Publisher
Springer International Publishing
Reference72 articles.
1. Agarwal, P.K., Efrat, A., Ganjugunte, S.K., Hay, D., Sankararaman, S., Zussman, G.: Network vulnerability to single, multiple and probabilistic physical attacks. In: Proc. Military Communications Conference (MILCOM’10), pp. 1824–1829 (2010)
2. Ahuja, R.K., Magnanti, T.L., Orlin, J.B.: Network Flows: Theory, Algorithms, and Applications. Prentice Hall, Englewood Cliffs (1993)
3. Akyildiz, I.F., Wang, X., Wang, W.: Wireless Mesh Networks: a survey. Comput. Netw. 47(7), 445–487 (2005)
4. Aruba Networks:
http://www.arubanetworks.com/
. Accessed on 24 Nov. 2014
5. Avallone, S., Akyildiz, I.F., Giorgio, V.: A channel and rate assignment algorithm and a layer-2.5 forwarding paradigm for multi radio wireless mesh networks. IEEE/ACM Trans. Networking 17(1), 267–280 (2009)