Leaky bucket

Known as: Leaky bucket algorithm, Leaky bucket counter, Leaky mothertrucking bucket 
The leaky bucket is an algorithm that may be used to determine whether some sequence of discrete events conforms to defined limits on their average… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1978-2017
010203019782017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
In this letter, we propose an extension of the conventional leaky bucket (LB) algorithm which we call recurrent leaky bucket (RLB… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
Is this relevant?
2011
2011
With recent rapid advances in wireless communication and networking, the demand for wireless video streaming is exploding. Unlike… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2007
2007
  • D. S. Holtsinger
  • 2007
The leaky bucket policing mechanism has been proposed for use as part of an overall preventive congestion control strategy in… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2005
2005
A new shaper design based on the concept of time interval grouping, which targets accurate shaping for large numbers of variable… (More)
  • figure 1
Is this relevant?
1998
1998
Due to the strong experimental evidence that the traffic to be offered to future broadband networks will display long-range… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
1997
1997
This paper presents a shaper architecture that scales to a large number of connections with diverse bursti-ness and bandwidth… (More)
Is this relevant?
1996
1996
  • V. G. KulkarniandN
  • 1996
In this paper we propose a new uniied approach to address simultaneously the issues of traac policing (using leaky buckets… (More)
Is this relevant?
1994
1994
UE to the difficulties in reacting to congestion in highD speed networks, preventive congestion control (PCC) have received… (More)
Is this relevant?
1994
1994
In this paper we use fast simulation methods, based on importance sampling, to efficiently estimate cell loss probability in… (More)
  • table 1
  • table 2
Is this relevant?
1992
1992
Kim Y.H., B.C. Shin and C.K. Un. Performance analysis of leaky-bucket bandwidth enforcement strategy for bursty traffics in an… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?