2Leontiadis I,Marfia G,Mack D,et al.On the effectiveness of an opportunistic traffic management system for vehicular networks[J].IEEE Transactions on Intelligent Transportation Systems,2011,12(4):1537-1548.
4Xia Ying,Zhang Xu,Wang Guo-yin.Ouster-based congestion outlier detection method on trajectory data[C].Int.Conf.Fuzzy Systems and Knowledge Discovery,Tianjin,2009:243-247.
5Zhang En-zhan,Jiang Wei-li,Kuang Yu-jun,et al.Active RFID positioning of vehicles in road traffic[C].Int.Conf.Communications and Information Technologies (ISCIT),Hangzhou,2011:222-227.
6SHEN Wei,WYNTER L.A New One-level Convex Optimization Approach for Estimating Origin-destination Demand[J].Transportation Research Part B:Methodological,2012,46(10):1535-1555.
7SONMEZ 0,MOHAMED H,EPEMA D.On the benefit of processor coallocation in multicluster Grid systems[J].IEEE Transactions on Parallel and Distributed Systems,2010,21 (06):778-89.
8Bimal K M,Gholam M A.Differential epidemic model of virus and worms in computer network[J].International Journal of Network Security,2012,14 (03):149-155.
9BALASANGAMESHWARA J,RAJU N.A hybrid policy mr fault tolerant load balancing in Grid computing environments[J].Journal of Network and computer Applications,2012,35 (01),412-22.
10SUN Huijun,ZHANG Hui,and WU Jianjun.Correlated scale-free network with community:modeling and transportation dynamics[J].Nonlinear Dynamics,2012,69(04):2097-2104.