Zobrazeno 1 - 10
of 13
pro vyhledávání: '"WANG Suo-ping"'
Publikováno v:
Tongxin xuebao, Vol 31, Pp 136-140 (2010)
An improved spectrum sharing model was proposed in cognitive radios.The improved model considers com-prehensively impact on the primary users’ profits by all secondary users’ bandwidth requirement,and impact on every secondary user’s profit by
Externí odkaz:
https://doaj.org/article/f07a78e5c2fc4cb1a6f39b53ff59435a
Autor:
HUANG Li-ya, WANG Suo-ping
Publikováno v:
Tongxin xuebao, Pp 95-100 (2007)
RED as proposed by Floyd was based on the traditional Poisson input model,could not satisfy self-similar na-ture of network traffic.With this in view,an attempt has been made by proposing a modified RED algorithm,the HWRED algorithm with self-similar
Externí odkaz:
https://doaj.org/article/9302e4fa6f48487b9be84df2690f0623
Autor:
HUANG, Li-ya, WANG, Suo-ping
Publikováno v:
In The Journal of China Universities of Posts and Telecommunications 2011 18(5):102-107
Publikováno v:
In The Journal of China Universities of Posts and Telecommunications 2011 18 Supplement 1:40-47
Publikováno v:
In The Journal of China Universities of Posts and Telecommunications 2006 13(3):81-86
Publikováno v:
Research & Exploration in Laboratory. Feb2014, Vol. 33 Issue 2, p190-246. 5p.
Publikováno v:
JOURNAL OF ELECTRONICS INFORMATION & TECHNOLOGY. 32:509-514
Affinity Propagation (AP) clustering is not fit to deal with multi-scale data cluster as well as the arbitrary shape cluster issue. Therefore, an improved affinity propagation clustering algorithm AP-VSM (Affinity Propagation based on Variable-Simila
Autor:
He Tao, Wang Suo-ping
Publikováno v:
2010 IEEE 12th International Conference on Communication Technology.
Iterated prisoner's dilemma is a famous dilemma of game theory. The TFT (Tit for tat) strategy is the best solution of this dilemma. In this paper, a novel routing algorithm based on iterated prisoner's dilemma is proposed for multi-rate wireless mes
Autor:
Wang Suo-ping, Gu Yiran
Publikováno v:
2010 International Forum on Information Technology and Applications.
P2P has become an important traffic form of current Network, and P2P identification has been a hot research in Network monitoring & management area. In order to tackle the problem of P2P data encryption persecuting P2P identification, in this paper,
Publikováno v:
Electronics Letters (Institution of Engineering & Technology); 06/22/2000, Vol. 36 Issue 13, p1168-1169, 2p