[1] |
LI Z Y , WANG R C , Secure topology protocol for mobile peer-to-peer networks[J]. Journal on Communications, 2010,31(10):146-157.
|
[2] |
LI Z Y , XIE G G , LI Z C , Efficient and scalable consistency mainte-nance for heterogeneous peer-to-peer systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2008,19(12):1695-1708.
|
[3] |
KURT D , MILOS M . Extended virtual spring mesh(EVSM): the distributed self-organizing mobile ad hoc network for area explora-tion[J]. IEEE Transactions on Industrial Electronics, 2011,58(12):424-5437.
|
[4] |
LI H , BOK K S , YOO J S . An efficient clustering method for unstruc-tured mobile peer-to-peer networks[A]. RACS '11: Proceedings of the 2011 ACM Symposium on Research in Applied Computationy[C]. 2011. 124-129
|
[5] |
YU J , LU L M , XIAO P . Monitoring,analyzing and characterizing lookup traffic in a large-scale DHT[J]. Computer Communications, 2011,34(13):622-1629.
|
[6] |
LI B C , RANDOM N D . Network coding in peer-to-peer networks: from theory to practice[J]. Proceedings of the IEEE, 2011,99(3):513-523.
|
[7] |
TSAI F S , HAN W C , XU J W . Design and development of a mobile peer-to-peer social networking application[J]. Expert Systems with Applications, 2009,36(8):11077-11087.
|
[8] |
ZOU D Y . GAN Y , QU H T . Research of structure consistency be-tween overlay and network layer based on mobile P2P[A]. 2nd IEEE International Conference on Computer Science and Information Technology[C]. 2009(2):254-258
|
[9] |
LIU H I . A distributed intelligent broadcasting protocol for mobile ad hoc networks[J]. Mobile Networks and Applications, 2009,14(5):638-648.
|
[10] |
HUANG D M , HU Z . Research of replication mechanism in P2P network[J]. World Scientific and Engineering Academy and Society, 2009,8(12):845-1854.
|
[11] |
XIAO X , WANG W P , YANG L M , YANG L M,Wireless broadcasting retrans-mission approach based on network coding[J]. Journal on Communi-cations, 2009,30(9):69-75.
|
[12] |
LEI Y C , CHENG S , WU C . P2P content distribution with network coding[J]. Journal of Computer Research and Development, 2009,46(1):108-109.
|
[13] |
LIU L G , CHEN Z X . Data forwarding in opportunistic networks[J]. Asian Network for Scientific Information, 2010,9(2):215-223.
|
[14] |
ANH N H , SILVIA G . Routing in opportunistic Networks[J]. Ambi-ent Computing and Intelligence. 2009,1(3):19-38.
|
[15] |
ANGGADJAJA E . Point-to-point OMNeT++ based simulation of reliable transmission using realistic segmentation and reassembly with error control[A].Advances in Computing,Control and Telecommuni-cation Technologies (ACT), 2010 Second International Conference on[C]. 2010. 125-128.
|