Last update: Fri Jan 5 02:05:58 MST 2018
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Lombardo:1993:APM,
author = "A. Lombardo and S. Palazzo and D. Panno and R.
Pignatelli and L. Susanna",
title = "An adaptive policing mechanism for a {DQDB MAN}",
journal = j-COMP-NET-ISDN,
volume = "25",
number = "10",
pages = "1119--1126",
month = may,
year = "1993",
CODEN = "CNISE9",
ISSN = "0169-7552 (print), 1879-2324 (electronic)",
ISSN-L = "0169-7552",
bibdate = "Sat Sep 25 15:30:02 1999",
bibsource = "ftp://ftp.ira.uka.de/pub/bibliography/Distributed/QLD/1993.bib;
http://www.math.utah.edu/pub/tex/bib/compnetisdn.bib",
acknowledgement = ack-nhfb,
annote = "The traffic source bandwidth enforcement mechanism for
DQDB networks described in this paper exploits the
access mechanisms provided for in the DQDB standard
while it does not introduce any extra network
signalling load nor it affects network performance. The
mechanism is called Adaptive Leaky Bucket.",
country = "NL",
date = "00/00/00",
descriptors = "DQDB; POLICING FUNCTION; LEAKY BUCKET",
enum = "8264",
journal-URL = "http://www.sciencedirect.com/science/journal/01697552",
language = "English",
location = "UniS-IND; UniS-IND-MAC_C",
references = "10",
revision = "19/10/93",
town = "Amsterdam",
}
Related entries
- adaptive,
10(1)7,
22(4)235,
24(1)93,
25(6)663,
26(6)757,
28(3)391,
28(3)401,
29(5)569,
30(1)291,
30(22)2149,
30(22)2169
- any,
12(2)81,
26(3)253,
27(2)193,
27(2)273,
30(1)225
- bandwidth,
11(2)121,
12(2)99,
13(4)301,
16(3)217,
18(z)243,
20(1)189,
20(1)351,
22(4)287,
24(2)119,
24(5)367,
25(2)203,
25(3)295,
25(6)599,
25(10)1065,
26(1)43,
26(1)61,
26(3)253,
26(6)799,
26(9)1129,
26(9)1215,
26(11)1375,
28(3)351,
28(3)391,
28(6)855,
28(7)1445,
29(16)1969,
30(16)1707
- bucket,
28(4)453,
29(7)781,
30(19)1775
- called,
25(10)1107
- described,
13(2)75,
25(10)1107,
28(13)1723
- do,
12(2)81,
14(2)331,
20(1)171,
27(6)1009
- DQDB,
24(2)145,
24(2)153,
24(5)367,
25(10)1107,
25(11)1177,
25(12)1279,
26(6)679,
26(6)695,
26(12)1503,
27(5)653,
27(7)1137,
30(11)1013
- enforcement,
25(3)295
- introduce,
25(12)1279
- leaky,
28(4)453,
29(7)781
- load,
10(1)7,
11(2)99,
12(2)81,
25(11)1205,
25(12)1335,
26(4)447,
29(2)157,
29(8)977,
30(16)1687
- Lombardo, A.,
29(16)1881
- MAN,
25(10)1107,
25(12)1279,
26(2)163,
28(4)583
- mechanism,
11(2)121,
15(1)67,
15(2)97,
16(5)383,
24(4)311,
24(5)367,
26(3)253,
26(10)1281,
26(12)1523,
27(7)1137,
28(7)1445,
28(13)1723,
29(8)1467,
30(16)1627,
30(19)1749,
30(19)1763,
30(20)1865
- not,
12(2)81,
12(2)89,
18(z)243,
20(1)171,
24(2)153,
25(z)z-4,
27(2)273,
27(2)289,
27(6)1009,
30(22)2253,
30(24)2293
- paper,
10(3)211,
11(z)277,
12(2)81,
12(2)89,
12(3)159,
13(2)65,
13(2)75,
13(2)91,
14(3)3,
16(1)64,
16(4)311,
17(3)201,
18(1)31,
18(13)1845,
20(1)15,
20(1)137,
20(1)171,
20(1)369,
20(1)435,
24(3)199,
24(4)311,
25(6)599,
25(9)1019,
25(10)1089,
25(10)1107,
25(10)1127,
25(11)1177,
25(11)1205,
26(3)253,
26(3)269,
26(z)z-1,
27(2)135,
27(2)193,
27(2)205,
27(2)273,
27(2)289,
28(13)1845,
30(19)1735,
30(24)2293
- policing,
20(1)369,
24(4)311
- provided,
21(3)149,
27(2)289
- signalling,
23(4)287,
26(3)253,
26(12)1495
- source,
20(1)435,
27(2)193,
27(7)1175,
29(8)1317,
29(17)2139,
30(1)612,
30(24)2293
- standard,
9(3)201,
9(4)267,
9(5)339,
10(3)157,
10(5)259,
11(2)87,
11(2)121,
11(5)353,
11(z)277,
12(3)159,
12(4)209,
12(4)225,
12(4)235,
13(3)149,
13(3)149,
13(3)229,
13(4)323,
14(1)25,
14(1)79,
14(2)123,
14(2)291,
15(1)61,
15(4)269,
16(1)21,
16(1)31,
16(1)83,
16(1)138,
16(1)143,
16(1)153,
16(1)167,
16(5)405,
17(2)77,
17(4)284,
17(4)287,
17(4)337,
19(2)95,
21(3)149,
25(8)933,
25(11)1177,
26(2)233,
26(11)1365,
27(1)1,
27(3)367,
27(6)823,
27(6)985,
27(6)1009,
28(7)1095,
29(15)1843,
30(1)23,
30(16)1571
- while,
12(3)159,
18(z)243,
20(1)171,
20(1)351