{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:43:52Z","timestamp":1740123832982,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,1,3]],"date-time":"2018-01-03T00:00:00Z","timestamp":1514937600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["PTDC\/EEATEL\/ 120176\/2010","SFRH\/BD\/43744\/2008"],"award-info":[{"award-number":["PTDC\/EEATEL\/ 120176\/2010","SFRH\/BD\/43744\/2008"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s11276-017-1650-7","type":"journal-article","created":{"date-parts":[[2018,1,3]],"date-time":"2018-01-03T04:36:31Z","timestamp":1514954191000},"page":"2269-2284","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Multi-virtual wireless mesh networks through multiple channels and interfaces"],"prefix":"10.1007","volume":"25","author":[{"given":"Carlos","family":"Marques","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3857-5059","authenticated-orcid":false,"given":"Saravanan","family":"Kandasamy","sequence":"additional","affiliation":[]},{"given":"Susana","family":"Sargento","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Matos","sequence":"additional","affiliation":[]},{"given":"Tania","family":"Cal\u00e7ada","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Ricardo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,3]]},"reference":[{"issue":"9","key":"1650_CR1","doi-asserted-by":"publisher","first-page":"S23","DOI":"10.1109\/MCOM.2005.1509968","volume":"43","author":"IF Akyildiz","year":"2005","unstructured":"Akyildiz, I. F., & Wang, X. (2005). A survey on wireless mesh networks. IEEE Communications Magazine, 43(9), S23\u2013S30.","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"1650_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MC.2005.136","volume":"38","author":"T Anderson","year":"2005","unstructured":"Anderson, T., Peterson, L., Shenker, S., & Turner, J. (2005). Overcoming the internet impasse through virtualization. IEEE Computer, 38(4), 34\u201341.","journal-title":"IEEE Computer"},{"key":"1650_CR3","unstructured":"Hummel, K., Hess, A., Sargento, S., Matos, R., Tutschku, K., & Meer, H. (2009). Context-based wireless mesh networks: A case for network virtualization. In Euro-NF workshop on future internet architectures."},{"issue":"4","key":"1650_CR4","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s11235-011-9434-3","volume":"51","author":"R Matos","year":"2005","unstructured":"Matos, R., Sargento, S., Hummel, K. A., Hess, A., Tutschku, K., & de Meer, H. (2012). Context-based wireless mesh networks: A case for network virtualization. Telecommunication Systems, 51(4), 259\u2013272. \n                    http:\/\/dx.doi.org\/10.1007\/s11235-011-9434-3\n                    \n                  .","journal-title":"Telecommunication Systems"},{"key":"1650_CR5","unstructured":"Matos, R. & Sargento, S. (2009). Context-aware connectivity and mobility in wireless mesh networks. In ICST MONAMI."},{"key":"1650_CR6","doi-asserted-by":"crossref","unstructured":"Hu, P., Portmann, M., Robinson, R., & Indulska, J. (2008). Context-aware routing in wireless mesh networks. In ACM CASEMANS.","DOI":"10.1145\/1367943.1367945"},{"key":"1650_CR7","doi-asserted-by":"crossref","unstructured":"Reaz, A., Ramamurthi, V., Ghosal, D., Benko, J., Li, W., Dixit, S., & Mukherjee, B. (2008). Enhancing multi-hop wireless mesh networks with a ring overlay. In IEEE SECON.","DOI":"10.1109\/SAHCNW.2008.18"},{"key":"1650_CR8","unstructured":"GENI (2006). Technical document on wireless virtualization. \n                    http:\/\/www.geni.net\/\n                    \n                  ."},{"key":"1650_CR9","unstructured":"Madwifi. \n                    http:\/\/madwifi-project.org\/\n                    \n                  ."},{"key":"1650_CR10","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/1592631.1592642","volume-title":"PRESTO","author":"D Giustiniano","year":"2009","unstructured":"Giustiniano, D., Llairo, E. G., Toledo, A. L., & Rodriguez, P. (2009). Wiswitcher: An efficient client for managing multiple aps. In P. Crowley, D. A. Maltz, & J. E. van der Merwe (Eds.), PRESTO (pp. 43\u201348). New York: ACM."},{"key":"1650_CR11","unstructured":"Shrestha, S., Lee, J., & Chong, S. (2008). Virtualization and slicing of wireless mesh network. In Conference on future internet (CFI)."},{"key":"1650_CR12","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/11907381_18","volume-title":"Autonomic management of mobile multimedia services","author":"G Ding","year":"2006","unstructured":"Ding, G., Vicente, J., Rungta, S., Krishnaswamy, D., Chan, W., & Miao, K. (2006). Overlays on wireless mesh networks: Implementation and cross-layer searching. In A. Helmy, B. Jennings, L. Murphy, & T. Pfeifer (Eds.), Autonomic management of mobile multimedia services (Vol. 4267, pp. 171\u2013182)., Lecture notes in computer science Berlin: Springer. \n                    https:\/\/doi.org\/10.1007\/1190738118\n                    \n                  ."},{"key":"1650_CR13","unstructured":"Quer, G., Baldo, N., & Zorzi, M. (2011). Cognitive call admission control for VOIP over IEEE 802.11 using Bayesian networks. In Global telecommunications conference (GLOBECOM 2011) (pp. 1\u20136). IEEE."},{"key":"1650_CR14","doi-asserted-by":"crossref","unstructured":"Chen, Z., Wang, L., Zhang, F., Wang, X., & Chen, W. (2008). Voip over wlans by adapting transmitting interval and call admission control. In IEEE international conference on communications, 2008 (ICC \u201908) (pp. 3242\u20133246).","DOI":"10.1109\/ICC.2008.610"},{"key":"1650_CR15","doi-asserted-by":"crossref","unstructured":"Piacentini, E., Fonseca, M., & Munaretto, A. (2008) Voip call admission control for last mile wireless mesh networks. In Wireless Days, 2008. (WD \u201908), 1st IFIP (pp. 1\u20135).","DOI":"10.1109\/WD.2008.4812897"},{"key":"1650_CR16","doi-asserted-by":"crossref","unstructured":"Sridhar, K., & Chan, M. C. (2006). Interference based call admission control for wireless ad hoc networks. In 3rd annual international conference on mobile and ubiquitous systems-workshops, 2006 (pp. 1\u201310).","DOI":"10.1109\/MOBIQW.2006.361730"},{"issue":"11","key":"1650_CR17","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1109\/TMC.2007.1045","volume":"6","author":"I-H Ho","year":"2007","unstructured":"Ho, I.-H., & Liew, S. C. (2007). Impact of power control on Performance of IEEE 802.11 wireless networks. IEEE Transactions on Mobile Computing, 6(11), 1245\u20131258.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"1650_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1096-8","author":"S Kandasamy","year":"2015","unstructured":"Kandasamy, S., Marques, C., Cal\u00e7ada, T., Ricardo, M., Matos, R., & Sargento, S. (2015). Call admission control for wireless mesh network based on power interference modeling using directional antenna. Wireless Networks,. \n                    https:\/\/doi.org\/10.1007\/s11276-015-1096-8\n                    \n                  .","journal-title":"Wireless Networks"},{"issue":"1","key":"1650_CR19","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1049\/iet-com.2010.1031","volume":"6","author":"Y Li","year":"2012","unstructured":"Li, Y., Wang, C., You, X., Chen, H. H., & She, W. (2012). Delay and throughput performance of IEEE 802.16 WiMax mesh networks. IET Communications, 6(1), 107\u2013115. \n                    https:\/\/doi.org\/10.1049\/iet-com.2010.1031\n                    \n                  .","journal-title":"IET Communications"},{"key":"1650_CR20","doi-asserted-by":"crossref","unstructured":"Li, Y., Zhang, X., Zhuang, H., & You, X. (2011). An end-to-end QoS assurance method in IEEE 802.16 mesh networks. In Global telecommunications conference (GLOBECOM 2010) IEEE (pp. 1\u20136). \n                    http:\/\/dx.doi.org\/10.1109\/GLOCOM.2010.5683155","DOI":"10.1109\/GLOCOM.2010.5683155"},{"key":"1650_CR21","doi-asserted-by":"crossref","unstructured":"Li, Y., Wei, D., Zhuang, H., Wang, H., & Wang, P. (2009). A new congestion control method for IEEE 802.16 mesh mode. In 2009 international conference on communication software and networks, Macau (pp. 726\u2013730). \n                    http:\/\/dx.doi.org\/10.1109\/ICCSN.2009.118","DOI":"10.1109\/ICCSN.2009.118"},{"key":"1650_CR22","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.comnet.2014.06.022","volume":"74","author":"R Matos","year":"2014","unstructured":"Matos, R., Marques, C., & Sargento, S. (2014). Context-aware control of user-centric virtual networks: Centralized vs distributed approaches. Elsevier Journal of Computer Networks, 74, 4\u201321. \n                    https:\/\/doi.org\/10.1016\/j.comnet.2014.06.022\n                    \n                  .","journal-title":"Elsevier Journal of Computer Networks"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-017-1650-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-017-1650-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-017-1650-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T16:42:29Z","timestamp":1558543349000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-017-1650-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,3]]},"references-count":22,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["1650"],"URL":"https:\/\/doi.org\/10.1007\/s11276-017-1650-7","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2018,1,3]]},"assertion":[{"value":"3 January 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}