References
- J. Turner, New directions in communications (or Which way to the information age?), IEEE Comm. Magazine, 24, 1986, 8–15.
- G. Woodruff, R. Rogers, & P. Richards, A congestion control framework for high-speed integrated padcetized transport, Proc. of the IEEE Conf. on Global Coram. (GLOBECOM), 1988, 7.1.1.–1.1.5.
- H. Ahmadi, R. Guerin, & K. Sohraby, Analysis of a rate-based access control mechanism for high-speed networks, IEEE Trans. on Coram., 41, 1993, 940–950.
- V. Anatharam & T. Konstantopoulos, Burst reduction properties of the leaky bucket flow control scheme in ATM networks, IEEE Trans. on Comm., 42, 1994, 3085–3089.
- K. Budka, Stochastic monotonidty and concavity properties of rate-based flow control mechanisms, IEEE Trans. on Automatic Control, 39(1194), 544–548.
- L. Gun, V. Kulkarni, & A. Narayanan, Bandwidth allocation and access control in high-speed networks, Annals of Operations Research, 49, 1994, 161–183.
- A. Berger, Performance analysis ofa rate control throttle where tokens and jobs queue, IEEE J. on Selected Areas in Commun., 9, 1991, 165–170.
- M. Bhutto, E. Cavallero, & A. Tonietti, Effectiveness of the leaky bucket policing mechanism in ATM networks, IEEE J. on Selected Areas in Communications, 9, 1991, 335–342.
- M.G. Hluchyj & N. Yin, On the queueing behavior of multiplexed leaky bucket regulated sources, Proc. of ike Conf. on Computer Communications (IEEE Infocom), 2, 1993, 672–679.
- D. Lee, Effects of leaky bucket parameters on the average queueing delay: Worst case analysis, Proc. of the Conf. on Computer Communications (IEEE Info.), 1994, 482–489.
- K. Sohraby & M. Sidi, On the performance of bursty and modulated sources subject to leaky bucket rate-based access control schemes, IEEE Trans. on Comm., 42, 1994, 477–487.
- Y.H. Kim, B.C. Shin, & C.K. Un, Performance analysis of leaky-bucket bandwidth enforcement strategy for bursty traffics in an ATM network, Computer Networks and ISDN Sys., 25, 1992, 295–303.
- G. Wu & J. Mark, Discrete time analysis of leaky-bucket congestion control, Computer Networks and ISDN Sys., 26, 1993, 79–94.
- D. Logothetis & K. Trivedi, Transient analysis of the leaky bucket rate control scheme under Poisson and on-off sources, Proc. of the Conf. on Computer Communications (IEEE Infocom), 1994, 490–497.
- A. van de Liefvoort, The moment problem for continuous distributions, Tech. Report CM-1990-02, University of Missouri-Kansas City, 1990.
- G. Golub & C. van Loan, Matrix computations (Baltimore: Johns Hopkins University Press, 1996).
- L. Lipsky, Queueing theory: A linear algebraic approach (New York: Macmillan, 1992).
- A. van de Liefvoort, A sum space characterization of G/G/1/N type queues, Tech. Report TR-87-5, University of Kansas, Lawrence, KS, 1987.
- A. van de Liefvoort & L. Lipsky, A matrix algebraic solution to two km servers in a loop, J. of the ACM, 33, 1986, 207–233.
- W. Hsin, Performance analysis of teletraffic models with renewal distributions, Ph.D. Thesis, University of Missiour-Kansas City, 1995.
- K. Mitchell & A. van de Liefvoort, Approximating the deterministic distribution with the matrix exponential distribution, unpublished.
- K. Mitchell, A. van de liefvoort, & J. Place, Correlation properties of the token leaky bucket departure process, Computer Communications (1998) (in press).
- K. Mitchell, A. van de Liefvoort, & J. Place, Transient call blocking for a server with leaky bucket policing, Proc. 5th Inter. Conf. on Telecomm S Modeling and Analysis, 1997, 47–54.
- K. Mitchell, A. van de Liefvoort, & J. Place, The impact of μ3 of the cell arrival distribution on μ1 of the cell departure distribution, unpublished.