Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 325-328.
• Network & Communication • Previous Articles Next Articles
LIU Chun-ling, SHI Yu-xin, ZHANG Ran
CLC Number:
[1]孟强勇,王丽欣.TTNT数据链研究[J].飞航导弹,2014,7(14):76-81. [2]梁炎.网络中心战的实施与应用分析[M].北京:国防工业出版社,2011. [3]冯拓宇,刘春义.数据链的发展与网络中心战[J].飞航导弹,2012,4(2):41-45. [4]周鹏.美军数据链发展研究[J].物联网技术,2015,5(6):38-39. [5]姜思晓,房红征.数据链组网与数据传输仿真技术[J].计算机测量与控制,2016,24(6):278-281. [6]程永茂,陈望达,刘皞.弹载数据链技术应用及其发展趋势[J].飞航导弹,2011,12(19):29-33. [7]张翼麟,文苏丽,陈英硕.导弹协同作战的自组织网络技术发展[J].飞航导弹,2015(4):69-72. [8]王海涛,田畅,郑少仁.一种新型的Ad Hoc网络分簇算法及其性能仿真[J].系统仿真学报,2003,15(2):193-197. [9]WANG H,CHEN H,SONG L.Improved AOW clustering algorithms for wireless self-organized network and performance analysis[C]∥Cross Strait Quad-Regional Radio Science and Wireless Technology Conference.IEEE,2012:142-146. [10]唐夲,刘改霞,钟汶娟.移动adhoc网络多参数加权分簇算法[J].重庆大学学报,2014,37(2):106-112. [11]MUTHURAMALINGAM S,RAJARAM R,PETHAPERUMAL K.A Dynamic Clustering Algorithm for MANETs by modifying Weighted Clustering Algorithm with Mobility Prediction[C]∥International Journal of Computer and Electrical Engineering.2010(2):709-714. [12]沈永增,贾莲莲,陈宣扬.基于Truetime的无线网络仿真模型研究[J].机电工程,2011,28(7):855-858. [13]COLANDAIRAJ J,SCANLON W,IRWIN G.Understanding wireless networked control systems through simulation[J].Computing & Control Engineering,2005,16(2):26-31. [14]WANG H,YAN B,ZHOU X,et al.Route Simulation Research of Wireless Sensor Networks Based on Truetime[C]∥IEEE Circuits and Systems International Conference on Testing and Diagnosis.IEEE,2009:1-4. [15]CARDOSO A,SANTOS S,SANTOS A,et al.Simulation platform for Wireless Sensor Networks based on the TrueTime toolbox[C]∥Industrial Electronics,2009.IEEE,2009:2115-2120. |
[1] | YAN Zhen, TIAN Yi, DUAN Zhi-guo, YU Zhen-Jiang, WANG Yu and ZHA Fan. Optimization and Design of PTN Network Security Structure [J]. Computer Science, 2020, 47(6A): 409-412. |
[2] | XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225. |
[3] | ZHOU Jian-xin, ZHANG Zhi-peng, ZHOU Ning. Load Balancing Technology of Segment Routing Based on CKSP [J]. Computer Science, 2020, 47(4): 256-261. |
[4] | WEI De-bin,YANG Peng,YANG Li,SHI Huai-feng. Virtual Network Function Fast Mapping Algorithm over Satellite Network [J]. Computer Science, 2020, 47(3): 248-254. |
[5] | SHI Jun-ling,WANG Xing-wei,HUANG Min. Content-centric Routing Scheme in Vehicular Social Networks [J]. Computer Science, 2019, 46(7): 50-55. |
[6] | YANG Ren-yu, HAN Yi-gang, ZHANG Fan, FENG Fei. Survey of Content Centric Network Based on SDN [J]. Computer Science, 2019, 46(1): 13-20. |
[7] | ZHU Yu-jian, MA Jun-ming, AN Bo, CAO Dong-gang. Linux Container Cluster Networking Approach for Multiple Tenants [J]. Computer Science, 2018, 45(9): 46-51. |
[8] | LUO Jian-zhen,CAI Jun ,LIU Yan,ZHAO Hui-min. Caching and Replacing Strategy in Information-centric Network Based on Content Popularity and Community Importance [J]. Computer Science, 2018, 45(7): 116-121. |
[9] | CHENG Xiao, DONG Chao, CHEN Gui-hai, WANG Wei-jun, DAI Hai-peng. Communication and Networking Techniques for Formation Control in UAV Ad Hoc Networks [J]. Computer Science, 2018, 45(11): 1-12. |
[10] | WU Qi, WANG Xing-wei, HUANG Min. OpenFlow Switch Packets Pipeline Processing Mechanism Based on SDN [J]. Computer Science, 2018, 45(10): 295-299. |
[11] | QIN Kuang-yu, HUANG Chuan-he, LIU Ke-wei, SHI Jiao-li and CHEN Xi. Multipath Routing Algorithm in Software Defined Networking Based on Multipath Broadcast Tree [J]. Computer Science, 2018, 45(1): 211-215. |
[12] | HE Lu-bei, LI Jun-nan, YANG Xiang-rui and SUN Zhi-gang. RESSP:An FPGA-based REconfigurable SDN Switching Architecture [J]. Computer Science, 2018, 45(1): 205-210. |
[13] | SHI Shao-ping, ZHUANG Lei and YANG Si-jin. SDN Optimization Algorithm Based on Prediction and Dynamic Load Factor [J]. Computer Science, 2017, 44(1): 123-127. |
[14] | FANG Xin-wei, CHEN Shu-qiao, REN Ze-rong and JIANG Yi-ming. Collaborative Caching Algorithm Based on Node Similarity in Content Centric Networking [J]. Computer Science, 2016, 43(4): 81-85. |
[15] | NIU Wen-sheng, LI Ya-hui and GUO Peng. Authentication Protocol for Cooperation of Unmanned Vehicles [J]. Computer Science, 2016, 43(1): 178-180. |
|