Research on WMN routing protocol for wireless broadband coverage of traffic trunk
[J]. Computer Engineering and Applications, 2015, 51(9): 111-116.
|
[15] |
ZHANG Huyin, YANG Bo, HAO Sheng.
LRTWR:Regional real-time traffic awareness routing protocol
[J]. Computer Engineering and Applications, 2015, 51(7): 69-73.
|