[1] |
SHENG Jianhui, FAN Yinting, XIA Minjie.
Physical Layer Security Performance Analysis for Wireless Sensor Network
[J]. Computer Engineering and Applications, 2021, 57(8): 91-95.
|
[2] |
GONG Junhui, HU Xiaohui, DU Yongwen.
Research on Selection of Optimal Defense Strategy Based on Evolutionary Game
[J]. Computer Engineering and Applications, 2021, 57(13): 116-123.
|
[3] |
LI Hong, ZHU Xuan, LIU Yunfei, LI Junhui.
Improved TORA Protocol with Low Overhead and Load Balancing
[J]. Computer Engineering and Applications, 2019, 55(11): 67-73.
|
[4] |
DU Yongwen, WANG Zhangmin, HU Xiaohui, XU Ning.
A Survey on Software-Defined Wireless Sensor Network
[J]. Computer Engineering and Applications, 2019, 55(1): 1-8.
|
[5] |
WEI Yu, SONG Tian.
Lightweight and robust data reduction algorithms for Wireless Sensor Network
[J]. Computer Engineering and Applications, 2018, 54(3): 100-108.
|
[6] |
QI Gang, ZHENG Lin.
Transmission protocol based on network coding for Wireless Sensor Networks of power lines system
[J]. Computer Engineering and Applications, 2018, 54(12): 86-92.
|
[7] |
LIU Qi, BAI Xiangyu.
DTN key management scheme for content delivery in remote area
[J]. Computer Engineering and Applications, 2018, 54(11): 81-85.
|
[8] |
ZHU Changju, WU Jiaxin, SONG Haisheng, YANG Hongwu.
Bounding-Box localization algorithm based on limit partition of estimated rectangle
[J]. Computer Engineering and Applications, 2017, 53(18): 84-88.
|
[9] |
SONG Haisheng, ZHU Changju, YANG Hongwu, WU Jiaxin.
Improvement of virtual anchor node strategy for Grid-Scan location algorithm
[J]. Computer Engineering and Applications, 2017, 53(16): 84-88.
|
[10] |
YANG Nan1, CHEN Yuanbo2, WANG Yanjie2, LI Qing2.
Multipath transmission protocol based on degree-constrained shortest path tree
[J]. Computer Engineering and Applications, 2017, 53(11): 126-130.
|
[11] |
GAO Guangyong1,2, YAO Shimao1,2, ZHOU Caixue1,2, CUI Zongmin1,2.
Reversible data hiding scheme for authentication of Wireless Sensor Network
[J]. Computer Engineering and Applications, 2017, 53(10): 124-131.
|
[12] |
JIANG Zhiying1, CHEN Yong2, HU Bing1, SUN Zhixin1.
Research on time synchronization algorithm for Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2017, 53(1): 1-8.
|
[13] |
DANG Xiaochao1,2, PU Shiqiang1, HAO Zhanjun1,2.
Node scheduling algorithm for three-dimensional wireless sensor network
[J]. Computer Engineering and Applications, 2016, 52(7): 117-121.
|
[14] |
FANG Wangsheng, LIU Xiaoxin.
Research of RSSI algorithm based on rank of matrix and chaos particle swarm optimization algorithm
[J]. Computer Engineering and Applications, 2016, 52(4): 74-78.
|
[15] |
LI Ming.
Novel two-party authenticated key agreement protocol in Wireless Sensor Network
[J]. Computer Engineering and Applications, 2016, 52(3): 100-102.
|