"How to correctly use the protocol interference model for multi-hop ..."

Yi Shi et al. (2009)

Details and statistics

DOI: 10.1145/1530748.1530782

access: closed

type: Conference or Workshop Paper

metadata version: 2024-02-05

a service of  Schloss Dagstuhl - Leibniz Center for Informatics