[1] |
MA Hua, CHEN Yuepeng, TANG Wensheng, LOU Xiaoping, HUANG Zhuoxuan.
Survey of research progress on crowdsourcing task assignment for evaluation of workers’ ability
[J]. Journal of Computer Applications, 2021, 41(8): 2232-2241.
|
[2] |
SUN Huan, CHEN Hongbin.
Node redeployment strategy based on firefly algorithm for wireless sensor network
[J]. Journal of Computer Applications, 2021, 41(2): 492-497.
|
[3] |
HU Runyan, LI Cuiran.
Clustering algorithm of energy harvesting wireless sensor network based on fuzzy control
[J]. Journal of Computer Applications, 2020, 40(9): 2691-2697.
|
[4] |
HAN Yulao, FANG Dingyi.
Lightweight coverage hole detection algorithm based on relative position of link intersections
[J]. Journal of Computer Applications, 2020, 40(9): 2698-2705.
|
[5] |
LU Guangyue, ZHOU Liang, LYU Shaoqing, SHI Cong, SU Keke.
Outlier node detection algorithm in wireless sensor networks based ongraph signal processing
[J]. Journal of Computer Applications, 2020, 40(3): 783-787.
|
[6] |
ZHANG Zhengwan, ZHANG Chunjiong, LI Hongbing, XIE Tao.
Multipath transmission selection algorithm based on immune connectivity model
[J]. Journal of Computer Applications, 2020, 40(12): 3571-3577.
|
[7] |
REN Xiuli, CHEN Yang.
Routing protocol optimized for data transmission delay in wireless sensor networks
[J]. Journal of Computer Applications, 2020, 40(1): 196-201.
|
[8] |
DONG Fazhi, DING Hongwei, YANG Zhijun, XIONG Chengbiao, ZHANG Yingjie.
WSN clustering routing algorithm based on genetic algorithm and fuzzy C-means clustering
[J]. Journal of Computer Applications, 2019, 39(8): 2359-2365.
|
[9] |
XIAO Kai, WANG Meng, TANG Xinyu, JIANG Tonghai.
Public welfare time bank system based on blockchain technology
[J]. Journal of Computer Applications, 2019, 39(7): 2156-2161.
|
[10] |
HE Qing, XU Qinshuai, WEI Kangyuan.
Enhanced sine cosine algorithm based node deployment optimization of wireless sensor network
[J]. Journal of Computer Applications, 2019, 39(7): 2035-2043.
|
[11] |
HAN Si, ZHENG Baokun, CAO Qimin.
Logical key hierarchy plus based key management program for wireless sensor network
[J]. Journal of Computer Applications, 2019, 39(5): 1378-1384.
|
[12] |
QIAN Kaiguo, BU Chunfen, WANG Yujian, SHEN Shikai.
Reliable beacon-based and density-aware distance localization algorithm for wireless sensor network
[J]. Journal of Computer Applications, 2019, 39(3): 817-823.
|
[13] |
REN Xiaokui, LI Feng, CHENG Lin.
Improved centroid localization algorithm based on dynamic loss factor and weight
[J]. Journal of Computer Applications, 2019, 39(3): 824-828.
|
[14] |
LUO Xiaofeng, YANG Xingchun, HU Yong.
Improved decision diagram for attribute-based access control policy evaluation and management
[J]. Journal of Computer Applications, 2019, 39(12): 3569-3574.
|
[15] |
CAO Zhenhuan, CAI Xiaohai, GU Menghe, GU Xiaozhuo, LI Xiaowei.
Android permission management and control scheme based on access control list mechanism
[J]. Journal of Computer Applications, 2019, 39(11): 3316-3322.
|