[1] |
Qing YE, Xin SHI, Mengwei SUN, Jian ZHU.
Greedy synchronization topology algorithm based on formal concept analysis for traffic surveillance based sensor network
[J]. Journal of Computer Applications, 2023, 43(3): 869-875.
|
[2] |
LI Xujuan, PI Jianyong, HUANG Feixiang, JIA Haipeng.
Self-generated deep neural network based 4D trajectory prediction
[J]. Journal of Computer Applications, 2021, 41(5): 1492-1499.
|
[3] |
XU Guangxian, WANG Dong.
Secure network coding scheme based on chaotic encryption against wiretapping
[J]. Journal of Computer Applications, 2019, 39(5): 1374-1377.
|
[4] |
XIN Yingying, LIU Xiaojuan, FANG Chunlin, LUO Huan.
Optimization of data retransmission algorithm in information centric networking
[J]. Journal of Computer Applications, 2019, 39(3): 829-833.
|
[5] |
CUI Huali, SUN Qindong, ZHANG Xingjun, WU Weiguo.
Overview of network coding for video streaming
[J]. Journal of Computer Applications, 2018, 38(4): 1084-1088.
|
[6] |
XU Guangxian, ZHAO Yue, LAI Junning.
Deterministic layered construction algorithm based on network coding
[J]. Journal of Computer Applications, 2018, 38(3): 769-775.
|
[7] |
XU Lijie.
Broadcasting energy-efficiency optimization algorithms for asymmetric duty-cycled sensor network
[J]. Journal of Computer Applications, 2018, 38(11): 3275-3281.
|
[8] |
GAO Fengyue, WANG Yan, LI Mu, YU Rui.
Joint channel non-coherent network coded modulation method
[J]. Journal of Computer Applications, 2018, 38(10): 2955-2959.
|
[9] |
XU Tongwei, HE Qing, WU Yile, GU Haixia.
Broadcast routing algorithm for WSN based on improved discrete fruit fly optimization algorithm
[J]. Journal of Computer Applications, 2017, 37(4): 965-969.
|
[10] |
ZHOU Kunxiao, ZHAO Hui, YUAN Huaqiang.
Multicast routing in cognitive radio networks: algorithms and protocols
[J]. Journal of Computer Applications, 2017, 37(2): 422-426.
|
[11] |
XU Shengwei, LIN Muqing.
Anonymous broadcast encryption based access control method for cloud storage
[J]. Journal of Computer Applications, 2017, 37(2): 473-482.
|
[12] |
YAO Yukun, LI Xiaoyong, REN Zhi, LIU Jiangbing.
High efficiency medium access control protocol based on cooperative network coding
[J]. Journal of Computer Applications, 2017, 37(10): 2748-2753.
|
[13] |
HAO Wei, YANG Xiaoyuan, WANG Xu'an, WU Liqiang.
Proxy re-encryption scheme based on conditional asymmetric cross-cryptosystem
[J]. Journal of Computer Applications, 2016, 36(9): 2452-2458.
|
[14] |
XU Zhexin, LI Shijie, LIN Xiao, WU Yi.
Power control mechanism for vehicle status message in VANET
[J]. Journal of Computer Applications, 2016, 36(8): 2175-2180.
|
[15] |
ZENG Xiaofei, LU Jianzhu, WANG Jie.
Broadcast authentication using cooperative sensor nodes
[J]. Journal of Computer Applications, 2016, 36(8): 2219-2224.
|