Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,168,459 papers from all fields of science
Search
Sign In
Create Free Account
Leaky bucket
Known as:
Leaky bucket algorithm
, Leaky bucket counter
, Leaky mothertrucking bucket
The leaky bucket is an algorithm that may be used to determine whether some sequence of discrete events conforms to defined limits on their average…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
Algorithm
Bandwidth management
Bucket (computing)
Burst transmission
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2006
Highly Cited
2006
The Cleft revealed: Geologic, magnetic, and morphologic evidence for construction of upper oceanic crust along the southern Juan de Fuca Ridge
D. Stakes
,
M. Perfit
,
M. Tivey
,
D. Caress
,
T. Ramirez
,
N. Maher
2006
Corpus ID: 55214846
The geology and structure of the Cleft Segment of the Southern Juan de Fuca Ridge (JdFR) have been examined using high‐resolution…
Expand
Highly Cited
2004
Highly Cited
2004
Dynamic fair scheduling with QoS constraints in multimedia wideband CDMA cellular networks
Liang Xu
,
Xuemin Shen
,
J. Mark
IEEE Transactions on Wireless Communications
2004
Corpus ID: 11778236
A class of dynamic fair scheduling schemes based on the generalized processor sharing (GPS) fair service discipline, under the…
Expand
Highly Cited
2002
Highly Cited
2002
E-commerce processes: a study of criticality
G. Duffy
,
B. Dale
Industrial management & data systems
2002
Corpus ID: 6031986
This paper, based on interviews undertaken with consultants experienced in e‐commerce engagements, has identified ten process…
Expand
2001
2001
Inequality measurement and the leaky-bucket paradox
C. Seidl
2001
Corpus ID: 117013761
The transfer principle requires inequality measures to decrease for mean preserving contractions. How much leakage of transfers…
Expand
1995
1995
Leaky bucket access control for VBR MPEG video
P. Pancha
,
M. Zarki
Proceedings of INFOCOM'95
1995
Corpus ID: 38226197
The leaky bucket (LB) access control scheme has been widely proposed as the usage parameter control (UPC) mechanism at the user…
Expand
1995
1995
Performance limitation of the leaky bucket algorithm for ATM networks
N. Yamanaka
,
Youichi Sato
,
Ken-ichi Sato
IEEE Transactions on Communications
1995
Corpus ID: 35950412
The performance limitation of the "leaky bucket algorithm" is analyzed for usage parameter control and traffic management in…
Expand
1992
1992
Discrete time analysis of leaky-bucket congestion control
Guo-Liang Wu
,
J. Mark
[Conference Record] SUPERCOMM/ICC '92 Discovering…
1992
Corpus ID: 34288317
The authors investigate the effectiveness of the leaky bucket as a traffic smoother and the effect on the system performance as…
Expand
Highly Cited
1991
Highly Cited
1991
On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes
K. Sohraby
,
M. Sidi
IEEE INFCOM '91. The conference on Computer…
1991
Corpus ID: 17849328
The analysis of a rate-based access control scheme in high speed environments that is based on a buffered leaky bucket algorithm…
Expand
Highly Cited
1990
Highly Cited
1990
The ‘leaky bucket’ policing method in the ATM (asynchronous transfer mode) network
G. Niestegge
1990
Corpus ID: 61562656
The new asynchronous transfer mode (ATM) will be used for the information transport in the future broadband network. An important…
Expand
Highly Cited
1980
Highly Cited
1980
Die-off of Fecal Indicator Organisms Following Land Application of Poultry Manure1
Stuart R. Crane
,
P. Westerman
,
M. Overcash
1980
Corpus ID: 13372770
Land-applied animal manure can be a major contributor of agricultural nonpoint source pollution. For surface-applied manures the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE