Author:
Namuduri Kamesh,Soomro Amjad
Publisher
Springer International Publishing
Reference5 articles.
1. TTNT. https://www.rockwellcollins.com/Data/Products/Communications_and_Networks/Networks/Tactical_Targeting_Network_Technology.aspx . Accessed 25 July 2016
2. Benaddy, M., Wakrim, M.: Cutset enumerating and network reliability computing by a new recursive algorithm and inclusion exclusion principle. Intern. J. Comput. Appl 45, 22–25 (2012)
3. Caleffi, M., Ferraiuolo, G., Paura, L.: A reliability-based framework for multi-path routing analysis in mobile ad-hoc networks. Int. J. Commun. Netw. Distrib. Syst. 1(4–6), 507–523 (2008)
4. Elias, P., Feinstein, A., Shannon, C.: A note on the maximum flow through a network. IRE Trans. Inf. Theor. 2(4), 117–119 (1956)
5. Lee, K., Lee, H.-W., Modiano, E.: Reliability in layered networks with random link failures. IEEE/ACM Trans. Netw. (TON) 19(6), 1835–1848 (2011)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献