default search action
Huanyan Qian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j26]Li Han, Huanyan Qian:
流间编码与流内编码相结合的机会路由算法 (Opportunistic Routing Algorithm Combining Intra-session Coding and Inter-session Coding in Wireless Network). 计算机科学 45(5): 69-74 (2018) - 2017
- [j25]Li Han, Huanyan Qian:
An opportunistic routing in wireless mesh network. Int. J. Sens. Networks 24(2): 75-82 (2017) - 2016
- [j24]Bin Hu, Huanyan Qian, Yi Shen, Jia-xing Yan:
An optimal path finding strategy in networks based on random walk. Clust. Comput. 19(4): 2179-2188 (2016) - [j23]Ming Li, Huanyan Qian:
Processing of Deployment Using an Adaptive Self-Spreading Algorithm Based on Electrostatic Field for Mobile Sensor. Int. J. Online Eng. 12(1): 42-49 (2016) - [j22]Ming Li, Huanyan Qian:
A Routing Algorithm for Wireless Sensor Networks based on Vector Field Theory. Int. J. Online Eng. 12(3): 22-27 (2016) - 2015
- [j21]Ping Dong, Huanyan Qian, Kai Zhou, Weidi Lu, Shaohua Lan:
A maximally radio-disjoint geographic multipath routing protocol for MANET. Ann. des Télécommunications 70(5-6): 207-220 (2015) - [j20]Xiaonan Wang, Huanyan Qian:
Dynamic and hierarchical IPv6 address configuration for a mobile ad hoc network. Int. J. Commun. Syst. 28(1): 127-146 (2015) - [j19]Li Han, Huanyan Qian, Huiting Liu:
无线多跳网络上基于网络编码的多源多播算法 (Algorithm for Multisource Multicast with Network Coding over Multi-hop Wireless Networks). 计算机科学 42(10): 88-91 (2015) - [c5]Jiu-hu Zheng, Huanyan Qian, Lei Wang:
Defense Technology of Wormhole Attacks Based on Node Connectivity. SmartCity 2015: 421-425 - 2014
- [j18]Xiaonan Wang, Huanyan Qian:
Constructing a VANET based on cluster chains. Int. J. Commun. Syst. 27(11): 2497-2517 (2014) - [j17]Xiaonan Wang, Huanyan Qian:
A Distributed Address Configuration Scheme for a MANET. J. Netw. Syst. Manag. 22(4): 559-582 (2014) - [j16]Xiaonan Wang, Huanyan Qian:
A tree-based address configuration for a MANET. Pervasive Mob. Comput. 12: 123-137 (2014) - [c4]Qun Wang, Huanyan Qian, Peiyu Ji, Yu Xie, Shuhui Yang:
A Performance Comparison Study of a Coverage-Preserving Node Scheduling Scheme and Its Enhancement in Sensor Networks. SecureComm (2) 2014: 3-9 - 2013
- [j15]Xiaonan Wang, Huanyan Qian:
Research on all-IP communication between wireless sensor networks and IPv6 networks. Comput. Stand. Interfaces 35(4): 403-414 (2013) - [j14]Xiaonan Wang, Huanyan Qian:
Mobility management solution for IPv6-based vehicular networks. Comput. Stand. Interfaces 36(1): 66-75 (2013) - [j13]Xiaoyong Yan, Huanyan Qian, Jiguang Chen:
Incremental Localization Algorithm Based on Multivariate Analysis. Int. J. Distributed Sens. Networks 9 (2013) - [j12]Ping Dong, Huanyan Qian, Xiaofei Wei, Shaohua Lan, Cunlai Pu:
A Beacon-Less Geographic Multipath Routing Protocol for Ad Hoc Networks. Mob. Networks Appl. 18(4): 500-512 (2013) - [j11]Xiaonan Wang, Huanyan Qian:
A Mobility Handover Scheme for IPv6-Based Vehicular Ad Hoc Networks. Wirel. Pers. Commun. 70(4): 1841-1857 (2013) - [j10]Xiaonan Wang, Huanyan Qian:
Cluster-Based and Distributed IPv6 Address Configuration Scheme for a MANET. Wirel. Pers. Commun. 71(4): 3131-3156 (2013) - 2012
- [j9]Xiaonan Wang, Huanyan Qian:
An IPv6 address configuration scheme for wireless sensor networks. Comput. Stand. Interfaces 34(3): 334-341 (2012) - [j8]Xiaonan Wang, Huanyan Qian:
Hierarchical and low-power IPv6 address configuration for wireless sensor networks. Int. J. Commun. Syst. 25(12): 1513-1529 (2012) - [j7]Ping Dong, Huanyan Qian, Zhongjun Lu, Shaohua Lan:
A Network Covert Channel Based on Packet Classification. Int. J. Netw. Secur. 14(2): 109-116 (2012) - [j6]Xiaonan Wang, Huanyan Qian:
Constructing a 6LoWPAN Wireless Sensor Network Based on a Cluster Tree. IEEE Trans. Veh. Technol. 61(3): 1398-1405 (2012) - 2011
- [j5]Demin Gao, Huanyan Qian, Zheng Wang, Jiguang Chen:
Study and Design an Anycast Routing Protocol for Wireless Sensor Networks. J. Networks 6(12): 1726-1733 (2011) - 2010
- [j4]Xiaonan Wang, Huanyan Qian:
Design and Implementation of Anycast Services in Ad Hoc Networks Connected to IPv6 Networks. J. Networks 5(4): 403-410 (2010)
2000 – 2009
- 2009
- [j3]Xiaonan Wang, Huanyan Qian:
Design and implementation of Anycast communication model in IPv6. Int. J. Netw. Manag. 19(3): 175-182 (2009) - [c3]Yangui Xu, Xiangchun Li, Jiachun Zhou, Huanyan Qian:
Worm Detection in an IPv6 Internet. CIS (2) 2009: 366-370 - 2008
- [j2]Xiaonan Wang, Huanyan Qian:
A scheme for solving Anycast scalability in IPv6. Int. J. Netw. Manag. 18(4): 317-324 (2008) - [c2]Li Han, Huanyan Qian:
Parallelized Network Coding with SIMD Instruction Sets. ISCSCT (1) 2008: 364-369 - 2007
- [j1]Xiaonan Wang, Huanyan Qian:
Analysis and discussion of Anycast scalability in IPv6. Int. J. Netw. Manag. 17(4): 321-328 (2007) - 2006
- [c1]Xiaonan Wang, Huanyan Qian:
An Anycast Communication Model on Solving Scalability in IPv6. ICARCV 2006: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint