Research on Heuristic Network Coding Protocol for Multi-hop Wireless Networks (Unknown)
- New search for: Li, Y.-w.
- New search for: Tao, W.
- New search for: Li, Y.-w.
- New search for: Tao, W.
In:
MINIMICRO SYSTEMS -SHENYANG-
;
34
, 6
;
1248-1252
;
2013
-
ISSN:
- Article (Journal) / Print
-
Title:Research on Heuristic Network Coding Protocol for Multi-hop Wireless Networks
-
Contributors:
-
Published in:MINIMICRO SYSTEMS -SHENYANG- ; 34, 6 ; 1248-1252
-
Publisher:
- New search for: GAI-KAN BIAJIBU
-
Publication date:2013-01-01
-
Size:5 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:Unknown
- New search for: 004.16
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 004.16 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 34, Issue 6
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1201
-
Key Nodes Behavior Analysis Based on Complex Software Execution NetworkZhang, X.-z. / Zhao, G.-l. / Lv, T.-y. et al. | 2013
- 1206
-
An Energy-aware Multi-path Routing Mechanism for Industrial Wireless NetworksYi, X.-s. / Wang, X.-w. / Zhang, D.-k. et al. | 2013
- 1212
-
A Data Aggregation Algorithm for Delay Tolerant NetworksWang, Y. / Xiao, M.-j. et al. | 2013
- 1216
-
QAM Resource Allocation Algorithm Based on Utility Max-min FairnessWang, H.-l. / Ni, H. / Sun, P. et al. | 2013
- 1221
-
Structured Addressing Scheme in Dense Distributed Sensor NetworksXiong, W.-x. / Xue, K.-p. / Hong, P.-l. et al. | 2013
- 1226
-
Spectrum Allocation Algorithm Based on Constraint Operator of Binary Particle Swarm in the Congnitive Wireless NetworksZhang, L.-y. / Zeng, Z.-w. / Chen, Z.-g. et al. | 2013
- 1230
-
Energy Efficient Query Processing Techniques Based on Particle Filters in Wireless Sensor NetworksHan, Q.-t. / Zheng, J.-p. / Zhang, H. et al. | 2013
- 1237
-
SWALLOW: A Stable WLAN Area Localization SystemYi, F.-t. / Huang, L.-s. / Liu, G. et al. | 2013
- 1242
-
Network Traffic Anomaly Detection Based on Semi-supervised Combination ModelXu, Q. / Cheng, D.-n. et al. | 2013
- 1248
-
Research on Heuristic Network Coding Protocol for Multi-hop Wireless NetworksLi, Y.-w. / Tao, W. et al. | 2013
- 1253
-
Research on Fault-tolerate Scheduling Algorithm to Real-time Periodic Tasks in Multiprocessor SystemsLi, J. / Guo, R.-f. / Shao, Z.-x. et al. | 2013
- 1257
-
Crossed Twisted Cube Interconnection Networks and Their PropertiesShi, S.-n. / Liang, J.-r. / He, G.-x. et al. | 2013
- 1261
-
A Novel Dynamic Source Authentication Scheme in MulticastWu, T. / Zheng, X.-f. / Bai, L.-z. et al. | 2013
- 1266
-
An Inter-cluster Cooperative Node Selection Scheme Based on Blind Channel EstimationZhong, X.-q. / Zhang, Q.-b. et al. | 2013
- 1270
-
A Method for Checking Consistency Between Domain Requirements and Business ProcessLiu, J.-d. / Shen, L.-w. et al. | 2013
- 1276
-
Utilizing Static Information Flow Analysis to Detect Logging Vulnerability in Android AppsPeng, Z.-j. / Zhang, Y. / Yang, M. et al. | 2013
- 1282
-
Design and Implementation of Real-time Resource Reservation Scheduling Algorithm in Virtualization EnvironmentWu, H. / Gu, Z.-h. et al. | 2013
- 1288
-
ZDC-tree: An Efficient Index Structure for Supporting Skyline Query on Data StreamsPeng, D.-l. / Yi, S.-j. et al. | 2013
- 1295
-
OBJ-D: An Object-centric Concurrency Bug Detection Framework for JavaWang, D. / Yang, M. / Zhou, X. et al. | 2013
- 1301
-
Role Engineering in Access ControlMa, X.-p. / Li, R.-x. / Hu, J.-w. et al. | 2013
- 1307
-
Using Code Caching and Reusing to Improve Efficiency of Android JIT ComplierZhou, B. / Zhang, Y. et al. | 2013
- 1313
-
Design and Implementation of Distributed File System Based on the Hash RuleDuan, H.-c. / Mei, M. / Li, L. et al. | 2013
- 1317
-
Optimization Mechanism for Distributed File System Based on Merging Control MessagesLiu, Y.-k. / Cai, T. et al. | 2013
- 1321
-
Research on Methods for Generating AOP Test Cases Based on Predicate Dynamic SlicingWang, B. / Chai, Y.-m. / Wang, L.-m. et al. | 2013
- 1328
-
Research on Algorithm of Tree Stream Classification Based on k-best Tree PatternJia, M.-j. / Wang, L.-m. et al. | 2013
- 1334
-
Schedulability Analysis for Fault-tolerant Real-time System Under Rollback Recovery ModelGuo, R.-f. / Liu, X. et al. | 2013
- 1339
-
Dynamic Clustering Algorithm in Uncertain Tree DatabaseGuo, X. / Yan, Y.-m. / Xu, H.-z. et al. | 2013
- 1344
-
Study on Framework-based Virtual Computing Environment and Key TechnologyZhang, Q. / Liang, H. et al. | 2013
- 1349
-
Lock-free Stack Algorithm Using Elimination TechnologyZhang, L.-f. / Yang, D.-s. / Qin, C.-g. et al. | 2013
- 1354
-
Study on Query of Heterogeneous Bipolarity Information in Possibilistic DatabasesZhao, F.-x. / Ma, Z.-m. et al. | 2013
- 1359
-
A Dataflow-like Driven Reconfigurable Manycore Stream ProcessorXu, M. / An, H. / Tang, X.-l. et al. | 2013
- 1365
-
A Reconfigurable Fault-tolerance Routing Algorithm of NoC Based on the Awareness of Status-on-neighborChen, Q.-q. / Luo, X.-g. / Chen, T. et al. | 2013
- 1371
-
Research Development of All Digital Delay-locked LoopsXu, T.-l. / Chen, J.-n. / Meng, J. et al. | 2013
- 1375
-
Finite Automaton Based Strategy for Automated Trust NegotiationLi, J.-l. / Liu, B. / Deng, X. et al. | 2013
- 1382
-
Provable Secure and Efficient Proxy Signature Scheme without Bilinear PairingsGu, K. / Jia, W.-j. / Li, C.-l. et al. | 2013
- 1387
-
A (l,m) - Diversity Model of Resisting the Associated Attack on Multi-sensitive AttributesLuo, F.-w. / Han, J.-m. / Lu, J.-f. et al. | 2013
- 1392
-
Rational Multi-secret SharingLi, J.-g. / Wang, F. / Li, Y.-q. et al. | 2013
- 1396
-
A Parallel Method for Isogeometric Analysis Using Computational Domain DecompositionGuo, L.-c. / Huang, Z.-j. / Gu, N.-j. et al. | 2013
- 1400
-
A Fast Algorithm for Near-duplicate Video DetectionLiu, D.-w. / Zhu, M. et al. | 2013
- 1405
-
Fusion Extraction Method of Gesture Contour Based on GVF Snake and Skin Color ModelTan, W.-j. / Yang, J.-z. / Song, X.-m. et al. | 2013
- 1409
-
Nearest Neighbor Algorithms for Packing Circles into a 2D ContainerXu, Z.-b. / You, Y. / Gong, S.-r. et al. | 2013
- 1413
-
A Color Image Segmentation Approach Based on Improved Spectral ClusteringQian, S.-j. / Peng, H.-j. / Liu, Y. et al. | 2013
- 1417
-
Study of Efficient Clustering Algorithm on Large GraphsWang, H.-c. / Ma, J. et al. | 2013
- 1424
-
Study of Data Hiding Method in Binary Images Acted on Block ParityWang, G.-c. / Wang, F. / Ke, F.-s. et al. | 2013
- 1428
-
Image Segmentation Based on Finite Mixture Models of Orthogonal Polynomial Using SamplingLiu, Z. / Song, Y.-q. et al. | 2013
- 1433
-
More Steps De-noising Method of Wavelet Coefficients DiffusionLiu, C.-h. / Feng, X.-c. et al. | 2013
- 1437
-
An New Method for Modifying Binary Discernibility Matrix and Computation of CoreRen, Q. / Luo, Y.-t. et al. | 2013
- 1441
-
Research in Learning from Demonstration Based on Cognitive Reasoning for Family Service RobotChen, S.-j. / Yin, D. / Zhang, R. et al. | 2013
- 1446
-
Research on an Improved Particle Filter Algorithm Based on Adaptive Optimization MechanismYu, J.-x. / Tang, Y.-l. / Xu, J.-m. et al. | 2013
- 1451
-
Speech Emotion Feature Based on Acoustic Context Extraction and AnalysisBai, L.-j. / Zhao, X.-l. et al. | 2013