Limpar
550 resultados

Acesso aberto

Tipo do recurso

Tipo de base de dados

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Jornais Acesso aberto

Robert Satchwell, David Johannsen, Khurram Dastgir-Khan, Jack Cheng, Gordon Bridger, John Pointon, Roger Woolfe, Ian Petrie, Guenther Grunert,

... budget Brutal elves in the woods Ecoterrorism The leaky bucket Energy shortage The north-west salmon gets squeezed ...

2001 - Gale Group | The Economist

Artigo Revisado por pares

Dirk Abendroth, Martin E. Eckel, Ulrich Killat,

... scheduling algorithms leaned on the well-known token bucket and leaky bucket shaping/policing algorithms. The performance of the presented ...

Tópico(s): Advanced Queuing Theory Analysis

2005 - Elsevier BV | AEU - International Journal of Electronics and Communications

Artigo Acesso aberto Revisado por pares

Abhay Parekh, Robert G. Gallager,

... bounds on delay and backlog are derived for leaky bucket constrained sessions in arbitrary topology networks of generalized ... When only a subset of the sessions are leaky bucket constrained, we give succinct per-session bounds that ... that exceeds the token arrival rate of its leaky bucket. A much broader class of networks, called consistent ... case in which all of the sessions are leaky bucket constrained. First, an algorithm is presented that characterizes ...

Tópico(s): Software-Defined Networks and 5G

1994 - Institute of Electrical and Electronics Engineers | IEEE/ACM Transactions on Networking

Artigo Revisado por pares

B. Patel, Chatschik Bisdikian,

... prominent congestion control solution in ATM networks. The "leaky bucket" with a "cell spacer" is a very popular traffic-shaping approach. By sizing the leaky bucket and spacer parameters, an end station shapes its ... a "good behaviour" contract with the network. The leaky bucket delays the transmission of a selected number of ... we study, through simulations, the contribution of the leaky bucket plus cell spacer subsystem to the delay and ...

Tópico(s): Advanced Optical Network Technologies

1996 - Institute of Electrical and Electronics Engineers | IEEE Network

Artigo Acesso aberto

S. Radhakrishnan, S. V. Raghavan, Ashok K. Agrawala,

... of their effectiveness in smoothing the burstiness. The Leaky Bucket (LB) scheme, to cite an example, is a ...

Tópico(s): Advanced Queuing Theory Analysis

1996 - Elsevier BV | Computer Networks and ISDN Systems

Artigo

Young Han Kim, Byung Chul Shin, C.K. Un,

Tópico(s): Advanced Wireless Network Optimization

1992 - Elsevier BV | Computer Networks and ISDN Systems

Artigo Revisado por pares

Chi-Tung Chang, Chia-Mu Yu, Chia‐Wei Chang, Li-Feng Lin,

In this paper, we propose two intelligent leaky bucket algorithms for sustainable-cell-rate usage parameter control of multimedia transmission in asynchronous transfer mode networks. One is the fuzzy leaky bucket algorithm, in which a fuzzy increment controller (FIC) is incorporated with the conventional leaky bucket algorithm; the other is the neural fuzzy leaky bucket algorithm, where a neural fuzzy increment controller (NFIC) is added with the conventional leaky bucket algorithm. Both the FIC and the NFIC properly ...

Tópico(s): Advanced Queuing Theory Analysis

2004 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Multimedia

Artigo

B.D. Choi, D.I. Choi,

In the ATM network, the leaky bucket scheme is a promising method that regulates input traffics for preventive congestion control. In order to satisfy the loss probability constraint ... bursty input traffic, it is known that the leaky bucket scheme with static token generation interval requires larger ... waiting time for input traffic to pass the leaky bucket scheme, which would be inappropriate for real time ... as voice and video. The authors present the leaky bucket scheme with threshold-based token generation intervals in ...

Tópico(s): Wireless Communication Networks Research

1996 - Institution of Engineering and Technology | IEE Proceedings - Communications

Artigo

Gerd Niestegge,

... is bandwidth enforcement or policing. The so‐called ‘leaky bucket’ algorithm can be used to monitor and enforce ... bit rate (CBR) connection. The parameters of the ‘leaky bucket’ algorithm depend on the bit rate of the ... jitter. Sugestions for setting the parameters of the ‘leaky bucket’ algorithm are provided in this paper. Furthermore, a ‘dual leaky bucket’ algorithm is proposed to police the traffic parameters ... a variable bit rate (VBR) connection. The ‘dual leaky bucket’ approach could also be used to define a ...

Tópico(s): Advanced Optical Network Technologies

1990 - Wiley | International Journal of Digital & Analog Communication Systems

Artigo Revisado por pares

M. Butto, Elisa Cavallero, A. Tonietti,

The performance of the leaky bucket, a device for controlling the source traffic parameters of an ATM network is analyzed. The most critical situation, i.e., ... the customer premises network is not considered. The leaky bucket can be analyzed as a G/D/1/ ... the aim of assessing the effectiveness of the leaky bucket mechanism. It is concluded that while the leaky bucket can easily control the peak rate, difficulties arise ...

Tópico(s): Advanced Wireless Network Optimization

1991 - Institute of Electrical and Electronics Engineers | IEEE Journal on Selected Areas in Communications

Artigo

Guoliang Wu, J.W. Mark,

... traffic control tends to use only local information. Leaky bucket has been introduced as a rate control method. ... present paper studies the system performance of a leaky bucket controller with the arrivals being Poisson processes or ... is sufficient to attain the capability of a leaky bucket controller; increasing the size of the controller will ... performance. Controlling MMPP type of arrivals with a leaky bucket device may incur low performance especially when the ...

Tópico(s): Wireless Communication Networks Research

1993 - Elsevier BV | Computer Networks and ISDN Systems

Artigo Revisado por pares

Jing-Fei Ren, J.W. Mark, J.W. Wong,

... number of input sources, each controlled by a leaky-bucket mechanism. The outputs from the leaky-buckets are fed to a statistical multiplexer. The cell level loss occurs at the individual leaky-buckets and the burst level loss occurs at the ... use a unified state space representation for the leaky-buckets-multiplexer system and a spectral expansion method to ...

Tópico(s): Advanced Optical Network Technologies

1994 - Elsevier BV | Performance Evaluation

Artigo Revisado por pares

K. Sohraby, M. Sidi,

... in high speed environments based on a buffered leaky bucket algorithm. The analysis is carried out in discrete ... ATM environment. For the cell arrivals to the leaky bucket the authors consider a general discrete Markovian arrival ... source, and increasing the bucket size of the leaky bucket does not improve substantially the performance at the ...

Tópico(s): Distributed systems and fault tolerance

1994 - IEEE Communications Society | IEEE Transactions on Communications

Artigo Revisado por pares

Naoaki Yamanaka, Y. Sato, Kazunobu Sato,

The performance limitation of the "leaky bucket algorithm" is analyzed for usage parameter control and traffic management in asynchronous transfer mode (ATM) networks. Simulation results show that the ... the cell interarrival time moments" permitted by the leaky bucket algorithm, can not guarantee the quality of service ( ... VC/VP bandwidth allocation method based on the leaky bucket algorithm is unsatisfactory. >

Tópico(s): Petri Nets in System Modeling

1995 - IEEE Communications Society | IEEE Transactions on Communications

Artigo

D.I. Choi, Bo‐Ran Choi, Dan Keun Sung,

The leaky bucket scheme is a promising method that regulates input traffic for preventive congestion control in ATM networks. One ... real-time traffics. The authors propose a priority leaky bucket scheme with queue-length-threshold scheduling policy. The motivation of this proposed leaky bucket scheme is to meet the quality of service ...

Tópico(s): Advanced Wireless Network Optimization

1998 - Institution of Engineering and Technology | IEE Proceedings - Communications

Artigo Revisado por pares

Kenneth Mitchell, Appie van de Liefvoort, J. Place,

... paper we focus on the behavior of the leaky bucket mechanism with respect to second-order statistics of ... correlation of the inter-departure times for the leaky bucket cell departure stream and we produce numerical examples for the lag-k auto-correlation of the leaky bucket inter-departure times for several different cell arrival ...

Tópico(s): Statistical Distribution Estimation and Applications

1998 - Elsevier BV | Computer Communications

Artigo Revisado por pares

Yen‐Chieh Ouyang, Ching‐Wen Yang, Wei Shi Lian,

... a novel feedback rate regulator using the multiple leaky bucket (MLB) for variable bit rate (VBR) self-similar ... the leak rate and buffer capacity of each leaky bucket (LB) can be dynamically adjusted based on the ... can be significantly reduced compare to the conventional leaky bucket method.

Tópico(s): Software-Defined Networks and 5G

2006 - IOS Press | Journal of High Speed Networks

Artigo Acesso aberto Revisado por pares

Hakem Beitollahi, Geert Deconinck,

... upstream routers close to traffic sources to install leaky-buckets for its IP address. The negotiation continues until ... through a feedback-control process adjusts size of leaky-buckets until inbound traffic locates in a desired range ( ... subsequently asks corresponding defense routers to remove the leaky-bucket limitations for those port interfaces. Additionally, the server amends size of leaky-buckets for the defense routers proportional to amount of ...

Tópico(s): Advanced Malware Detection Techniques

2012 - Elsevier BV | Procedia Computer Science

Artigo Revisado por pares

Wei Ding,

... channel rate control algorithm for ATM networks with leaky buckets as open-loop source flow control models. The ... imposed by the encoder and decoder buffers, the leaky bucket control, traffic smoothing, and rate control. The encoder ... rate control. It can improve the problem of leaky bucket saturation exhibited in previous works. Experimental results with ...

Tópico(s): Advanced Wireless Network Optimization

1997 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Circuits and Systems for Video Technology

Artigo Acesso aberto Revisado por pares

Chi-Yuan Hsu, Antonio Ortega, Amy R. Reibman,

... of constraints, including such popular ones as the leaky bucket, we introduce an algorithm to find the optimal ... end delay. Finally, we show that for the leaky-bucket channel, the channel constraints can be combined with ... infrequently imposed constraint. Therefore, video quality with a leaky-bucket channel can achieve the same quality of a ...

Tópico(s): Advanced Wireless Network Optimization

1997 - Institute of Electrical and Electronics Engineers | IEEE Journal on Selected Areas in Communications

Artigo Acesso aberto Revisado por pares

Shahrokh Valaee,

The leaky-bucket regulator has several potential roles in the operation of future transport networks; among them, the bounding of ... such cases, a recursive algorithm for setting the leaky-bucket parameters may prove useful. We devise such an algorithm here. The leaky-bucket parameters are computed recursively over a limited period ...

Tópico(s): Advanced Optical Network Technologies

2001 - Institute of Electrical and Electronics Engineers | IEEE/ACM Transactions on Networking

Artigo

Tzu-Chieh Tsai, Chi-Hong Jiang, Chuang-Yin Wang,

The IEEE 802.16 standard was designed for Wireless Metropolitan Area Network (WMAN). The coverage of this new technology is expanded up to 50 km. IEEE 802.16 also has inherent QoS mechanism while the transmission rate can be up to 70Mbps. However, the main part of 802.16 - packet scheduling, was not defined and left as an open issue. In this paper, we present an uplink packet scheduling with call admission control (CAC) mechanism that is token bucket based. Also, a mathematical model of characterizing ...

Tópico(s): Advanced MIMO Systems Optimization

2006 - International Communication Association | Journal of Communications

Artigo Acesso aberto Revisado por pares

Masrure Alam, Mohammed Atiquzzaman, Mohammad A. Karim,

The Internet Engineering Task Force (IETF) has proposed the Guaranteed Service (GS) in the Integrated Services model with firm delay and bandwidth guarantees. In this paper, we study the effects of a token bucket traffic shaper at the source on the transmission characteristics of Motion Picture Experts Group (MPEG) compressed video streams over the GS. We develop an analytical model of the traffic shaper, and also carry out numerical simulation of the transmission performance using MPEG trace data ...

Tópico(s): Peer-to-Peer Network Technologies

2000 - Elsevier BV | Computer Communications

Artigo Acesso aberto

Sambit Sahu, Philippe Nain, Christophe Diot, Victor Firoiu, Don Towsley,

The Differentiated services (diffserv) architecture has been proposed as a scalable solution for providing service differentiation among flows without any per-flow buffer management inside the core of the network. It has been advocated that it is feasible to provide service differentiation among a set of flows by choosing an appropriate “marking profile” for each flow. In this paper, we examine (i) whether it is possible to provide service differentiation among a set of TCP flows by choosing appropriate ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2000 - Association for Computing Machinery | ACM SIGMETRICS Performance Evaluation Review

Artigo Acesso aberto Revisado por pares

Silvia Giordano,

... class of time varying shapers called time varying leaky bucket shapers; such shapers are defined by a fixed numbers of leaky buckets, whose parameters (rate and bucket size) are changed ...

Tópico(s): Advanced Optical Network Technologies

2000 - IOS Press | Journal of High Speed Networks

Artigo Revisado por pares

N.R. Figueira, Joseph Pasquale,

... servers provides an upper bound on delay for leaky bucket constrained sessions, i.e., sessions conforming to a ... given by PGPS. The authors also prove that leaky bucket constrained sessions are the only type of sessions ...

Tópico(s): Interconnection Networks and Systems

1995 - Institute of Electrical and Electronics Engineers | IEEE/ACM Transactions on Networking

Artigo Revisado por pares

Venkat Anantharam, Takis Konstantopoulos,

The leaky bucket is a simple flow control scheme for ATM networks. An arriving cell can be transmitted only if ...

Tópico(s): Advanced Wireless Network Optimization

1994 - IEEE Communications Society | IEEE Transactions on Communications

Artigo Acesso aberto Revisado por pares

J.-Y. Le Boudec,

... to demonstrate the equivalence of implementing a buffered leaky bucket controller based on either virtual finish times or ... is a fundamental difference between constraints based on leaky buckets and constraints based on general arrival curves, such ...

Tópico(s): Software-Defined Networks and 5G

2002 - Institute of Electrical and Electronics Engineers | IEEE/ACM Transactions on Networking

Artigo Revisado por pares

Jennifer Rexford, Flavio Bonomi, Albert Greenberg, A. Wong,

... travel through the network. This paper presents a leaky-bucket shaper architecture that scales to a large number ... between connections with conforming cells by carefully integrating leaky-bucket traffic shaping with rate-based scheduling algorithms. Through ...

Tópico(s): Advanced Optical Network Technologies

1997 - Institute of Electrical and Electronics Engineers | IEEE Journal on Selected Areas in Communications