|
[1] Box G, Jenkins G M and Reinsel G 1994 Time Series Analysis: Forecasting and Control (Hoboken: John Wiley & Sons, Inc.) chap 3 p 47 [2] Adas A 1997 IEEE Commun. Mag. 35 601746 [3] Sang A M and Li S Q 2002 Comput. Networks 34 329 [4] Hosking J R M 1981 Biometrika 68 165 [5] Shu Y T, Wang L and Zhang L F 2001 Chin. J. Comput. 24 46 (in Chinese) [6] Lee S C and Heinbuch D V 2001 IEEE Trans. Syst. Man. Cybern. A 31 294 [7] Bonifacio J and Camsian A 1998 IEEE International Joint Conference on Neural Networks (Anchorage, Alaska 4-9 May 1998) p 205 [8] WANG X and FANG B X 2005 J. Harbin Inst. Technol. 37 1046 (in Chinese) [9] Xiang Y, Lin Y, Lei W L and Huang S J 2004 IEE Proc. Commun. 151 292 [10] Li L and Lee G 2005 Telecommun. Syst. 28 1018 [11] Yuan J R and Yong J 2001 Acta Phys. Sin. 50 1221 (in Chinese) [12] YANG D P and LIN H Y 2009 Chin.~Phys. Lett. 26 068902 [13] Svensson A, Holst J, Lindquist R and Lindgren G 1996 J. Time Ser. Anal . 17 511 [14] Arnol'd V I 2009 Dynamical Systems V: Bifurcation Theory and Catastrophe Theory (Beijing: Science Press) chap 2 p160 [15] Saunders P T 1995 An Introduction to Catastrophe Theory (Cambridge: Cambridge University) Chap 2 p 41 [16] Lippmann R, Haines J W and Fried D J 2000 Comput. Networks 34 579 [17] Robin S and Vern P 2003 The 10th ACM Conference on Computer and Communications Security (Washington DC 27-31 October 2003) p 265
|
|