Efficient bandwidth allocation and call admission control for VBR service using UPC parameters
暂无分享,去创建一个
[1] Keith W. Ross,et al. Packet multiplexers with adversarial regulated traffic , 2002, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.
[2] R. Boorstyn,et al. Efficient loss estimation in high speed networks , 1998, 1998 IEEE ATM Workshop Proceedings. 'Meeting the Challenges of Deploying the Global Broadband Network Infrastructure' (Cat. No.98EX164).
[3] Linhai He,et al. Connection admission control design for GlobeView®-2000 ATM core switches , 1998, Bell Labs Technical Journal.
[4] Edward W. Knightly. On the accuracy of admission control tests , 1997, Proceedings 1997 International Conference on Network Protocols.
[5] Edward W. Knightly,et al. RED-VBR: a renegotiation-based approach to support delay-sensitive VBR video , 1997, Multimedia Systems.
[6] G. Ramamurthy,et al. Multi-class connection admission control policy for high speed ATM switches , 1997, Proceedings of INFOCOM '97.
[7] Donald F. Towsley,et al. Source time scale and optimal buffer/bandwidth trade-off for regulated traffic in an ATM node , 1997, Proceedings of INFOCOM '97.
[8] O. Aboul-Magd,et al. Performance evaluation of connection admission control techniques in ATM networks , 1996, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference.
[9] Brian L. Mark,et al. Real-time estimation of UPC parameters for arbitrary traffic sources in ATM networks , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.
[10] Debasis Mitra,et al. A New Approach for Allocating Buffers and Bandwidth to Heterogeneous Regulated Traffic in an ATM Node , 1995, IEEE J. Sel. Areas Commun..
[11] Walter Willinger,et al. Analysis, modeling and generation of self-similar VBR video traffic , 1994, SIGCOMM.
[12] Tom Worster,et al. Modelling Deterministic Queues: The Leaky Bucket as an Arrival Process , 1994 .
[13] Bharat T. Doshi,et al. Deterministic rule based traffic descriptors for broadband ISDN: worst case behavior and connection acceptance control , 1993, Proceedings of GLOBECOM '93. IEEE Global Telecommunications Conference.
[14] G. Pacifici,et al. Modeling video sources for real-time scheduling , 1993, Proceedings of GLOBECOM '93. IEEE Global Telecommunications Conference.
[15] Debasis Mitra,et al. Effective bandwidth of general Markovian traffic sources and admission control of high speed networks , 1993, IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings.
[16] Atm Forum. ATM user-network interface (UNI) specification : version 3.1 , 1993 .
[17] Ken-ichi Sato,et al. Performance Limitation of Leaky Bucket Algorithm for Usage Parameter Control and Bandwidth Allocation Methods , 1992 .
[18] Hamid Ahmadi,et al. Equivalent Capacity and Its Application to Bandwidth Allocation in High-Speed Networks , 1991, IEEE J. Sel. Areas Commun..
[19] J. Y. Hui,et al. Resource allocation for broadband networks , 1988, IEEE International Conference on Communications, - Spanning the Universe..