[1] |
SHENG Jianhui, FAN Yinting, XIA Minjie.
Physical Layer Security Performance Analysis for Wireless Sensor Network
[J]. Computer Engineering and Applications, 2021, 57(8): 91-95.
|
[2] |
GONG Junhui, HU Xiaohui, DU Yongwen.
Research on Selection of Optimal Defense Strategy Based on Evolutionary Game
[J]. Computer Engineering and Applications, 2021, 57(13): 116-123.
|
[3] |
CHEN Zhaohui, YANG Xiang, LI Peng, HE Heng.
Opportunistic Routing Mechanism Considering Link Correlation in Intra-Session Coding
[J]. Computer Engineering and Applications, 2020, 56(24): 85-94.
|
[4] |
LI Hong, ZHU Xuan, LIU Yunfei, LI Junhui.
Improved TORA Protocol with Low Overhead and Load Balancing
[J]. Computer Engineering and Applications, 2019, 55(11): 67-73.
|
[5] |
DU Yongwen, WANG Zhangmin, HU Xiaohui, XU Ning.
A Survey on Software-Defined Wireless Sensor Network
[J]. Computer Engineering and Applications, 2019, 55(1): 1-8.
|
[6] |
WEI Yu, SONG Tian.
Lightweight and robust data reduction algorithms for Wireless Sensor Network
[J]. Computer Engineering and Applications, 2018, 54(3): 100-108.
|
[7] |
YANG Guang, HOU Jia.
Data dissemination in two-way vehicle-to-vehicle networks based on network coding and store-and-forward mechanism
[J]. Computer Engineering and Applications, 2018, 54(24): 103-107.
|
[8] |
WU Jun, MO Weiwei, YIN Xinqi, BAI Guangwei.
Research on opportunitstic routing incentive mechanism based on repeated game in WMNs
[J]. Computer Engineering and Applications, 2018, 54(10): 110-114.
|
[9] |
WU Jun, MO Weiwei, YIN Xinqi, BAI Guangwei.
Trusted opportunistic routing forwarding model based on feedback credibility
[J]. Computer Engineering and Applications, 2017, 53(8): 23-28.
|
[10] |
ZHU Changju, WU Jiaxin, SONG Haisheng, YANG Hongwu.
Bounding-Box localization algorithm based on limit partition of estimated rectangle
[J]. Computer Engineering and Applications, 2017, 53(18): 84-88.
|
[11] |
SONG Haisheng, ZHU Changju, YANG Hongwu, WU Jiaxin.
Improvement of virtual anchor node strategy for Grid-Scan location algorithm
[J]. Computer Engineering and Applications, 2017, 53(16): 84-88.
|
[12] |
YANG Nan1, CHEN Yuanbo2, WANG Yanjie2, LI Qing2.
Multipath transmission protocol based on degree-constrained shortest path tree
[J]. Computer Engineering and Applications, 2017, 53(11): 126-130.
|
[13] |
GAO Guangyong1,2, YAO Shimao1,2, ZHOU Caixue1,2, CUI Zongmin1,2.
Reversible data hiding scheme for authentication of Wireless Sensor Network
[J]. Computer Engineering and Applications, 2017, 53(10): 124-131.
|
[14] |
JIANG Zhiying1, CHEN Yong2, HU Bing1, SUN Zhixin1.
Research on time synchronization algorithm for Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2017, 53(1): 1-8.
|
[15] |
DANG Xiaochao1,2, PU Shiqiang1, HAO Zhanjun1,2.
Node scheduling algorithm for three-dimensional wireless sensor network
[J]. Computer Engineering and Applications, 2016, 52(7): 117-121.
|