共 50 条
- [41] Dynamic programming method analyzing a variation of the leaky bucket scheme [J]. PROCEEDINGS OF 1999 SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 1999, : 355 - 362
- [42] Leaky Bucket Model for Autonomic Control of Distributed, Collaborative Systems [J]. 2013 IEEE 8TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI 2013), 2013, : 483 - 488
- [43] Performance analysis of a Leaky Bucket scheme with a threshold in the data buffer [J]. Comput Networks ISDN Syst, 7 (781-795):
- [48] Leaky Bucket based congestion control in Wireless Sensor Networks [J]. 2018 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2018, : 172 - 174
- [49] A MICROPROGRAM-BASED HARDWARE IMPLEMENTATION OF THE LEAKY BUCKET ALGORITHM [J]. MICROPROCESSING AND MICROPROGRAMMING, 1991, 33 (02): : 91 - 99
- [50] Letter: Paying for a Dirty and Leaky Bucket: Further Comments on the Bailout [J]. ECONOMISTS VOICE, 2008, 5 (07):