Jitter in ATM Networks and its Impact on Peak Rate Enforcement
暂无分享,去创建一个
[1] Phuoc Tran-Gia,et al. Approximate Performance Analysis of the DQDB Acess Protocol , 1990, Comput. Networks ISDN Syst..
[2] I. Adan,et al. QUEUEING THEORY , 1978 .
[3] Jorma T. Virtamo,et al. The Superposition of Variable Bit Rate Sources in an ATM Multiplexer , 1991, IEEE J. Sel. Areas Commun..
[4] G. Niestegge,et al. The leaky bucket policing method in the ATM network , 1990 .
[5] Thomas L. Saaty,et al. Elements of queueing theory , 2003 .
[6] Jorma Virtamo,et al. Evaluating buffer requirements in an ATM multiplexer , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.
[7] Fabrice Guillemin,et al. Peak rate enforcement in ATM networks , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.
[8] Gerd Niestegge,et al. The ‘leaky bucket’ policing method in the ATM (asynchronous transfer mode) network , 1990 .
[9] A. E. Eckberg,et al. AN APPROACH TO CONTROLLING CONGESTION IN ATM NETWORKS , 1990 .
[10] H. D. Miller. Combinatorial methods in the theory of stochastic processes , 1968, Comput. J..
[11] Lajos Takács,et al. Combinatorial Methods in the Theory of Stochastic Processes , 1967 .
[12] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.