Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (11): 3196-3200.DOI: 10.11772/j.issn.1001-9081.2014.11.3196
• Network and communications • Previous Articles Next Articles
LIU Tao1,2,LI Tianrui2,YIN Feng1,ZHANG Nan1
Received:
2014-06-03
Revised:
2014-07-17
Online:
2014-12-01
Published:
2014-11-01
Contact:
LIU Tao
刘韬1,2,李天瑞1,殷锋2,张楠2
通讯作者:
刘韬
作者简介:
基金资助:
中国博士后基金资助项目;中央高校基本科研业务费专项资金资助项目;西南民族大学教改项目
CLC Number:
LIU Tao LI Tianrui YIN Feng ZHANG Nan. Medium access control protocol with network utility maximization and collision avoidance for wireless sensor networks[J]. Journal of Computer Applications, 2014, 34(11): 3196-3200.
刘韬 李天瑞 殷锋 张楠. 基于网络效用最大化与冲突避免的无线传感器网络MAC协议[J]. 计算机应用, 2014, 34(11): 3196-3200.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.11.3196
[1]YE W, HEIDEMANN J, ESTRIN D. An energy-efficient MAC protocol for wireless sensor networks [C]// INFOCOM 2002: Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE Press, 2002: 1567-1576. |
[1] | Ming ZHANG, Le FU, Haifeng WANG. Relay control model for concurrent data flow in edge computing [J]. Journal of Computer Applications, 2024, 44(12): 3876-3883. |
[2] | Yixi LIU, Jun HE, Bo WU, Bingtong LIU, Ziyu LI. Survey of software security testing techniques in DevSecOps [J]. Journal of Computer Applications, 2024, 44(11): 3470-3478. |
[3] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
[4] | Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU. Coverage-guided fuzzing based on adaptive sensitive region mutation [J]. Journal of Computer Applications, 2024, 44(8): 2528-2535. |
[5] |
GENG Haijun, DONG Yun, HU Zhiguo, CHI Haotian, YANG Jing, YIN Xia.
Encrypted traffic classification method based on Attention-1DCNN-CE#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[6] | . Summary of network intrusion detection systems based on deep learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[7] | Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI. Multi-object cache side-channel attack detection model based on machine learning [J]. Journal of Computer Applications, 2024, 44(6): 1862-1871. |
[8] | Xiaoyan ZHAO, Wei HAN, Junna ZHANG, Peiyan YUAN. Collaborative offloading strategy in internet of vehicles based on asynchronous deep reinforcement learning [J]. Journal of Computer Applications, 2024, 44(5): 1501-1510. |
[9] | . Location privacy-preserving recommendation scheme based on federated graph neural network [J]. Journal of Computer Applications, 0, (): 0-0. |
[10] | Xiaoyan ZHAO, Yan KUANG, Menghan WANG, Peiyan YUAN. Device-to-device content sharing mechanism based on knowledge graph [J]. Journal of Computer Applications, 2024, 44(4): 995-1001. |
[11] | Xintong QIN, Zhengyu SONG, Tianwei HOU, Feiyue WANG, Xin SUN, Wei LI. Channel access and resource allocation algorithm for adaptive p-persistent mobile ad hoc network [J]. Journal of Computer Applications, 2024, 44(3): 863-868. |
[12] | XiangJun LI, Junhong WANG, Shilu WANG, Jinxia CHEN, Jitao SUN, Jianhui WANG. Malicious traffic detection method based on multi-model parallel fusion network [J]. Journal of Computer Applications, 2023, 43(S2): 122-129. |
[13] | Kai FENG, Jiande LI, Zhangjian JI. Approximate evaluation method of k-ary (n-1)-cube subnetwork reliability [J]. Journal of Computer Applications, 2023, 43(12): 3875-3881. |
[14] | Yongjin HUANG, Yifang QIN, Xu ZHOU, Xinqing ZHANG. Routing lookup algorithm with variable-length address based on AVL tree and Bloom filter [J]. Journal of Computer Applications, 2023, 43(12): 3882-3889. |
[15] | . Device-to-device content sharing mechanism based on knowledge graph [J]. Journal of Computer Applications, 0, (): 0-0. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||