[1] |
wei wen.
Routing Algorithm Based on Density Clustering for Delay Tolerant Network
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(5): 0-0.
|
[2] |
BAI Yuan, AN Jie, ZHANG Hui-bing.
Prediction-Aided Routing Protocol in Ad hoc Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 29-33.
|
[3] |
WANG He-zhe, WANG Hui-qiang, ZHU Jin-mei, FENG Guang-sheng, LÜ Hong-wu.
OCIGM:an Optimized Control Information Generation Method for DTN Routing
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(1): 79-83.
|
[4] |
ZHU Li-cai, WANG Ru-chuan, YANG Hao, SHA Chao.
An Energy-Efficient Multi-Path Data Distribution Mechanism Based on RPL
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(6): 82-87.
|
[5] |
LI Xu, BAO Jing-jing, LIU Ying.
Formation Security: Black Hole Problem
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 12-17.
|
[6] |
WANG Hui-qiang, ZHU Jin-mei, FENG Guang-sheng, LÜ Hong-wu.
SaW-Utility: a Spray and Wait Routing Protocol Based on the Utility of Nodes in DTN
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(4): 128-132.
|
[7] |
SUN Sheng-li, ZHENG Zhi-gao, WANG Ping, LIU Jing.
RTDP Network System Framework and Key Technologies
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 1-7.
|
[8] |
HUANG Hai-ping, WU Wan-feng, WANG Ru-chuan, LI Ling-juan.
Security Improvements for Secure Routing Protocol SEAD Using Re-generative Hash Key Chain
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(4): 99-103.
|
[9] |
.
A Tree-Based Cognitive Radio Routing Protocol in Ad Hoc Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(1): 85-89.
|
[10] |
.
Implement Congestion Avoidance in WSN Using Path Priority
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(1): 15-18.
|
[11] |
Xiang-Xi Wen Xiang-Ru Meng.
Network Health Evaluation Based on SVM and Cloud Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(1): 10-14.
|
[12] |
.
Applications of Function Summary in Concolic Testing
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(1): 24-27.
|
[13] |
.
A Survey of Ubiquitous Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(5): 1-6.
|
[14] |
YU Wang-ke; MA Wen-ping; YAN Ya-jun; YANG Yuan-yuan.
Constructing Secure Routing Protocol Using Trust Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(3): 48-51.
|
[15] |
WANG Huan-zhao MEI Tao JI Kai MENG Fan-zhi.
Low Overhead Routing Mechanism Based on Unidirectional Links for Ad Hoc Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(2): 111-115.
|