[1] |
WU Jun, MO Weiwei, YIN Xinqi, BAI Guangwei.
Research on opportunitstic routing incentive mechanism based on repeated game in WMNs
[J]. Computer Engineering and Applications, 2018, 54(10): 110-114.
|
[2] |
WU Jun, MO Weiwei, YIN Xinqi, BAI Guangwei.
Trusted opportunistic routing forwarding model based on feedback credibility
[J]. Computer Engineering and Applications, 2017, 53(8): 23-28.
|
[3] |
LIAO Junguo, TAN Yongzhou.
Bilateral authentication and key agreement protocol based on lightweight CA for wireless mesh networks
[J]. Computer Engineering and Applications, 2016, 52(1): 95-99.
|
[4] |
ZHANG Shuling, ZHU Quan, ZOU Fumin, CHEN Yu.
Research on WMN routing protocol for wireless broadband coverage of traffic trunk
[J]. Computer Engineering and Applications, 2015, 51(9): 111-116.
|
[5] |
JIANG Lalin, LI Qiqin, XIONG Bing.
Research on interference-aware routing metric
[J]. Computer Engineering and Applications, 2013, 49(21): 90-94.
|
[6] |
LIU Tingting1, YANG Wei1, WANG Yuzhu2.
Performance evaluation of P2P video streaming in wireless mesh networks
[J]. Computer Engineering and Applications, 2013, 49(16): 71-76.
|
[7] |
HUANG Bo1, ZHANG Xiaomin1, ZHAI Linbo2.
Hidden station detection in IEEE802.11 infrastructure network
[J]. Computer Engineering and Applications, 2012, 48(32): 72-75.
|
[8] |
WU Zhigang, SU Anjie, HAN Kai.
Optimal algorithm for downloading in heterogeneous Wireless Mesh Network
[J]. Computer Engineering and Applications, 2012, 48(24): 95-100.
|
[9] |
LAN Yu, WU Weidong.
Routing and topology optimization in wireless mesh network
[J]. Computer Engineering and Applications, 2012, 48(15): 78-82.
|
[10] |
LIU Fang1, CAI Yongquan2, WANG Chaoxiang1, YAN Chuping1.
Research of traverse and application of Merkle authentication-
tree
[J]. Computer Engineering and Applications, 2012, 48(14): 98-101.
|
[11] |
YANG Chunde1,DING Yanan2,ZHANG Jing3,ZHOU Jun4,HU Jinlong3,4.
Scheduling algorithm providing QoS guarantee in IEEE 802.16 Mesh mod
[J]. Computer Engineering and Applications, 2011, 47(33): 88-90.
|
[12] |
WANG Qi,WANG Ze.
IBS applies to wireless Mesh network access applications
[J]. Computer Engineering and Applications, 2011, 47(3): 78-81.
|
[13] |
LI Hesong,LENG Supeng.
Novel multi-channel MAC protocol for wireless mesh networks
[J]. Computer Engineering and Applications, 2011, 47(26): 66-69.
|
[14] |
ZHANG Mu1,YAN Junrong2.
Research on 802.11s RM-AODV path selection protocol
[J]. Computer Engineering and Applications, 2011, 47(21): 109-111.
|
[15] |
XIE Guifang1,2,DUAN Sheng2,LUO Yuling2.
Research on channel allocation in wireless mesh network
[J]. Computer Engineering and Applications, 2011, 47(18): 85-87.
|