A heuristic framework for source policing in ATM networks
- 1 January 1994
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE/ACM Transactions on Networking
- Vol. 2 (4) , 387-397
- https://doi.org/10.1109/90.330419
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- ATM: bandwidth assignment and bandwidth enforcement policiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Peak rate enforcement in ATM networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1992
- Effectiveness of the 'leaky bucket' policing mechanism in ATM networksIEEE Journal on Selected Areas in Communications, 1991
- Modeling and performance comparison of policing mechanisms for ATM networksIEEE Journal on Selected Areas in Communications, 1991
- Source-independent call acceptance procedures in ATM networksIEEE Journal on Selected Areas in Communications, 1991
- Prediction of bit rate sequences of encoded video signals (for ISDN)IEEE Journal on Selected Areas in Communications, 1991
- Effective bandwidths at multi-class queuesQueueing Systems, 1991
- On the Geo/D/1 and Geo/D/1/n queuesPerformance Evaluation, 1990
- New directions in communications (or which way to the information age?)IEEE Communications Magazine, 1986
- Quantile Processes with Statistical ApplicationsPublished by Society for Industrial & Applied Mathematics (SIAM) ,1983