[1] Wang N C,Lee C Y.A multi-path QoS multicast routing protocol with slot assignment for mobile ad hoc networks[J].Information Sciences,2012,208(11):1-13.
[2] Kim J,Jung J,Lim J.A Reliable Multicast MAC Protocol Based on Spread Spectrum Technique in Wireless Ad Hoc Networks[M].Grid and Distributed Computing.Springer Berlin Heidelberg,2011.202-212.
[3] Mendes L D P,JPC Rodrigues J.A survey on cross-layer solutions for wireless sensor networks[J].Journal of Network and Computer Applications,2011,34(2):523-534.
[4] Wei Liang,Haibin Yu,Chang Che.An adaptive probability access mechanism for wireless sensor network[A].Eighth ACIS International Conference on Software Engineering,Artificial Intelligence,Networking,and Parallel/Distributed Computing[C].Washington DC :IEEE Computer Soc,2007.1040-1045.
[5] Zhen hua Wu,Yu Hen Hu.How many wireless resources are needed to resolve the hidden terminal problem?[J].Computer Networks,2013,57(18):3987-3996.
[6] PM Ruiz,AF Gomez-Skarmeta.Approximating optimal multicast trees in wireless multihop networks[A].The 10th IEEE Symposium on Computers and Communications[C].Washington DC :IEEE Computer Soc,2005.686-691.
[7] Uyen Trang Nguyen.On multicast routing in wireless mesh networks[J].Computer Communications,2008,31(7):1385-1399.
[8] Uyen Trang Nguyen,Jin Xu.Multicast routing in wireless mesh networks:Minimum cost trees or shortest path trees?[J].IEEE Communications Magazine,2007,45(11):72-77.
[9] Hui Cheng,Sheng xiangYang.Genetic algorithms with immigrants schemes for dynamic multicast problems in mobile ad hoc networks[J].Engineering Applications of Artificial Intelligence,2010,23(5):806-819.
[10] Avid Avokh,Ghasem Mirjalily.Load-balanced multicast tree routing in multi channel multi radio wireless mesh networks using a new cost function[J].Wireless Pers Commun,2013,69(1):75-106.
[11] Jenn-Wei Lin,Jian-Yan Zhuang.A delay-constrained and priority-aware channel assignment algorithm for efficient multicast in wireless mesh networks[J].The Journal of Systems and Software,2013,86(3):789-800.
[12] Giuseppe Bianchi.Performance analysis of the IEEE 802.11 distributed coordination function[J].IEEE Journal on Selected Areas in Communications,2000,18(3):535-547.
[13] Jang B,Sichitiu M L.IEEE 802.11 saturation throughput analysis in the presence of hidden terminals[J].IEEE/ACM Transactions on Networking (TON),2012,20(2):557-570.
[14] Tsertou A,Laurenson D I.Revisiting the hidden terminal problem in a csma/ca wireless network[J].IEEE Transactions on Mobile Computing,2008,7(7):817-831.
[15] Ekici O,Yongacoglu A.IEEE 802.11a throughput performance with hidden nodes[J].IEEE Communications Letters,2008,12(6):465-467.
[16] Ng P C,Liew S C.Throughput analysis of IEEE 802.11 multi-hop ad hoc networks[J].IEEE/ACM Transactions on Networking (TON),2007,15(2):309-322.
[17] Wen Jin,Shuiping Chen,Hai Jiang.Finding the k shortest paths in a time-schedule network with constraints on arcs[J].Computers & Operations Research,2013,40(12):2975-2982.
[18] 汪鹏君,李辉,吴文晋,等.量子遗传算法在多输出Reed-Muller逻辑电路最佳极性搜索中的应用[J].电子学报,2010,38(5):1058-1063. Wang Peng-jun,Li Hui,et al.Application of quantum genetic algorithm in searching for best polarity of multi-output Reed-Muller logic circuits[J].Acta Electronica Sinica,2010,38(5):1058-1063.(in Chinese)
[19] Yufang Zhu,Thomas Kunz.MAODV implementation for ns-2.26[R].Systems and Computing Engineering,Carleton Uni- versity,2004.
[20] Valerio D,Vacirca F,De Cicco L,et al.Optimizing carrier sensing in 802.11 multihop wireless networks[A].Proc of Med-Hoc-Net 2006[C].Lipari,Italy:University of Catania,2006.98-100. |