Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (11): 3196-3200.DOI: 10.11772/j.issn.1001-9081.2014.11.3196
• Network and communications • Previous Articles Next Articles
LIU Tao1,2,LI Tianrui2,YIN Feng1,ZHANG Nan1
Received:
2014-06-03
Revised:
2014-07-17
Online:
2014-11-01
Published:
2014-12-01
Contact:
LIU Tao
通讯作者:
刘韬
作者简介:
基金资助:
中国博士后基金资助项目;中央高校基本科研业务费专项资金资助项目;西南民族大学教改项目
CLC Number:
LIU Tao LI Tianrui YIN Feng ZHANG Nan. Medium access control protocol with network utility maximization and collision avoidance for wireless sensor networks[J]. Journal of Computer Applications, 2014, 34(11): 3196-3200.
刘韬 李天瑞 殷锋 张楠. 基于网络效用最大化与冲突避免的无线传感器网络MAC协议[J]. 计算机应用, 2014, 34(11): 3196-3200.
[1]YE W, HEIDEMANN J, ESTRIN D. An energy-efficient MAC protocol for wireless sensor networks [C]// INFOCOM 2002: Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE Press, 2002: 1567-1576. |
[1] | . Moving target defense decision-making algorithm based on multi-stage evolutionary signal game model [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | ZHU Yuna, ZHANG Yutao, YAN Shaoge, FAN Yudan, CHEN Hantuo. Protocol identification approach based on semi-supervised subspace clustering [J]. Journal of Computer Applications, 2021, 41(10): 2900-2904. |
[3] | XIAO Yuelei, DENG Xiaofan. Improvement and analysis of certificate-based wired local area network security association scheme [J]. Journal of Computer Applications, 2021, 41(7): 1970-1976. |
[4] | . Containerized virtual network embedding algorithm based on time-varying resources [J]. Journal of Computer Applications, 0, (): 0-0. |
[5] | DONG Wentao, LI Zhuo, CHEN Xin. Online short video content distribution strategy based on federated learning [J]. Journal of Computer Applications, 2021, 41(6): 1551-1556. |
[6] | GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan. Reverse hybrid access control scheme based on object attribute matching in cloud computing environment [J]. Journal of Computer Applications, 2021, 41(6): 1604-1610. |
[7] | WANG Yao, SUN Guozi. Oversampling method for intrusion detection based on clustering and instance hardness [J]. Journal of Computer Applications, 2021, 41(6): 1709-1714. |
[8] | DU Xinyu, WANG Huaqun. Dynamic group based effective identity authentication and key agreement scheme in LTE-A networks [J]. Journal of Computer Applications, 2021, 41(6): 1715-1722. |
[9] | ZHANG Quanlong, WANG Huaibin. Intrusion detection model based on combination of dilated convolution and gated recurrent unit [J]. Journal of Computer Applications, 2021, 41(5): 1372-1377. |
[10] | WANG Yijie, FAN Jiafei, WANG Chenyu. Two-stage task offloading strategy based on game theory in cloud-edge environment [J]. Journal of Computer Applications, 2021, 41(5): 1392-1398. |
[11] | GUO Shuai, SU Yang. Encrypted traffic classification method based on data stream [J]. Journal of Computer Applications, 2021, 41(5): 1386-1391. |
[12] | . Adversarial attack algorithm for deep learning interpretability [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | ZHU Yongjin, YIN Fei, DOU Longlong, WU Kun, ZHANG Zhiwei, QIAN Zhuzhong. Adaptive network transmission mechanism based on forward error correction [J]. Journal of Computer Applications, 2021, 41(3): 825-832. |
[14] | TANG Yanqiang, LI Chenghai, SONG Yafei. Network security situation prediction based on improved particle swarm optimization and extreme learning machine [J]. Journal of Computer Applications, 2021, 41(3): 768-773. |
[15] | . Looping web page mechanism based on deep tree structure [J]. Journal of Computer Applications, 0, (): 0-0. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||