[1]
LELAND W E, TAQQU M S, WILLINGER W, et al. On the selfsimilar nature of Ethernet traffic:extended version[J]. IEEE/ACM Transactions on Networking, 1994, 2(1): 1-15.
[2]
LAZAROU G Y, BACA JULIE, FROSTV S, et al. Describing network traffic using the index of variability[J]. IEEE /ACM Transactions on Networking, 2009, 17(5): 1672-1683.
[3]
GOEL S, NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communication, 2008, 7(6): 2180-2189.
[4]
ZHENG G, CHOO L, WONG K. Optimal cooperative jamming to enhance physical layer security using relays[J]. IEEE Transactions on Signal Processing, 2011, 59(3): 1317-1322.
[5]
BISNIK N, ABOUZEID A, ISLER A. Stochastic event capture using mobile sensors subject to a quality metric[J]. IEEE Transactions on Robotics, 2007, 23(4): 676-692.
[6]
孙佩刚, 赵海, 罗玎玎, 等. 无线传感器网络链路通信质量测量研究[J]. 通信学报, 2007, 28(10): 14-22.
[7]
COUTO D, AGUAYO D, CHAMBERS B A, et al. Performance of multihop wireless networks: shortest path is not enough[J]. ACM SIGCOMM Computer Communication Review, 2003, 33(1): 83-88.
[8]
舒坚, 刘琳岚, 樊佑磊, 等. 无感知分组丢失下的无线传感器网络链路质量评估模型[J]. 通信学报, 2011, 32(4): 103-111.
[9]
李国华, 李建中, 高宏. ε近似和加权公平性保证的无线传感器网络拥塞控制算法[J]. 计算机学报, 2011, 34(11): 2197-2210.
[10]
ZHANG Y, XU P, ZHANG Z, et al. Comments on throughput analysis of IEEE 802.15.4 slotted CSMA/CA considering timeout period[J]. IEEE Electronics Letters, 2006, 42(19): 1127-1128.
[11]
RAMACHANDRAN I, DAS A K,ROY S. Analysis of the contention access period of IEEE 802.15.4 MAC[J]. ACM Transactions on Sensor Networks, 2007, 3(1): 70-77.
[12]
PARK T R, KIM T H, CHOI J Y, et al. Throughput and energy consumption analysis of IEEE 802.15.4 slotted CSMA/ CA [J]. Electronics Letters, 2005, 41(18): 1017-1019.
[13]
ZHAI H Q, CHEN X, FANG Y G. Improving transport layer performance in multihop Ad Hoc networks by exploiting MAC layer information[J]. IEEE Transactions on Wireless Communication, 2007, 6(5): 1692-1701.
[14]
NG P C, LIEW S C. Throughput analysis of IEEE 802.11 multihop Ad Hoc networks[J]. IEEE Transactions on Networking, 2007, 15(2): 309-322.
[15]
LI XIANGYANG. Multicast capacity of wireless Ad Hoc networks[J]. IEEE/ACM Transactions on Networking, 2009, 17(3): 950-962.
[16]
龙图景, 孙政顺, 李春文, 等. 一种新的网络业务流的多重分形小波模型[J]. 计算机学报, 2004, 27(8): 1074-1082.
[17]
ROECKER J A. A class of near optimal JPDA algorithm[J]. IEEE Transactions on Aerospace and Electronic Systems, 1994, 30(2): 504-510.
[18]
CHALLA S, EVANS R J, WANG X, et al. A fixed lag smoothing solution to outofsequence information fusion problems[J]. Communications in Information and Systems, 2002, 2(4): 325-348.
[19]
HE X, YENER A. Cooperation with an untrusted relay: A secrecy perspective[J]. IEEE Transactions on Information Theory, 2010, 56(8): 3807-3827. |