On the performance of bursty and modulated sources subject to leaky bucket rate-based access control schemes
- 1 February 1994
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Communications
- Vol. 42 (2/3/4) , 477-487
- https://doi.org/10.1109/tcomm.1994.577075
Abstract
No abstract availableThis publication has 16 references indexed in Scilit:
- Meeting the challenge: congestion and flow control strategies for broadband information transportPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Congestion control through input rate regulationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A performance model of the credit manager algorithmComputer Networks and ISDN Systems, 1992
- Modeling and performance comparison of policing mechanisms for ATM networksIEEE Journal on Selected Areas in Communications, 1991
- A calculus for network delay. I. Network elements in isolationIEEE Transactions on Information Theory, 1991
- A single-server queue with server vacations and a class of non-renewal arrival processesAdvances in Applied Probability, 1990
- Robustness of Rootfinding in Single-Server Queueing ModelsINFORMS Journal on Computing, 1990
- Recursive computation of steady-state probabilities in priority queuesOperations Research Letters, 1990
- Paris: An approach to integrated high‐speed private networksInternational Journal of Communication Systems, 1988
- Asymptotic behavior of the stationary distributions in the GI/PH/c queue with heterogeneous serversProbability Theory and Related Fields, 1981