Abstract
The volume of mobile traffic is growing every year. More and more frequency resources are needed to provide users services with a required level of quality of service (QoS). One of the possible solutions to a problem of radio spectrum shortage is the sharing of spectrum between the owners and LSA licensees. Licensed shared access (LSA) framework gives the owner priority in spectrum access, to the detriment of the secondary user, LSA licensee. If the mobile operator users of both need continuous service without interruptions on the rented part of the spectrum, the rules of shared access should guarantee the possibility of simultaneous access. In this paper we simulate a queuing system and consider a scheme model of LSA framework with the limit power policy. We propose formulas for calculation of main characteristics of the model – a blocking probability and a mean bit rate. These characteristics are very important in teletraffic theory. For example, blocking probabilities help to determine the number of required channels.
The publication was financially supported by the Ministry of Education and Science of the Russian Federation (the Agreement number 02.a03.21.0008) and RFBR according to the research projects No. 16-37-00421 mol_a and No. 15-07-03608 a.
Access provided by CONRICYT-eBooks. Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
Teletraffic theory is a mathematical theory, or one of branches of queueing theory. It is used for studying and designing telecommunication systems (telephony, computer networks, etc.). More generally, one can set the goal of teletraffic theory: construction of mathematical models that map real processes in information distribution systems and development of methods for assessing the quality of their functioning [11,12,13]. The number of user devices connected to a high-speed network as well as the volume of traffic transmitted between them is constantly increasing [1]. Consequently, an increasing amount of resources is needed to provide quality services. The problem of resource shortage could be solved by using the licensed shared access (LSA) framework [2,3,4]. LSA framework could improve the efficiency of resource usage and ensure the access to a spectrum which otherwise would be underused [5]. By using this framework, the spectrum is shared between the owner (so-called incumbent) and a limited number of LSA licensees (mobile operators). The LSA licensee has access to single-tenant band (the part of the spectrum, belonging only to the mobile operator) and rents the multi-tenant band (the part of the spectrum, belonging to the incumbent and the mobile operator), whereas the incumbent has access only to multi-tenant band. For interference coordination between the incumbent and the LSA licensee three policies [6] are proposed: limit power policy, shutdown policy, and ignore policy. According to the limit power policy [7], there is no interruption of service due to the incumbent accessing spectrum. It implies managing the user equipment power in uplink and eNodeB (eNB) power in downlink. According to shutdown policy [8, 9], at any time, LSA spectrum could be used by incumbent or LSA licensees but not together at once. According to ignore policy LSA licensees use the shared spectrum without interference coordination.
In this paper we propose a scheme model of 3GPP wireless network within LSA framework [10]. For efficient interference coordination we consider the limit power policy, which allows us to continue the service of multi-tenant band users, even if the incumbent needs this part of the spectrum. In this case, the service of mobile operator users will not be interrupted, but the service bit rate will be reduced (degraded). At this time, the multi-tenant band goes into the so-called unavailable mode and user’s requests arrived on the multi-tenant band continue their service at the degraded bit rate – minimum bit rate. After the incumbent releases the multi-tenant band, the band goes from the unavailable to the operational mode and the service bit rate for the connected mobile network users increases to the maximum value - maximum bit rate. The service on the single-tenant band is always carried out at the maximum bit rate.
This model is an improved version of the model described in [7]. One of the main disadvantages of the previous model was that after the disconnection the band was not recovered which means that even after the band was vacated by the owner, the service continued with degraded quality until all users of multi-tenant band were served. In our model this drawback is eliminated, the band goes into operational mode as soon as the owner frees it, while the quality of user service is increased to the original level.
This paper is organized as follows. In Sect. 2, we propose a mathematical model of the LSA framework with the limit power policy. In Sect. 3, we analyze main characteristics of the model: the blocking probability and the mean bit rate. Finally, we conclude the paper in Sect. 4.
2 Mathematical Model
2.1 General Assumptions and Parameters
We propose a scheme model of a single mobile network cell with LSA framework and limit power policy. We suppose that the mobile operator has access to the single-tenant band with the total capacity of \(C_{1} \) bandwidth units (b.u.) and rents the multi-tenant band with the total capacity of \(C_{2} \) b.u. Let the arrival rate \(\lambda \) be Poisson distributed and let the service time be exponentially distributed with mean \(\mu ^{-1} \). Then, we denote the corresponding offered load as \(\rho =\lambda /\mu \).
Each request processed on the single-tenant band is served at the maximum bit rate \(d_{\max } \). Request on the multi-tenant band could be served at the maximum bit rate \(d_{\max } \) or at the minimum bit rate \(d_{\min } \) depending on the state of the multi-tenant band – operational or unavailable. Figure 1 shows the scheme of the model.
We assume that the multi-tenant band goes into unavailable mode with rate \(\alpha \) and recovers into operational mode with rate \(\beta \). Recovery and failure intervals follow the exponential distribution. All necessary notations are given in Table 1.
2.2 Limit Power Policy
Let us consider in more detail the limit power policy. First of all, we determine the rules for accepting requests for service.
When a new request arrives, four scenarios are possible:
-
The request will be accepted for service on the single-tenant band, if the single-tenant band has not less than \(d_{\max } \) free b.u.
-
The request will be accepted for service on the multi-tenant band, if the single-tenant band has less than \(d_{\max } \) b.u. free, the multi-tenant band is operational and has not less than \(d_{\max } \) b.u. free.
-
The request will be blocked, if the single-tenant band has less than \(d_{\max } \) b.u. free and the multi-tenant band is unavailable or has less than \(d_{\max } \) b.u. free.
Let us note if the owner does not use the frequency spectrum of the multi-tenant band, the data transfer can be carried out at the highest possible rate, which equals to \(d_{\max } \), in other case the service bit rate for the mobile operator users is degraded from the maximum \(d_{\max } \) to the minimum \(d_{\min } \) value. When the multi-tenant band recovers, the bit rates are switched back and all users that have been degraded continue to receive service at bit rate \(d_{\max } \).
2.3 System of Equilibrium Equations
The behavior of the system is defined by the Markov process \(\mathbf{X}(t)=\{(N_{1}(t),\) \(N_{2}(t),S(t)),t\ge 0\}\), where \(N_{1} (t)\) is the number of single-tenant band users, \(N_{2} (t)\) is the number of multi-tenant band users, \(S\left( t\right) \) is the state of the multi-tenant band at the moment \(t\ge 0\). Let us denote \(N_{1} =\left\lfloor \frac{C_{1} }{d_{\max } } \right\rfloor \) the maximum number of single-tenant band users, \(N_{2} =\left\lfloor \frac{C_{2} }{d_{\max } } \right\rfloor \) the maximum number of multi-tenant band users. Then the system state space is the following:
State space (1) could be divided into two subspaces: \(\{n_{1} =0,\ldots ,N_{1} ,\; \; n_{2} =\) \(0,\ldots ,N_{2} ,\; \; s=1\}\) if the multi-tenant band is operational and requests could be served at the maximum bit rate \(d_{\max } \), and \(\{n_{1} =0,\ldots ,N_{1} ,\; \; n_{2} =0,\ldots ,N_{2} ,\) \(s=0\}\) if the multi-tenant band is unavailable and requests continue their service at the minimum bit rate \(d_{\min } \). Figure 2 shows the structure of the state space, considering the two subspaces.
The corresponding Markov process \(\mathbf{X}\left( t\right) \), which representing the system’s states, is described by the following system of equilibrium equations
where \(\left( p\left( n_{1} ,n_{2} ,s\right) \right) _{\left( n_{1},\,n_{2},\,s\right) \in X} =\mathbf{p}\) is the stationary probability distribution.
2.4 Infinitesimal Generator
The system probability distribution is calculated as the numerical solution of the system of equilibrium equations \(\mathbf{p}\cdot \mathbf{A}=\mathbf{0}\), \(\mathbf{p}\cdot \mathbf{1}^{T} =1\), where \(\mathbf{A}\) is the infinitesimal generator of Markov process \(\mathbf{X}\left( t\right) \). Let us denote \(n=\overline{0,\,N_{1}\,+\,N_{2} }\) – the number of users.
The infinitesimal generator \(\mathbf{A}\) has a block tridiagonal form
Blocks \(\mathbf{\Lambda } _{n} \), \(n\,=\,\overline{0,\,N_{1}\,\,N_{2} -1}\) have the sizes
and the following form:
-
(1)
\(n\,=\,\overline{0,\,N_{2} -1}\)
$$\begin{aligned} \mathbf{\Lambda } _{n}\,=\,\left[ \begin{array}{ccccccc} {\lambda } &{} {0} &{} {\cdots } &{} {0} &{} {0} &{} {0} &{} {0} \\ {0} &{} {\lambda } &{} {\cdots } &{} {0} &{} {0} &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {\cdots } &{} {\lambda } &{} {0} &{} {0} &{} {0} \\ {0} &{} {0} &{} {\cdots } &{} {0} &{} {\lambda } &{} {0} &{} {0} \end{array}\right] , \end{aligned}$$ -
(2)
\(n\,=\,\overline{N_{2},\,N_{1} -1},\, \mathrm{if}\, N_{1}\,>\,N_{2}\)
$$\begin{aligned} \mathbf{\Lambda } _{n}\,=\,\left[ \begin{array}{ccccccc} {0} &{} {0} &{} {\cdots } &{} {0} &{} {0} &{} {0} &{} {0} \\ {0} &{} {\lambda } &{} {\cdots } &{} {0} &{} {0} &{} {0} &{} {0} \\ {\lambda } &{} {0} &{} {\cdots } &{} {0} &{} {0} &{} {0} &{} {0} \\ {0} &{} {\lambda } &{} {\cdots } &{} {0} &{} {0} &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {\cdots } &{} {\lambda } &{} {0} &{} {0} &{} {0} \\ {0} &{} {0} &{} {\cdots } &{} {0} &{} {\lambda } &{} {0} &{} {0} \end{array}\right] , \end{aligned}$$ -
(3)
\(n\,=\,\overline{N_{1},\,N_{1}\,+\,N_{2} -1}\)
$$\begin{aligned} \mathbf{\Lambda } _{n}\,=\,\left[ \begin{array}{ccccc} {0} &{} {0} &{} {\cdots } &{} {0} &{} {0} \\ {0} &{} {\lambda } &{} {\cdots } &{} {0} &{} {0} \\ {\lambda } &{} {0} &{} {\cdots } &{} {0} &{} {0} \\ {0} &{} {\lambda } &{} {\cdots } &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {\cdots } &{} {\lambda } &{} {0} \\ {0} &{} {0} &{} {\cdots } &{} {0} &{} {\lambda } \end{array}\right] . \end{aligned}$$Blocks \(\mathbf{M} _{n} \), \(n\,=\,\overline{1,\,N_{1}\,+\,N_{2} }\) have the sizes
$$\begin{aligned} \dim \mathbf{M} _{n}\,=\,\left\{ \begin{array}{ll} {\left( 2n+2\right) \times 2n,} &{} {n\,=\,\overline{1,\,N_{2} },} \\ {\left( 2N_{2} +2\right) \; \times \left( 2N_{2} +2\right) ,\mathrm{\; \; \; \; }} &{} {n\,=\,\overline{N_{2}\,+\,1,\,N_{1} },\, \mathrm{if}\, N_{1} >\,N_{2} ,} \\ \left( 2\left( N_{1}\,+\,N_{2} -n\right) +2\right) \\ \times \,\left( 2\left( N_{1} +N_{2} -n\right) +4\right) , &{} {n\,=\,\overline{N_{1}\,+\,1,\,N_{1}\,+\,N_{2} }.} \end{array}\right. \end{aligned}$$and the following form:
-
(1)
\(n\,=\,\overline{1,\,N_{2} }\)
$$\begin{aligned} \mathbf{M}_{n} =\left[ \begin{array}{ccccccc} {n\mu } &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {0} &{} {0} \\ {0} &{} {n\mu } &{} {0} &{} {0} &{} {\cdots } &{} {0} &{} {0} \\ {\mu } &{} {0} &{} {\left( n-1\right) \mu } &{} {0} &{} {\cdots } &{} {0} &{} {0} \\ {0} &{} {\mu } &{} {0} &{} {\left( n-1\right) \mu } &{} {\cdots } &{} {0} &{} {0} \\ {0} &{} {0} &{} {2\mu } &{} {0} &{} {\cdots } &{} {0} &{} {0} \\ {0} &{} {0} &{} {0} &{} {2\mu } &{} {\cdots } &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {\mu } &{} {0} \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {0} &{} {\mu } \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {n\mu } &{} {0} \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {0} &{} {n\mu } \end{array}\right] , \end{aligned}$$ -
(2)
\(n=\overline{N_{2} +1,\,N_{1} },\, \mathrm{if}\, N_{1} >N_{2}\)
$$\begin{aligned} \mathbf{M}_{n} =\left[ \begin{array}{ccccccc} {\mu } &{} {0} &{} {N_{1} \mu } &{} {0} &{} {\cdots } &{} {0} &{} {0} \\ {0} &{} {\mu } &{} {0} &{} {N_{1} \mu } &{} {\cdots } &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {\mu } &{} {0} \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {0} &{} {\mu } \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {n\mu } &{} {0} \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {0} &{} {n\mu } \end{array}\right] , \end{aligned}$$ -
(3)
\(n\,=\,\overline{N_{1}\,+\,1,\,N_{1}\,+\,N_{2} }\)
$$\begin{aligned} \mathbf{M}_{n} =\left[ \begin{array}{ccccccccc} {\left( n-N_{1} \right) \mu } &{} {0} &{} {N_{1} \mu } &{} {0} &{} {\cdots } &{} {0} &{} {0} &{} {0} &{} {0} \\ {0} &{} {\left( n-N_{1} \right) \mu } &{} {0} &{} {N_{1} \mu } &{} {\cdots } &{} {0} &{} {0} &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {N_{2} \mu } &{} {0} &{} {\left( n-N_{2} \right) \mu } &{} {0} \\ {0} &{} {0} &{} {0} &{} {0} &{} {\cdots } &{} {0} &{} {N_{2} \mu } &{} {0} &{} {\left( n-N_{2} \right) \mu } \end{array}\right] . \end{aligned}$$Blocks \(\mathbf{N} _{n} \), \(n\,=\,\overline{0,N_{1}\,+\,N_{2} }\) have the sizes
$$\begin{aligned} \dim \mathbf{N} _{n} =\left\{ \begin{array}{ll} {\left( 2n+2\right) \times \left( 2n+2\right) ,} &{} {n=\overline{0,N_{2} -1},} \\ {\left( 2N_{2} +2\right) \; \times \left( 2N_{2} +2\right) ,} &{} {n=\overline{N_{2} ,N_{1} +N_{2} -2},} \\ \left( 2\left( N_{1} +N_{2} -n\right) +2\right) \\ \times \,\left( 2\left( N_{1} +N_{2} -n\right) +2\right) , &{} {n=\overline{N_{1} +N_{2} -1,\,N_{1} +N_{2} }.} \end{array}\right. \end{aligned}$$and the following form:
-
(1)
\(n\,=\overline{0,N_{1} -1}\)
$$\begin{aligned} \mathbf{N} _{n} =\left[ \begin{array}{ccccc} {-\left( \lambda +n\mu +\beta \right) } &{} {\beta } &{} {\cdots } &{} {0} &{} {0} \\ {\alpha } &{} {-\left( \lambda +n\mu +\alpha \right) } &{} {\cdots } &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {\cdots } &{} {-\left( \lambda +n\mu +\beta \right) } &{} {\beta } \\ {0} &{} {0} &{} {\cdots } &{} {\alpha } &{} {-\left( \lambda +n\mu +\alpha \right) } \end{array}\right] , \end{aligned}$$ -
(2)
\(n=\overline{N_{1} ,N_{1} +N_{2} -1}\)
$$\begin{aligned} \mathbf{N} _{n} =\left[ \begin{array}{ccccc} {-\left( n\mu +\beta \right) } &{} {\beta } &{} {\cdots } &{} {0} &{} {0} \\ {\alpha } &{} {-\left( \lambda +n\mu +\alpha \right) } &{} {\cdots } &{} {0} &{} {0} \\ {\vdots } &{} {\vdots } &{} {\ddots } &{} {\vdots } &{} {\vdots } \\ {0} &{} {0} &{} {\cdots } &{} {-\left( \lambda +n\mu +\beta \right) } &{} {\beta } \\ {0} &{} {0} &{} {\cdots } &{} {\alpha } &{} {-\left( \lambda +n\mu +\alpha \right) } \end{array}\right] , \end{aligned}$$ -
(3)
\(n=N_{1} +N_{2}\)
$$\begin{aligned} \mathbf{N} _{n} =\left[ \begin{array}{cc} {-\left( n\mu +\beta \right) } &{} {\beta } \\ {\alpha } &{} {-\left( n\mu +\alpha \right) } \end{array}\right] . \end{aligned}$$
3 Numerical Analysis
3.1 Performance Measures
Having found the probability distribution \(p\left( n_{1} ,n_{2} ,s\right) ,\; \left( n_{1} ,n_{2} ,s\right) \in X\), one may compute performance measures of the considered scheme:
-
Blocking probability
-
Mean bit rate
-
Mean bit rate on the multi-tenant band
$$\begin{aligned} \overline{d}\left( C_{2} \right) \,=\,\frac{\sum _{\left( n_{1},\,n_{2},\,s\right) \in X:\, n_{2}\,\ne \,0}\left( d_{\mathrm{max}} \cdot p\left( n_{1},\,n_{2},\,1\right) ,\,+\,d_{\mathrm{min}} \cdot p\left( n_{1},\,n_{2},\,0\right) \right) }{\sum _{\left( n_{1},\,n_{2},\,s\right) \in X:\, n_{2}\,\ne \,0}p\left( n_{1},\,n_{2},\,s\right) } . \end{aligned}$$(5)
3.2 Numerical Example
Let us assume that users view short video in high quality at a bit rate \(d_{\max } \)= 1 Mbps. If a part of the frequency band has to be returned, the bit rate decreases to \(d_{\min } \)= 0.5 Mbps. So the users continue watching video but in a lower quality. The multi-tenant band goes into unavailable mode every hour (3600 s) or every four hours (14400 s) and the recovery takes around one minute. Table 2 summarizes the initial data of the example.
The figures below show the behavior of each characteristic – blocking probability B (Fig. 4), mean bit rates \(\overline{d}\) and \(\overline{d}\left( C_{2} \right) \) (Fig. 5) – for different values of \(\alpha ^{-1} \) (the mean time when the multi-tenant band is available). All figures show that the less multi-tenant band goes into unavailable mode, the better the performance metrics, namely, the blocking probability is lower, whereas the mean bit rate is higher.
4 Conclusion
We have presented the scheme model for analyzing the simultaneous access to spectrum in 3GPP cellular network within LSA framework for intolerant to delay traffic under the limit power policy. This policy is based on the implementation of a mechanism the service bit rate degradation for the mobile operator users on multi-tenant band, if it is necessary to release the resources of this band for the owner. We have obtained the infinitesimal generator as a block tridiagonal matrix, what is required for the numerical solution of the equilibrium equations system and the calculation of the performance metrics for the considered queuing system that characterize the impact of LSA on the QoS – the blocking probability and the mean bit rate.
References
Cisco Visual Networking Index: Forecast and Methodology, 2015–2020 (2016)
ETSI: TS 103 113 Mobile broadband services in the 2300 MHz 2400 MHz band under Licensed Shared Access regime (2013)
Buckwitz, K., Engelberg, J., Rausch, G.: Licensed Shared Access (LSA) - regulatory background and view of Administrations. In: CROWNCOM (invited paper), pp. 413–416 (2014)
Ahokangas, P., Matinmikko, M., Yrjola, S., Mustonen, M., Luttinen, E., Kivimäki, A., Kemppainen, J.: Business models for mobile network operators in Licensed Shared Access (LSA). In: DYSPAN, pp. 407–412 (2014)
Gomez-Miguelez, I., Avdic, E., Marchetti, N., Macaluso, I., Doyle, L.E.: Cloud-RAN platform for LSA in 5G networks - tradeoff within the infrastructure. In: Communications, Control and Signal Processing, pp. 522–525 (2014)
Borodakiy, V.Y., Samouylov, K.E., Gudkova, I.A., Ostrikova, D.Y., Ponomarenko, A.A., Turlikov, A.M., Andreev, S.D.: Modeling unreliable LSA operation in 3GPP LTE cellular networks. In: 6th International Congress on Ultra Modern Telecommunications and Control Systems ICUMT-2014, pp. 490–496 (2014)
Samouylov, K., Gudkova, I., Markova, E., Yarkina, N.: Queuing model with unreliable servers for limit power policy within licensed shared access framework. In: Galinina, O., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART -2016. LNCS, vol. 9870, pp. 404–413. Springer, Cham (2016). doi:10.1007/978-3-319-46301-8_34
Shorgin, S.Y., Samouylov, K.E., Gudkova, I.A., Galinina, O.S., Andreev, S.D.: On the benefits of 5G wireless technology for future mobile cloud computing. In: 1st International Science and Technology Conference Modern Networking Technologies (MoNeTec): SDN & NFV, pp. 151–154 (2014)
Ponomarenko-Timofeev, A., Pyattaev, A., Andreev, S., Koucheryavy, Y., Mueck, M., Karls, I.: Highly dynamic spectrum management within licensed shared access regula-tory framework. IEEE Commun. Mag. 54(3), 100–109 (2015)
3GPP: TS 36.300 Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall description; Stage 2: Release 13 (2015)
Nunez-Queija, R.: Sojourn times in a processor sharing queue with service interruptions. Queueing Syst. 34(1), 351–386 (2000)
Yashkov, S.F.: Processor-sharing queues: some progress in analysis. Queueing Syst 2(1), 1–17 (1987)
Asmussen, S.: Applied Probability and Queues. Springer, New York (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Ivanova, D., Karnauhova, E., Markova, E., Gudkova, I. (2017). Analyzing of Licensed Shared Access Scheme Model with Service Bit Rate Degradation in 3GPP Network. In: Dudin, A., Nazarov, A., Kirpichnikov, A. (eds) Information Technologies and Mathematical Modelling. Queueing Theory and Applications. ITMM 2017. Communications in Computer and Information Science, vol 800. Springer, Cham. https://doi.org/10.1007/978-3-319-68069-9_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-68069-9_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68068-2
Online ISBN: 978-3-319-68069-9
eBook Packages: Computer ScienceComputer Science (R0)