Computer Science ›› 2021, Vol. 48 ›› Issue (5): 254-262.doi: 10.11896/jsjkx.200700064
• Computer Network • Previous Articles Next Articles
XIA Si-yang, WU Qiong, NI Yuan-zhi, WU Gui-lu, LI Zheng-quan
CLC Number:
[1]MEI J,ZHENG K,ZHAO L,et al.Joint Radio Resource Allocation and Control for Vehicle Platooning in LTE-V2V Network[J].IEEE Transactions on Vehicular Technology,2018,67(12):12218-12230. [2]WANG R,WU J,YAN J.Resource Allocation for D2D-Enabled Communications in Vehicle Platooning[J].IEEE Access,2018,6:50526-50537. [3]MARZBANI H,KHAYYAM H,CHING N T,et al.Autonomous Vehicles:Autodriver Algorithm and Vehicle Dynamics[J].IEEE Transactions on Vehicular Technology,2019,68(4):3201-3211. [4]CHAE H,YI K.Virtual Target-Based Overtaking Decision,Motion Planning,and Control of Autonomous Vehicles[J].IEEE Access,2020,8:51363-51376. [5]HYUNG J K,JI H Y.Takeover Requests in Simulated Partially Autonomous Vehicles Considering Human Factors[J].IEEE Transactions on Human-Machine Systems,2017,47(5):735-740. [6]LIU B B,LIU W W,MAO X G,et al.Correctness Verification of Rules for Unmanned Vehicles' Decision System[J].Computer Science,2017,44(4):72-74,113. [7]OKUYAMA T,GONSALVES T,UPADHAY J.AutonomousDriving System based on Deep Q Learnig[C]//2018 International Conference on Intelligent Autonomous Systems (ICoIAS).2018:201-205. [8]XU W,ZHOU H,CHENG N,et al.Internetof vehicles in big data era[J].IEEE/CAA Journal of Automatica Sinica,2018,5(1):19-35. [9]WU Q,LIU H,WANG R,et al.Delay Sensitive TaskOffloading in the 802.11p Based Vehicular Fog Computing Systems[J].IEEE Internet of Things Journal,2020,7(1):773-785. [10]LIU Y,ZONG C,ZHANG D.Lateral control system for vehicle platoon considering vehicle dynamic characteristics[J].IET Intelligent Transport Systems,2019,13(9):1356-1364. [11]KIM H J,YANG J H.Takeover Requests in Simulated Partially Autonomous Vehicles Considering Human Factors[J].IEEE Transactions on Human-Machine Systems,2017,47(5):735-740. [12]NI Y,HE J,CAI L,et al.Data Uploading in Hybrid V2V/V2I Vehicular Networks:Modeling and Cooperative Strategy[J].IEEE Transactions on Vehicular Technology,2018,67(5):4602-4614. [13]HAN C,DIANATI M,TAFAZOLLI R,et al.Analytical Study of the IEEE 802.11p MAC Sublayer in Vehicular Networks[J].IEEE Transactions on Intelligent Transportation Systems,2012,13(2):873-886. [14]PENG H,LI D,YE Q,et al.Resource Allocation for Cellular-based Inter-Vehicle Communicationsin Autonomous Multiplatoons[J].IEEE Transactions on Vehicular Technology,2017,66(12):11249-11263. [15]LIU B,JIA D,LU K,et al.A Joint Control Communication Design for Reliable Vehicle Platooning in Hybrid Traffic[J].IEEE Transactions on Vehicular Technology,2017,66(10):9394-9409. [16]FENG Y,HE D,GUAN Y.Composite Platoon Trajectory Planning Strategy for Intersection Throughput Maximization[J].IEEE Transactions on Vehicular Technology,2019,68(7):6305-6319. [17]PENG H,LI D,ABBOUD K,et al.Performance Analysis ofIEEE 802.11p DCF for Multiplatooning Communications With Autonomous Vehicles[J].IEEE Transactions on Vehicular Technology,2017,66(3):2485-2498. [18]JIA D,LU K,WANG J.A Disturbance-Adaptive Design forVANET Enabled Vehicle Platoon[J].IEEE Transactions on Vehicular Technology,2014,63(2):527-539. [19]BIANCHI G.Performance Analysis of the IEEE 802.11 Distri-buted Coordination Function[J].IEEE Journal on Selected Areas in Communications,2000,18(3):535-547. [20]YAO Y,RAO L,LIU X.Performance and Reliability Analysis of IEEE 802.11p Safety Communication in a Highway Environment[J].IEEE Transactions on Vehicular Technology,2013,62(9):4198-4212. [21]XU K,TIPPER D,QIAN Y,et al.Time-Dependent Performance Analysis of IEEE 802.11p Vehicular Networks[J].IEEE Transactions on Vehicular Technology,2016,65(7):5637-5651. [22]ZHENG J,WU Q.Performance Modeling and Analysis of the IEEE802.11p EDCA Mechanism for VANET[J].IEEE Transactions on Vehicular Technology 2016,65(4):2673-2689. |
[1] | LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267. |
[2] | GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274. |
[3] | HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332. |
[4] | JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339. |
[5] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[6] | WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9. |
[7] | ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270. |
[8] | FEI Xing-rui, XIE Yi. Click Streams Recognition for Web Users Based on HMM-NN [J]. Computer Science, 2022, 49(7): 340-349. |
[9] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[10] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[11] | Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54. |
[12] | WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355. |
[13] | TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484. |
[14] | HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507. |
[15] | GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522. |
|