共 15 条
- [1] Li Q., Zeng Q., Verifying mobile ad-hoc security routing protocols with type inference, Journal of Software, 20, 10, pp. 2822-2833, (2009)
- [2] Fang X., Ma Z., Theory and key technologies of cross-layer design in wireless mesh networks, Journal of Southwest Jiaotong University, 40, 6, pp. 711-719, (2005)
- [3] Shen Q., Fang X., Dynamic source routing protocol based on frame delivery ratio in wireless mesh networks, Journal of Southwest Jiaotong University, 42, 2, pp. 200-205, (2007)
- [4] Sheng M., Shi Y., Tian Y., Et al., On the k-connectivity in mobile ad hoc networks, Acta Electronica Sinica, 36, 10, pp. 1857-1861, (2008)
- [5] Brooks R.R., Pillai B., Racunas S., Et al., Mobile network analysis using probabilistic connectivity matrices, IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, 37, 4, pp. 694-702, (2007)
- [6] Jia W., Wang J., Analysis of connectivity for sensor networks using geometrical probability, IEE Proceedings Communications, 153, 2, pp. 305-312, (2006)
- [7] Santi P., The critical transmitting range for connectivity in mobile ad hoc networks, IEEE Transactions on Mobile Computing, 4, 3, pp. 310-317, (2005)
- [8] Boyer J., Falconer D.D., Yanikomeroglu H., Cooperative connectivity models for wireless relay networks, IEEE Transactions on Wireless Communications, 6, 6, pp. 1992-2000, (2007)
- [9] Marco G.D., Longo M., Postiglione F., Connectivity of ad hoc networks with link asymmetries induced by shadowing, IEEE Communications Letters, 11, 6, pp. 495-497, (2007)
- [10] Dousse O., Baccelli F., Thiran P., Impact of interferences on connectivity in ad hoc networks, IEEE/ACM Transactions on Networking, 13, 2, pp. 425-436, (2005)