Token bucket

Known as: Hierarchical token bucket, Token Bucket algorithm, Token Bucket Filter 
The token bucket is an algorithm used in packet switched computer networks and telecommunications networks. It can be used to check that data… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
This paper provides the reader a discussion and analysis of Token Bucket call gapping mechanism at signalling level. A continuous… (More)
Is this relevant?
2006
2006
The IEEE 802.16 standard was designed for Wireless Metropolitan Area Network (WMAN). It supports QoS and has very high… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 9
  • figure 7
Is this relevant?
2006
2006
The IEEE 802.16 standard was designed for Wireless Metropolitan Area Network (WMAN). The coverage of this new technology is… (More)
  • figure 1
  • table I
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
2005
2005
In this paper we propose a concept for preventing unsolicited bulk e-mail (UBE, “spam”) at the outgoing SMTP server. In… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2003
2003
We propose an adaptive token bucket algorithm for achieving proportional sharing of bandwidth among aggregate flows in… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2002
2002
The token bucket characterization provides a deterministic yet concise representation of a traf®c source. In this paper, we study… (More)
Is this relevant?
2001
2001
This paper deals with the dimensioning of token buckets. Two related problems are formulated and solved. The first is the token… (More)
  • figure 2
  • figure 4
  • figure 6
  • figure 7
  • figure 8
Is this relevant?
Highly Cited
2000
Highly Cited
2000
The Differentiated services (diffserv) architecture has been proposed as a scalable solution for providing service… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2000
2000
In this papel; we present an experimental transport protocol which employs alternative methods of startup and congestion… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This paper investigated the problem of deriving token bucket parameters from the observed traffic patterns of computer network… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?