Token bucket

Results: 14



#Item
1

PDF Document

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2002-09-21 13:43:36
2Control Architecture for Tuning Intensity and Burstiness of Traffic Qiong Li Wireless Communications and Networking Department Philips Research USA 345 Scarborough Road, Briarcliff Manor, NY[removed]qiong-stan.li@philips.c

Control Architecture for Tuning Intensity and Burstiness of Traffic Qiong Li Wireless Communications and Networking Department Philips Research USA 345 Scarborough Road, Briarcliff Manor, NY[removed]qiong-stan.li@philips.c

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2002-09-21 13:43:36
3Providing Conformance of the Negotiated QoS using Traffic Conditioning for Heterogeneous Services in WCDMA Radio Access Networks  Frank Yong Li and Norvald Stol Department of Telematics Norwegian University of Science a

Providing Conformance of the Negotiated QoS using Traffic Conditioning for Heterogeneous Services in WCDMA Radio Access Networks  Frank Yong Li and Norvald Stol Department of Telematics Norwegian University of Science a

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2002-09-06 09:04:10
4PriorityMeister: Tail Latency QoS for Shared Networked Storage Timothy Zhu∗ Alexey Tumanov∗ Michael A. Kozuch† Mor Harchol-Balter∗ Gregory R. Ganger∗

PriorityMeister: Tail Latency QoS for Shared Networked Storage Timothy Zhu∗ Alexey Tumanov∗ Michael A. Kozuch† Mor Harchol-Balter∗ Gregory R. Ganger∗

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2014-10-14 11:44:01
5ADSL Bandwidth Management HOWTO  Dan Singletary <dvsing@sonicspike.net> Revision History Revision 1.3

ADSL Bandwidth Management HOWTO Dan Singletary Revision History Revision 1.3

Add to Reading List

Source URL: www.tldp.org

Language: English - Date: 2008-12-14 11:52:39
6CH A P T E R  6 Policing Traffic It is critical that network resources are available to customers. When network resources are overloaded

CH A P T E R 6 Policing Traffic It is critical that network resources are available to customers. When network resources are overloaded

Add to Reading List

Source URL: www.cisco.com

Language: English
7Traffic Control using tcng and HTB HOWTO  Version[removed]Martin A. Brown linux−ip.net Network Administration

Traffic Control using tcng and HTB HOWTO Version[removed]Martin A. Brown linux−ip.net Network Administration

Add to Reading List

Source URL: ibiblio.org

Language: English - Date: 2006-11-08 09:37:54
8Traffic Control HOWTO  Version[removed]Martin A. Brown linux−ip.net <martin@linux−ip.net>

Traffic Control HOWTO Version[removed]Martin A. Brown linux−ip.net

Add to Reading List

Source URL: ibiblio.org

Language: English - Date: 2006-11-08 09:41:58
98th IEEE International Symposium on Applied Computational Intelligence and Informatics • May 23–25, 2013 • Timisoara, Romania  Leaky Bucket Model for Autonomic Control of Distributed, Collaborative Systems Marin Li

8th IEEE International Symposium on Applied Computational Intelligence and Informatics • May 23–25, 2013 • Timisoara, Romania Leaky Bucket Model for Autonomic Control of Distributed, Collaborative Systems Marin Li

Add to Reading List

Source URL: www.savinetwork.ca

Language: English - Date: 2013-10-15 16:18:36
10Microsoft Word - home22-bauer.docx

Microsoft Word - home22-bauer.docx

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2011-12-19 16:26:53