𝔖 Bobbio Scriptorium
✦   LIBER   ✦

The worst case analysis of algorithm on multiple stacks manipulation

✍ Scribed by Been-Chian Chien; Wei-Pang Yang


Publisher
Elsevier Science
Year
1992
Tongue
English
Weight
396 KB
Volume
44
Category
Article
ISSN
0020-0190

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Lettereffect of enhanced leaky bucket pa
✍ Wu, Jung-Shyr ;Su, Shyh-Wen πŸ“‚ Article πŸ“… 1998 πŸ› John Wiley and Sons 🌐 English βš– 658 KB

In ATM networks, various usage parameter control (UPC) strategies are used to regulate incoming traffic according to the characteristics of the sources declared at call set-up. Among these UPC schemes, the Leaky Bucket method is well-known and has been discussed extensively. In this paper, we study