On the queueing behavior of multiplexed leaky bucket regulated sources
暂无分享,去创建一个
[1] C.A. Cooper,et al. Toward a broadband congestion control strategy , 1990, IEEE Network.
[2] Israel Cidon,et al. Paris: An approach to integrated high‐speed private networks , 1988 .
[3] Arthur W. Berger,et al. Performance analysis of a rate control throttle where tokens and jobs queue , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.
[4] Moshe Sidi,et al. On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes , 1991, IEEE INFCOM '91. The conference on Computer Communications. Tenth Annual Joint Comference of the IEEE Computer and Communications Societies Proceedings.
[5] David M. Lucantoni,et al. Meeting the challenge: congestion and flow control strategies for broadband information transport , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.
[6] Debasis Mitra,et al. Analysis and design of rate-based congestion control of high speed networks, I: stochastic fluid models, access regulation , 1991, Queueing Syst. Theory Appl..
[7] J. Turner,et al. New directions in communications (or which way to the information age?) , 1986, IEEE Communications Magazine.
[8] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[9] Nanying Yin,et al. Analysis of the Leaky Bucket Algorithm for ON-OFF Data Sources , 1993, J. High Speed Networks.
[10] P. S. Richards,et al. A congestion control framework for high-speed integrated packetized transport , 1988, IEEE Global Telecommunications Conference and Exhibition. Communications for the Information Age.
[11] Debasis Mitra,et al. Stochastic fluid models in the analysis of access regulation in high speed networks , 1991, IEEE Global Telecommunications Conference GLOBECOM '91: Countdown to the New Millennium. Conference Record.
[12] H. Ahmadi,et al. Analysis of leaky bucket access control mechanism with batch arrival process , 1990, [Proceedings] GLOBECOM '90: IEEE Global Telecommunications Conference and Exhibition.
[13] Nanying Yin,et al. Analysis of the leaky bucket algorithm for on-off data sources , 1991, IEEE Global Telecommunications Conference GLOBECOM '91: Countdown to the New Millennium. Conference Record.