

Author: Benyamina Djohara Hafid Abdelhakim Gendreau Michel
Publisher: Springer Publishing Company
ISSN: 1383-469X
Source: Mobile Networks and Applications, Vol.16, Iss.1, 2011-02, pp. : 109-121
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










By Liu Tehuang Liao Wanjiun Lee Jeng-Farn
Mobile Networks and Applications, Vol. 14, Iss. 2, 2009-04 ,pp. :