[1] |
GOU Haiwen, NING Aibing, HU Qin, ZHANG Huizhen.
Reduction Backtracking Algorithm for Uncapacitated Facility Location Problem With Penalties
[J]. Computer Engineering and Applications, 2020, 56(24): 43-49.
|
[2] |
ZHENG Zupeng, WANG Zumin, PENG Yang, JI Changqing, QIN Jing.
Survey of MAC Protocols for Energy Harvesting Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(15): 24-29.
|
[3] |
YANG Feiyue, TAO Yang.
Node Anomaly Detection Algorithm Based on Spatial-Temporal Cooperation in WSNs
[J]. Computer Engineering and Applications, 2019, 55(7): 127-131.
|
[4] |
ZHAN Jiacheng1, WANG Qiuhua2, OUYANG Xiaoqin1.
Source-Location Privacy Protection Routing Protocol in Wireless Sensor Networks by Avoiding Attackers
[J]. Computer Engineering and Applications, 2019, 55(12): 103-109.
|
[5] |
MAO Lili, ZHANG Zeqiang, ZHU Lixia.
Hybrid scatter search algorithm with simulated annealing for corridor allocation problem
[J]. Computer Engineering and Applications, 2018, 54(3): 243-249.
|
[6] |
LIU Chunmiao, ZHANG Huizhen.
Hybrid bat algorithm for un-capacitated facility location problem
[J]. Computer Engineering and Applications, 2018, 54(22): 28-34.
|
[7] |
CHEN Jing.
Sparse data acquisition scheme based on intelligent optimization and cluster compressed sensing for WSNs
[J]. Computer Engineering and Applications, 2017, 53(24): 263-270.
|
[8] |
DANG Xiaochao1,2, WANG Hongmei1, HAO Zhanjun1,2.
Covering algorithm related with area division and virtual forces in three-dimensional
[J]. Computer Engineering and Applications, 2017, 53(2): 107-111.
|
[9] |
JIA Yingying1,2, WANG Jun1,2, WANG Xiaoxuan1,2, ZHANG Xin1,2.
Analysis of multicast routing protocols in wireless sensor networks
[J]. Computer Engineering and Applications, 2017, 53(18): 32-38.
|
[10] |
LI Xianhui1,2, LI Xiaobo1,2, JI Shengpeng1,2, LIN Yao1,2, HE Yang1,2, ZHAO Zuopeng3.
Gradient-based broadcast clustering routing protocol for underground WSNs
[J]. Computer Engineering and Applications, 2017, 53(15): 122-126.
|
[11] |
LU Xian, PENG Yong.
Improved APIT localization algorithm
[J]. Computer Engineering and Applications, 2015, 51(3): 74-78.
|
[12] |
WANG Can1, QIAO Jianhua1,2, YAN Qingsen1.
Adaptive grid secure routing protocol based on hash-chain in WSNs
[J]. Computer Engineering and Applications, 2015, 51(2): 108-112.
|
[13] |
YUE Liying, DAI Yueming, WU Dinghui.
Energy optimized uneven clustering routing protocol in wireless sensor networks
[J]. Computer Engineering and Applications, 2015, 51(15): 80-85.
|
[14] |
YANG Xiaofeng, WANG Rui, PENG Li.
Fuzzy clustering hierarchy arithmetic based on residual energy prediction for WSN
[J]. Computer Engineering and Applications, 2015, 51(14): 72-77.
|
[15] |
ZHOU Mingwei, LIU Yuan.
Safety enhance research based on DV-hop localization algorithm in Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2014, 50(13): 121-126.
|