[1] Toor Y,Muhlethaler P,Laouiti A.Vehicle ad hoc networks:applications and related technical issues[J].Communications Surveys & Tutorials,IEEE,2008,10(3):74-88.
[2] Lin X,Lu R,Zhang C,et al.Security in vehicular ad hoc networks[J].Communications Magazine,IEEE,2008,46(4):88-95.
[3] Zeadally S,Hunt R,Chen Y S,et al.Vehicular ad hoc networks (VANETS):status,results,and challenges[J].Telecommunication Systems,2012,50(4):217-241.
[4] 张德干,戴文博,牛庆肖.基于局域世界的WSN拓扑加权演化模型[J].电子学报,2012,40(5):1000-1004. Zhang Degan,Dai Wenbo,Niu Qingxiao.Local-world weighted topology evolving model for wireless sensor networks[J].Acta Electronica Sinica,2012,40(5):1000-1004.(in Chinese)
[5] Otkovic' I I,Tollazzi T,Šraml M.Calibration of microsimulation traffic model using neural network approach[J].Expert Systems with Applications,2013,40(15):5965-5974.
[6] Siraj S,Gupta A,Badgujar R.Network simulation tools survey[J].International Journal of Advanced Research in Computer and Communication Engineering,2012,1(4):199-206.
[7] Wu Z,Yang Y,Guo X,et al.Analysis of collision probability in IEEE 802.11 based VANETs[J].Chinese Journal of Electronics,2010,19(1):187-190.
[8] Daeinabi A,Rahbar A G P,Khademzadeh A.VWCA:An efficient clustering algorithm in vehicular ad hoc networks[J].Journal of Network and Computer Applications,2011,34(1):207-222.
[9] Su H,Zhang X.Clustering-based multichannel MAC protocols for QoS provisionings over vehicular ad hoc networks[J].Vehicular Technology,IEEE Transactions on,2007,56(6):3309-3323.
[10] Albert R,Jeong H,Barabási A L.Error and attack tolerance of complex networks[J].Nature,2000,406(6794):378-382. |