吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (01): 149-157.doi: 10.13229/j.cnki.jdxbgxb201401026
• paper • Previous Articles Next Articles
YANG Yong-jian, WANG En, DU Zhan-wei
CLC Number:
[1] Burleigh S, Hooke A, Torgerson L, et al. Delay tolerant networking: An approach to interplanetary internet[J]. IEEE Communications Magazine, 2003, 41(6):128-136.[2] Akyildiz I, Su W, Sankarasubramaniam Y, et al. A survey on sensor networks[J].IEEE Communications Magazine, 2002, 40(8):102-114.[3] Fall K. A delay-tolerant network architecture for challenged Internets[C]//Proc Conf Appl Technol Architecture Protocols For Computer Commun, Karlsruhe, Germany, 2003:27-34.[4] Cao Jian-nong, Zhang Yang, Xie Li. Consistency of cooperative caching in mobile peer-to-peer systems over MANET[J].International Journal of Parallel, Emergent and Distributed Systems, 2006, 21(3):151-168.[5] Fall K, Hong W, Madden S. Custody transfer for reliable delivery in delay tolerant networks[EB/OL].[2010-03-28]. http://www.dtnrg.org/papers/custody-xfer-tr.pdf.[6] 张文柱, 孙勇发, 王炫. 基于马尔科夫决策的容迟网络路由算法[J]. 西安电子科技大学学报, 2011, 38(2):18-22. Zhang Wen-zhu, Sun Yong-fa, Wang Xuan. Study of the DTN routing algorithm based on the Markov decision[J]. Journal of Xidian University, 2011, 38(2):18-22.[7] 邓甦, 李晓毅. 马尔科夫链在呼吸道传染病预测中的应用[J]. 中国卫生统计, 2011(6): 615-616. Deng Su, Li Xiao-yi. Markov chain in the prediction of respiratory infectious diseases[J]. Chinese Journal of Health Statistics, 2011 (6):615-616.[8] Krifa A, Baraka C, Spyropoulos T. Optimal buffer management policies for delay tolerant networks[C]//The 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, IEEE, 2008: 260-268.[9] 熊永平, 孙利民, 牛建伟. 机会网络[J]. 软件学报, 2009, 20(1):127-134. Xiong Yong-ping, Sun Li-min, Niu Jian-wei. Opportunistic networks[J]. Journal of Software, 2009, 20(1):127-134.[10] Ramanathan R, Hansen R, Basu P, et al. Prioritized epidemic routing for opportunistic networks[C]//International Conference on Mobile Systems, Applications and Services, Proceedings of the 1st International MobiSys Workshop on Mobile Opportunistic Networking, 2007, 11(11): 62-66.[11] Pawelczak P, Venkatesha Prasad R, Xia L, et al. Cognitive radio emergency networks -requirements and design[C]//New Frontiers in Dynamic Spectrum Access Networks, IEEE, 2005: 601-606.[12] Lindgren A, Phanse K S. Evaluation of queueing policies and forwarding strategies for routing in intermittently connected networks[C]//Communication System Software and Middleware, 2006: 1-10.[13] 王贵竹, 徐正欢, 李晓峰. DTN中依据报文质量的拥塞控制策略[J]. 计算机工程与应用, 2012, 48(9):74-77. Wang Gui-zhu, Xu Zheng-huan, Li Xiao-feng. Congestion control strategy based on quality of message in DTN[J]. Computer Engineering and Applications, 2012, 48(9):74-77.[14] John B, Brian G, David J. Maxprop:Routing for vehicle-based disruption-tolerant networks[C]//INFOCOM, 2006:1-11.[15] 刘期烈, 潘英俊. 延迟容忍网络中基于复制率的拥塞控制算法[J]. 北京邮电大学学报, 2010, 33(4): 88-92. Liu Qi-lie, Pan Ying-jun. Congestion control strategy based on copy rate in DTN[J]. Journal of Beijing University of Post and Telecommunications, 2010, 33(4): 88-92.[16] 陶勇, 龚正虎. DTN 拥塞控制研究进展[J]. 计算机应用研究, 2010, 27(10):3605-3611. Tao Yong, Gong Zheng-hu. Survey on congestion control for DTN[J].Application Research of Computers, 2010, 27(10): 3605-3611.[17] 刘席开, 刘桂开. 机会网络拥塞控制的研究[J]. 中南林业科技大学学报, 2012, 32(8):159-165. Liu Xi-kai, Liu Gui-kai. Study on congestion control for opportunistic network[J]. Journal of Central South University of Forestry & Technology, 2012, 32(8):159-165.[18] Broch J, Maltz D A, Johnson D B, et al. A performance comparison of multi-hop wireless ad hoc network routing protocols[C]//Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking, ACM, 1998: 85-97. |
[1] | LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850. |
[2] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
[3] | JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866. |
[4] | ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872. |
[5] | LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878. |
[6] | OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570. |
[7] | LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599. |
[8] | GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605. |
[9] | LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613. |
[10] | CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628. |
[11] | ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
[12] | HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
[13] | FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
[14] | CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
[15] | HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253. |
|