[1] |
LIU Hui1, ZHANG Zhenyu1,2, YANG Wenzhong2, WU Xiaohong2.
Routing algorithm based on attribute of sociality of node in opportunistic networks
[J]. Computer Engineering and Applications, 2017, 53(22): 92-96.
|
[2] |
LV Junling, SONG Hui, HE Zhili, PAN Daru.
Survey of research on node’s selfish behavior in opportunistic networks
[J]. Computer Engineering and Applications, 2017, 53(18): 7-16.
|
[3] |
ZHANG Dan, LIN Yaguang, ZHANG Shanshan, LI Peng, WANG Xiaoming.
The impact of fragment size on forwarding of multimedia messages in opportunistic networks
[J]. Computer Engineering and Applications, 2016, 52(1): 71-75.
|
[4] |
LI Yongtao, ZHU Xiaosong, DUN Peng.
Improved routing approach based on LTP-RSS in opportunistic networks
[J]. Computer Engineering and Applications, 2014, 50(3): 55-58.
|
[5] |
SONG Manman, ZHANG Zhenyu, YANG Wenzhong, ZHANG Zhen.
Repeated-game model of node cooperation in opportunistic networks
[J]. Computer Engineering and Applications, 2014, 50(16): 86-89.
|
[6] |
WANG Jiliang.
Nodes mobility model for opportunistic networks using state transition and triggering events
[J]. Computer Engineering and Applications, 2013, 49(1): 98-100.
|
[7] |
SUN Jianzhi1, YUN Bing2, HAN Zhongming1, ZHANG Yingxin1, CHEN Dan1.
Robustness analysis of opportunistic network routing algorithms under flooding attacks
[J]. Computer Engineering and Applications, 2012, 48(5): 54-58.
|
[8] |
LIU Yan, ZHAO Hongwu, JIN Yu, GU Jinguang.
Research on security of routing protocol in mobile Ad hoc networks
[J]. Computer Engineering and Applications, 2012, 48(29): 99-104.
|
[9] |
SUN Jianzhi, ZHANG Yingxin, CHEN Dan, HAN Zhongming.
Routing scheme of opportunistic network with Epidemic based on priority strategy
[J]. Computer Engineering and Applications, 2012, 48(20): 108-111.
|
[10] |
ZHENG Jinfeng1,HE Jun1,ZHOU Hongxia2,LIU Zhong3,GUO Wensheng4.
Research of RSSI-PROPHET routing algorithm of opportunistic networks
[J]. Computer Engineering and Applications, 2011, 47(35): 106-109.
|
[11] |
SUN Jianzhi,HAN Zhongming,CHEN Dan,LI Yuehui.
Wait and Spray:improved routing algorithm of opportunistic network
[J]. Computer Engineering and Applications, 2011, 47(31): 91-93.
|
[12] |
ZHANG Xingang1,LI Xiuqin2.
Multi-path routing and interface assignment for multi-interface multi-channel MANETs
[J]. Computer Engineering and Applications, 2011, 47(28): 97-99.
|
[13] |
ZENG Bin,YAO Lu,CHEN Zhicheng.
Configuration protocol for wireless mobile gateway
[J]. Computer Engineering and Applications, 2011, 47(25): 74-77.
|
[14] |
LEI Xiangdong,XIONG Wenhua.
Research of data consistency based on chosen cache nodes in MANETS
[J]. Computer Engineering and Applications, 2011, 47(23): 93-95.
|
[15] |
PENG Hai-ying,TANG Ling-li,TANG Hong.
Performance study of TCP Veno in MANET environment
[J]. Computer Engineering and Applications, 2010, 46(9): 85-87.
|