Abstract
Aiming to exploit the power of multiple accesses from ubiquitous wireless networks, researchers employed multiple virtualized interfaces connecting to......
小提示:本篇文献需要登录阅读全文,点击跳转登录