Academic literature on the topic 'Leaky Bucket Algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Leaky Bucket Algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Leaky Bucket Algorithm"
Lee, J. Y., and C. K. Un. "Performance of dynamic rate leaky bucket algorithm." Electronics Letters 29, no. 17 (1993): 1560. http://dx.doi.org/10.1049/el:19931040.
Full textLekcharoen, Somchai. "An Adaptive Fuzzy Control Double Leaky Bucket Using Backoff Time and Backpressure in Policing Mechanism Schemes over VDSL Network." ECTI Transactions on Electrical Engineering, Electronics, and Communications 6, no. 2 (2007): 107–16. http://dx.doi.org/10.37936/ecti-eec.200862.171771.
Full textZhigang, Jiang, and Li Lemin. "Analysis of the leaky bucket algorithm for priority services." Journal of Electronics (China) 13, no. 4 (1996): 333–38. http://dx.doi.org/10.1007/bf02734906.
Full textYamanaka, N., Y. Sato, and K. Sato. "Performance limitation of the leaky bucket algorithm for ATM networks." IEEE Transactions on Communications 43, no. 8 (1995): 2298–300. http://dx.doi.org/10.1109/26.403760.
Full textIndumathi, P., S. Shanmugavel, and HC Mahesh. "Buffered Leaky Bucket Algorithm for Congestion Control in ATM Networks." IETE Journal of Research 48, no. 1 (2002): 59–67. http://dx.doi.org/10.1080/03772063.2002.11416256.
Full textBai, Junfeng, Qingmin Liao, and Xinggang Lin. "Leaky-bucket based rate control algorithm for C_VBR video encoding." Electronics Letters 35, no. 18 (1999): 1529. http://dx.doi.org/10.1049/el:19991064.
Full textMerayo, Luis A., Juan I. Solana, and Luisa Mola. "A microprogram-based hardware implementation of the Leaky Bucket algorithm." Microprocessing and Microprogramming 33, no. 2 (1991): 91–99. http://dx.doi.org/10.1016/0165-6074(91)90020-t.
Full textYin, Nanying, and Michael G. Hluchyj. "Analysis of the Leaky Bucket Algorithm for ON-OFF Data Sources." Journal of High Speed Networks 2, no. 1 (1993): 81–98. http://dx.doi.org/10.3233/jhs-1993-2104.
Full textHairong, Sun, and Li Lemin. "Performance analysis of leaky bucket algorithm with bursty traffic input in ATM networks." Journal of Electronics (China) 12, no. 2 (1995): 105–12. http://dx.doi.org/10.1007/bf02778434.
Full textAdjaidoo, Theresa-Samuelle, and Emmanuel Kofi Akowuah. "A proposed Ghanaian intercity public transport departure scheduling model based on the dynamic rate leaky bucket algorithm." Scientific African 12 (July 2021): e00749. http://dx.doi.org/10.1016/j.sciaf.2021.e00749.
Full textDissertations / Theses on the topic "Leaky Bucket Algorithm"
Pereira, Michelle Miranda. "Simulação e análise comparativa dos métodos do mecanismo de policiamento dual leaky bucket em chaves ATM para classe de serviço VBR para tráfegos de vídeo." Universidade de São Paulo, 2002. http://www.teses.usp.br/teses/disponiveis/76/76132/tde-07042015-170053/.
Full textLin, Fang-Ting, and 林芳廷. "Design of Leaky Bucket Based Admission Control and Dynamic Bandwidth Allocation Algorithm for WiMAX MAC." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/61078800825321815913.
Full textDube, Parijat. "Measurement Based Optimal Source Shaping In Integrated Services Packet Networks." Thesis, 1999. https://etd.iisc.ac.in/handle/2005/1675.
Full textDube, Parijat. "Measurement Based Optimal Source Shaping In Integrated Services Packet Networks." Thesis, 1999. http://etd.iisc.ernet.in/handle/2005/1675.
Full textSun, Cheng-Lun, and 孫正倫. "On Self-similar Traffic Regulation in ATM Networks: Using Multiple Leaky Buckets Algorithm." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/01347172325596857631.
Full textSun, Cheng Lun, and 孫正倫. "On Self-similar Traffic Regulation in ATM Networks: Using Multiple Leaky Buckets Algorithm." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/91311026809378714826.
Full textBook chapters on the topic "Leaky Bucket Algorithm"
Dunn, Michael, and Tony Hope. "3. A toolbox of reasoning." In Medical Ethics: A Very Short Introduction. Oxford University Press, 2018. http://dx.doi.org/10.1093/actrade/9780198815600.003.0003.
Full textConference papers on the topic "Leaky Bucket Algorithm"
Chen, Xiangyu, Ka-Cheong Leung, and Albert Y. S. Lam. "Leaky bucket-inspired power output smoothing with load-adaptive algorithm." In ICC 2017 - 2017 IEEE International Conference on Communications. IEEE, 2017. http://dx.doi.org/10.1109/icc.2017.7996944.
Full textWang, Chundong, Qing Chang, Quancai Deng, and Huaibin Wang. "Network-worm-control technology based on the front buffer two-stage leaky bucket algorithm." In 2010 International Conference on Intelligent Control and Information Processing (ICICIP). IEEE, 2010. http://dx.doi.org/10.1109/icicip.2010.5564161.
Full text