1 |
M. Butto, E. Cavallero, and A. Tonietti, Effectiveness of the leaky bucket policing mechanism in ATM networks, IEEE J. Sel. Areas Commun. 9 (1991), no. 3, 335-342
DOI
ScienceOn
|
2 |
J. Zeng and L. F. Merakos, Analysis of a priority leaky bucket regulator for virtual path traffic in ATM networks, Proceedings of IEEE Globecom'94. 1994, 606-611
|
3 |
M. Sidi, Z. Lin, I. Cidon, and I. Gopal, Congestion control through input rate regulation, Proceedings of IEEE Globecom'89 ( 1989)
|
4 |
K. Sohraby and M. Sidi, On the performance of bursty and modulated sources subject to leaky bucket rate based access control schemes, IEEE Trans. on Commun. 42 (1994), 477-487
DOI
ScienceOn
|
5 |
H. Ahmadi, R. Guerin, and K. Sohraby, Analysis of leaky bucket access control mechanism with batch arrival process, IEEE Globecom'90 (1990), 344-349
|
6 |
B. D. Choi and D. I. Choi, Discrete-time analysis of the leaky bucket scheme with threshold-based token generation intervals, IEE Proc. Commun. 143 (1996), 105-111
|
7 |
B. D. Choi and D. I. Choi, The discrete-time analysis of the leaky bucket scheme with dynamic leacky rate control, Comm. Korean. Math. Soc. 13 (1998), no. 3, 603-627
|
8 |
J. Y. Lee and C. K. Un, Performance of dynamic rate leaky bucket algorithm, IEE Electron. Lett. 29 (1993), no. 17, 1560-1561
DOI
ScienceOn
|
9 |
D. I. Choi, B. D. Choi, and D. K. Sung, Performance analysis of priority leaky bucket scheme with queue-length-threshold scheduling policy, IEE Proc. Commun. 145 (1998), no. 6, 395-401
|
10 |
Y. H. Kim, B. C. Shin, and C. K. Un, Performance analysis of leaky bucket band-width enforcement strategy for bursty traffics in an ATM networks, Computer Networks ISDN Syst. 25(1992), 295-303
DOI
ScienceOn
|
11 |
C. G. Park, B. D. Choi, and D. K. Sung, Performance analysis of leaky bucket scheme with a threshold in the data buffer, Computer Networks ISDN Syst. 29 (1997), 781-795
DOI
ScienceOn
|
12 |
J. Tunner, New directions in communications(or Which way to the information age), IEEE Communi. Mag. 24 (1986), 17-24
|
13 |
G. L. Wu and J. W. Mark, Discrete time analysis of leaky bucket congestion control, Computer Networks ISDN Syst. 26 (1993), 79-94
DOI
ScienceOn
|