Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,924,074 papers from all fields of science
Search
Sign In
Create Free Account
Token bucket
Known as:
Hierarchical token bucket
, Token Bucket algorithm
, Token Bucket Filter
Expand
The token bucket is an algorithm used in packet switched computer networks and telecommunications networks. It can be used to check that data…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
Algorithm
Bandwidth management
Bucket (computing)
Burst transmission
Expand
Broader (1)
Network performance
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Efficient, Real-World Token Bucket Configuration for Residential Gateways
Fengyu Gao
,
Hongyan Qian
IEEE/ACM Transactions on Networking
2016
Corpus ID: 11755458
Internet service providers should deploy effective active queue management (AQM) strategies to provide high-bandwidth low-latency…
Expand
2013
2013
Stability analysis of inverter based generator emulator in test-bed for power systems
Liu Yang
,
Xiaohu Zhang
,
+6 authors
K. Tomsovic
IEEE Energy Conversion Congress and Exposition
2013
Corpus ID: 22378645
In this project to develop a reconfigurable electrical grid emulator, a Hardware Test-Bed (HTB) is being developed that emulates…
Expand
2009
2009
Mathematical remarks on Token Bucket
Benedek Kovács
International Conference on Software…
2009
Corpus ID: 13949359
This paper provides the reader a discussion and analysis of Token Bucket call gapping mechanism at signalling level. A continuous…
Expand
2007
2007
Detection of DDoS and IDS Evasion Attacks in a High-Speed Networks Environment
J. Oh
,
Sang-Kil Park
,
Jongsoo Jang
,
Yong-Hee Jeon
2007
Corpus ID: 14957753
Summary BcN(Broadband convergence Networks) is being deployed in order to support a variety of network applications such as…
Expand
2005
2005
TOKEN BUCKETS FOR OUTGOING SPAM PREVENTION
W. Gansterer
,
H. Hlavacs
,
Michael Ilger
,
P. Lechner
,
Jürgen Strauss
2005
Corpus ID: 15935261
In this paper we propose a concept for preventing unsolicited bulk e-mail (UBE, “spam”) at the outgoing SMTP server. In…
Expand
2003
2003
Information utility of token bucket regulator
A. Karandikar
,
P. Shah
2003
Corpus ID: 110303637
A traffic flow constrained by a token bucket regulator is considered and analysed from an information theoretic point of view…
Expand
2002
2002
Estimation of token bucket parameters for aggregated VoIP sources
R. Garroppo
,
S. Giordano
,
M. Pagano
International Journal of Communication Systems
2002
Corpus ID: 15568557
The paper presents an analytical study aimed to establish a dimensioning procedure for the token bucket algorithm, used as a…
Expand
2001
2001
The token bucket allocation and reallocation problems (MPRASE token bucket)
O. Heckmann
,
F. Rohmer
,
J. Schmitt
2001
Corpus ID: 3768623
This paper deals with the dimensioning of token buckets. Two related problems are formulated and solved. The first is the token…
Expand
2000
2000
Estimation of token bucket parameters of VoIP traffic
R. Bruno
,
R. Garroppo
,
Stefano Giordano
ATM . Proceedings of the IEEE Conference on High…
2000
Corpus ID: 61151885
We present a procedure to evaluate the parameters of the LEAP (linear bounded arrival processes) traffic characterisation when a…
Expand
1997
1997
Efficient Bulk-Loading of Gridfiles
Scott T. Leutenegger
,
D. Nicol
IEEE Transactions on Knowledge and Data…
1997
Corpus ID: 14842396
This paper considers the problem of bulk-loading large data sets for the gridfile multiattribute indexing technique. We propose a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE