共 48 条
[1]
Abbass HA, 2001, P GEN EV COMP C GECC, P807
[2]
Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm
[J].
PLOS ONE,
2015, 10 (05)
[3]
Abdelkader TAMM, 2008, THESIS
[4]
Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks
[J].
PLOS ONE,
2016, 11 (06)
[5]
Alajmi A., 2014, Int. J. Sustain. Built Environ, V3, P18, DOI [10.1016/j.ijsbe.2014.07.003, DOI 10.1016/J.IJSBE.2014.07.003]
[6]
ALANDER JT, 1992, COMPUTER SYSTEMS AND SOFTWARE ENGINEERING, P65, DOI 10.1109/CMPEUR.1992.218485
[7]
[Anonymous], 2008, Algorithm Design Manual
[8]
Back T., 1994, Proceedings of the First IEEE Conference on Evolutionary Computation. IEEE World Congress on Computational Intelligence (Cat. No.94TH0650-2), P531, DOI 10.1109/ICEC.1994.350004
[9]
Back T., 1996, Foundations of Intelligent Systems. 9th International Symposium, ISMIS '96. Proceedings, P158
[10]
Baumann R, 2007, 262 TIK ETH ZENTR CO