[1] |
CHEN Shuping, ZHOU Huilin, HE Wangquan, QI Fengbin.
Load-Balanced Multicast Routing for Large-Scale Infiniband Network
[J]. Computer Engineering and Applications, 2022, 58(5): 138-147.
|
[2] |
LIU Qinghua, HUANG Shengpei, YE Jincai, KANG Yiming.
DSR Protocol Optimization Method for UAV Ad Hoc Network
[J]. Computer Engineering and Applications, 2022, 58(1): 128-133.
|
[3] |
SUN Ling1, LUO Changyuan2.
Secure Geographic Information Based Routing Protocol of Aeronautical Ad Hoc Networks
[J]. Computer Engineering and Applications, 2019, 55(12): 77-82.
|
[4] |
ZHENG Wenqing, JIN Hu, GUO Jianpeng, FENG Hui.
Backoff Algorithm for MAC Protocol Based on Channel Occupancy and Priority
[J]. Computer Engineering and Applications, 2019, 55(11): 80-84.
|
[5] |
LIU Weilun, ZHANG Hengyang, ZHENG Bo, ZHAO Wei.
Statistical prediction mechanism for channel occupancy in airborne ad hoc network
[J]. Computer Engineering and Applications, 2018, 54(15): 78-83.
|
[6] |
LIU Qilie, JIA Mengfang, CHEN Lin, FENG Zhiyu.
Routing protocol for urban vehicular ad hoc networks
[J]. Computer Engineering and Applications, 2017, 53(9): 121-126.
|
[7] |
JIA Yingying1,2, WANG Jun1,2, WANG Xiaoxuan1,2, ZHANG Xin1,2.
Analysis of multicast routing protocols in wireless sensor networks
[J]. Computer Engineering and Applications, 2017, 53(18): 32-38.
|
[8] |
LIU Lijun1,2, HUA Li1, ZHOU Aiping1.
Cognitive wireless Ad Hoc network routing algorithm based on interference constraints and energy-efficient
[J]. Computer Engineering and Applications, 2017, 53(17): 112-116.
|
[9] |
QIAO Ping’an, ZHOU Min, LIU Yunshuang.
Research of new clustering algorithm based on Ad Hoc networks
[J]. Computer Engineering and Applications, 2017, 53(13): 129-133.
|
[10] |
ZHANG Fei1, WEI Yingjun2.
Car Ad Hoc network communication protocol with multi-link sensing
[J]. Computer Engineering and Applications, 2016, 52(8): 102-105.
|
[11] |
FENG Huifang, WANG Rui.
Connectivity analysis for vehicular ad hoc networks in fading channels
[J]. Computer Engineering and Applications, 2016, 52(18): 133-138.
|
[12] |
ZHANG Gang, SHI Runhua, ZHONG Hong.
Anonymous authentication scheme based on identity in VANET
[J]. Computer Engineering and Applications, 2016, 52(17): 101-106.
|
[13] |
TONG Ning1, HUN Jiexu2, YANG Qi1, JIA Huimin1.
3D-Ad hoc network routing algorithm based on hypercube cluster
[J]. Computer Engineering and Applications, 2016, 52(15): 135-140.
|
[14] |
YANG Bo1,2, WANG Shan1, SHI Xinxin1.
Vehicle-speed-and-network-status-sensing based backoff algorithm for vehicular netwok access
[J]. Computer Engineering and Applications, 2016, 52(14): 105-109.
|
[15] |
CUI Miao1,2, LI Lan2, ZHANG Guangchi1.
PHY/MAC combination simulation research of MIMO MAC protocol
[J]. Computer Engineering and Applications, 2015, 51(14): 84-88.
|