共 50 条
- [3] Discrete-time analysis of the leaky bucket scheme with threshold-based token generation intervals IEE PROCEEDINGS-COMMUNICATIONS, 1996, 143 (02): : 105 - 111
- [4] A scalable architecture for fair leaky-bucket shaping IEEE INFOCOM '97 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, PROCEEDINGS, VOLS 1-3: SIXTEENTH ANNUAL JOINT CONFERENCE OF THE IEEE COMPUTER AND COMMUNICATIONS SOCIETIES - DRIVING THE INFORMATION REVOLUTION, 1997, : 1054 - 1062
- [6] Performance analysis of leaky-bucket bandwidth enforcement algorithm in ATM networks High Technology Letters, 1997, 3 (01): : 54 - 58
- [7] Video compression with output traffic conforming to leaky-bucket network access control INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL II, 1996, : 441 - 444
- [8] Performance analysis of leaky-bucket controlled Pareto-distributed on/off sources ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, 2003, : 1685 - 1696