[1] Akyildz I F,Su Weilian,Sankarasubramaniam Y,et al. Wireless sensor networks:a survey[J]. Computer Networks,2002,38(4):393-422.
[2]Rajan P,Geetha V.Energy efficient LEACH by enhancing the data update procedure of cluster head[C]//2013 Fourth International Conference on Computing,Communications and Networking Technologies(ICCCNT). Tiruchengode India,2013.
[3]Mahmood D,Javaid N,Mahmood S,et al. MODLEACH:A variant of LEACH for WSNs[C]//2013 Eighth International Conference on Broadband and Wireless Computing,Communication and Applications(BWCCA). Compiegne France:IEEE,2013:158-163.
[4]Renold A P,Poongothai R,Parthasarathy R. Performance analysis of LEACH with gray hole attack in wireless sensor networks[C]//2012 International Conference on Computer Communication and Informatics(ICCCI). Coimbatore India,2012.
[5]Kumar N,Kaur J. Improved LEACH protocol for wireless sensor networks[C]//2011 7th International Conference on Wireless Communications,Networking and Mobile Computing(WiCOM). Wuhan,2011.
[6]Jie Ding,Jane Hillston. Structural and fluid analysis of large scale PEPA models-with applications to content adaptation systems[D]. Edinburgh:The College of Science and Engineering,The University of Edinburgh. 2010.
[7]Jie Ding,Hillston J,Laurenson D I. Evaluating the response time of large scale content aqdaptation systems using performance evaluation process algebra[C]//2010 IEEE International Conference on Communications(ICC). Cape Town,2010.
[8]Hillston J. A compositional Approach to Performance Modelling[M]. Cambridge:Cambridge University Press,1996.
[9]Jie Ding,Jane Hillston. Numerically representing stochastic process algebra models[J]. The Computer Journal,2012,55:1 383-1 379.
[10]Norris J,Markov Chains. Cambridge Series in Statistical and Probabilistic Mathematics[M]. Cambridge:Cambridge University Press,1998.