[1] |
SHENG Jianhui, FAN Yinting, XIA Minjie.
Physical Layer Security Performance Analysis for Wireless Sensor Network
[J]. Computer Engineering and Applications, 2021, 57(8): 91-95.
|
[2] |
GONG Junhui, HU Xiaohui, DU Yongwen.
Research on Selection of Optimal Defense Strategy Based on Evolutionary Game
[J]. Computer Engineering and Applications, 2021, 57(13): 116-123.
|
[3] |
ZHANG Sen, YE Jian, LI Guogang.
Research and Implementation of Blockchain Technology Scheme for Cold Chain Logistics
[J]. Computer Engineering and Applications, 2020, 56(3): 19-27.
|
[4] |
JIANG Lingyan1, WANG Xiaoguang2.
Risk Prevention of Repetitive Pledge Under Internet of Things
[J]. Computer Engineering and Applications, 2019, 55(9): 223-229.
|
[5] |
ZHOU Yuxuan1, YANG Xu1,2, BAO Fucheng1, ZHU Yifeng1,2, DUAN Jin1,2.
Cordova-NodeJS Hybrid IOT Information Service System
[J]. Computer Engineering and Applications, 2019, 55(6): 209-217.
|
[6] |
WANG Pengran, REN Jianji.
Computation Offloading Optimization of Federated Learning in Dynamic Internet of Things Environment
[J]. Computer Engineering and Applications, 2019, 55(16): 157-164.
|
[7] |
LI Hong, ZHU Xuan, LIU Yunfei, LI Junhui.
Improved TORA Protocol with Low Overhead and Load Balancing
[J]. Computer Engineering and Applications, 2019, 55(11): 67-73.
|
[8] |
DU Yongwen, WANG Zhangmin, HU Xiaohui, XU Ning.
A Survey on Software-Defined Wireless Sensor Network
[J]. Computer Engineering and Applications, 2019, 55(1): 1-8.
|
[9] |
WEI Yu, SONG Tian.
Lightweight and robust data reduction algorithms for Wireless Sensor Network
[J]. Computer Engineering and Applications, 2018, 54(3): 100-108.
|
[10] |
LI Xiyuan, SUN Chao, ZHENG Wei.
RFID mutual-authentication protocol based on PRF
[J]. Computer Engineering and Applications, 2018, 54(17): 67-70.
|
[11] |
QI Gang, ZHENG Lin.
Transmission protocol based on network coding for Wireless Sensor Networks of power lines system
[J]. Computer Engineering and Applications, 2018, 54(12): 86-92.
|
[12] |
ZHU Changju, WU Jiaxin, SONG Haisheng, YANG Hongwu.
Bounding-Box localization algorithm based on limit partition of estimated rectangle
[J]. Computer Engineering and Applications, 2017, 53(18): 84-88.
|
[13] |
SONG Haisheng, ZHU Changju, YANG Hongwu, WU Jiaxin.
Improvement of virtual anchor node strategy for Grid-Scan location algorithm
[J]. Computer Engineering and Applications, 2017, 53(16): 84-88.
|
[14] |
YANG Nan1, CHEN Yuanbo2, WANG Yanjie2, LI Qing2.
Multipath transmission protocol based on degree-constrained shortest path tree
[J]. Computer Engineering and Applications, 2017, 53(11): 126-130.
|
[15] |
GAO Guangyong1,2, YAO Shimao1,2, ZHOU Caixue1,2, CUI Zongmin1,2.
Reversible data hiding scheme for authentication of Wireless Sensor Network
[J]. Computer Engineering and Applications, 2017, 53(10): 124-131.
|