共 15 条
[1]
Li Q., Zeng Q., Verifying mobile ad-hoc security routing protocols with type inference, Journal of Software, 20, 10, pp. 2822-2833, (2009)
[2]
Fang X., Ma Z., Theory and key technologies of cross-layer design in wireless mesh networks, Journal of Southwest Jiaotong University, 40, 6, pp. 711-719, (2005)
[3]
Shen Q., Fang X., Dynamic source routing protocol based on frame delivery ratio in wireless mesh networks, Journal of Southwest Jiaotong University, 42, 2, pp. 200-205, (2007)
[4]
Sheng M., Shi Y., Tian Y., Et al., On the k-connectivity in mobile ad hoc networks, Acta Electronica Sinica, 36, 10, pp. 1857-1861, (2008)
[5]
Brooks R.R., Pillai B., Racunas S., Et al., Mobile network analysis using probabilistic connectivity matrices, IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, 37, 4, pp. 694-702, (2007)
[6]
Jia W., Wang J., Analysis of connectivity for sensor networks using geometrical probability, IEE Proceedings Communications, 153, 2, pp. 305-312, (2006)
[7]
Santi P., The critical transmitting range for connectivity in mobile ad hoc networks, IEEE Transactions on Mobile Computing, 4, 3, pp. 310-317, (2005)
[8]
Boyer J., Falconer D.D., Yanikomeroglu H., Cooperative connectivity models for wireless relay networks, IEEE Transactions on Wireless Communications, 6, 6, pp. 1992-2000, (2007)
[9]
Marco G.D., Longo M., Postiglione F., Connectivity of ad hoc networks with link asymmetries induced by shadowing, IEEE Communications Letters, 11, 6, pp. 495-497, (2007)
[10]
Dousse O., Baccelli F., Thiran P., Impact of interferences on connectivity in ad hoc networks, IEEE/ACM Transactions on Networking, 13, 2, pp. 425-436, (2005)