相似文献/References:
[1]沈武 王天芹 杨帅.基于门限完全分布式密钥管理方案[J].计算机技术与发展,2010,(02):175.
SHEN Wu,WANG Tian-qin,YANG Shuai.Fully- Distributed Key Management Scheme Based on Threshold[J].,2010,(06):175.
[2]邵星 王汝传 徐小龙.一种基于Agent的Ad hoc网络路由算法[J].计算机技术与发展,2010,(04):21.
SHAO Xing,WANG Ru-chuan,XU Xiao-long.A Kind of Agent- Based Network Routing Algorithm for Ad hoc Networks[J].,2010,(06):21.
[3]常莉 吴蒙 王立.Ad hoc网络中能量有效路由协议的性能研究[J].计算机技术与发展,2010,(04):47.
CHANG Li,WU Meng,WANG Li.Investigating Performance of Energy Efficient Routing Protocols for Ad- hoc Networks[J].,2010,(06):47.
[4]张登银 吴品.Adhoc网络路由协议性能仿真分析[J].计算机技术与发展,2009,(07):66.
ZHANG Deng-yin,WU Pin.Simulation and Analysis of Routing Protocols for Ad hoc Network[J].,2009,(06):66.
[5]何晖 于勇 侯迪 齐勇.一种具有移动特征的ad hoc网络电源感知路由协议[J].计算机技术与发展,2009,(08):11.
HE Hui,YU Yong,HOU Di,et al.A Mobility Based Battery Aware Routing Protocol for ad hoc Networks[J].,2009,(06):11.
[6]张登银 沈邵帅.Ad Hoc网络路由协议仿真分析[J].计算机技术与发展,2009,(08):23.
ZHANG Deng-yin,SI-IEN Shao-shuai.Simulation Analysis for Routing Protocols in Ad Hoc Network[J].,2009,(06):23.
[7]黄骥 周继鹏.GLFR:一种新的基于地理位置信息AdHoc网络路由算法[J].计算机技术与发展,2009,(10):145.
HUANG ji ZHOU Ji-peng.A Novel Geographic Routing Applied in Ad Hoc Networks[J].,2009,(06):145.
[8]何昆鹏 李腊元.Ad Hoc网络中按需路由协议的仿真与性能分析[J].计算机技术与发展,2008,(03):81.
HE Kun-peng,LI La-yulan.Simulation and Performance Analysis of on-Demand Routing Protocol in Ad Hoc Networks[J].,2008,(06):81.
[9]董明忠 杨明华 宗容 黄铭.一种Ad Hoc网络的MAC层分层节量控制机制[J].计算机技术与发展,2007,(08):173.
DONG Ming-zhong,YANG Ming-hua,ZONG Rong,et al.An MAC Stratified Energy Control Mechanism on Ad Hoc Network[J].,2007,(06):173.
[10]刘卫彪 张修如 朱光辉.一种基于节点位置信息的Ad Hoc网络路由算法[J].计算机技术与发展,2007,(10):158.
LIU Wei-biao,ZHANG Xiu-ru,ZHU Guang-hui.A Position- Based DSR Algorithm for Ad Hoc Networks[J].,2007,(06):158.
[11]李金鹏 吕光宏 王立平 薛强.移动Adhoc网络安全路由协议研究[J].计算机技术与发展,2008,(07):24.
LI Jin-peng,LUE Guang-hong,WANG Li-ping,et al.Research of Secure Routing Protocols for Mobile Ad hoc Networks[J].,2008,(06):24.
[12]冯雪玲 于炯 马俊 曹宏庆.基于簇结构的移动Ad Hoc网络的认证协议[J].计算机技术与发展,2008,(09):127.
FENG Xue-ling,YU Jiong,MA Jun,et al.Authentication Protocol in Hierarchical - Cluster - Based Mobile Ad Hoc Networks[J].,2008,(06):127.
[13]黄烟波 胡波 周忠华.簇技术在移动Adhoc网络入侵检测中的应用研究[J].计算机技术与发展,2007,(04):113.
HUANG Yan-bo,HU Bo,ZHOU Zhong-hua.Application and Research of Cluster Technology in Intrusion Detection of Mobile Ad hoc Networks[J].,2007,(06):113.
[14]韩萍 禹继国 王光辉.MANET中能量有效的分布式拓扑管理算法[J].计算机技术与发展,2012,(01):129.
HAN Ping,YU Ji-guo,WANG Guang-hui.A Distributed Energy-Efficient Topology Management Algorithm in MANET[J].,2012,(06):129.