Abstract:
We point out a flaw involved in the proof of Lemma 2 in the above-cited paper (IEEE/ACM Trans. Netw., vol. 17, no. 6, pp. 1846–1859, Dec. 2009) and provide a corrected ve...Show MoreMetadata
Abstract:
We point out a flaw involved in the proof of Lemma 2 in the above-cited paper (IEEE/ACM Trans. Netw., vol. 17, no. 6, pp. 1846–1859, Dec. 2009) and provide a corrected version.
Published in: IEEE/ACM Transactions on Networking ( Volume: 23, Issue: 4, August 2015)