Draft Recommendation I.371, CCITT Period 1989-1992, July 1992.[2]顾学道.异步转换模式(ATM)的研究现状与前景.通信学报,1994, 15(3): 1-15.[3]Michael G H, et al. On the queueing behavior of multiplexed leaky bucket regulated sources. Proc. IEEE INFOCOM93, San Francisco, USA: 1993, 672-679.[4]Ren J F.[J].et al. Asymptotic analysis of a leaky bucket controlled ATM multiplexes. Proc. IEEE ICC93, Geneva Switzerland.1386,1993:-. Asymptotic analysis of a leaky bucket controlled ATM multiplexes. Proc. IEEE ICC' target='_blank'>[5]Anwar I E, Debasis M. Fluid models for the analysis and design of multiple classes of bursty traffic. Proc. IEEE INFOCOM92, Florence, Italy: 1992, 415-425.[6]孙海荣,李乐民.ATM网络中漏桶算法在突发业务输入时的性能分析.电子科学学刊,1995, 17(1): 48-54.[7]Sidi M, et al. Congestion control through input rate regulation. IEEE Trans. on COM, 1993, COM-41(3): 471-477.[8]Yin N, Michael G H. Analysis of the leaky bucket algorithm for ON-OFF data sources. Proc IEEE GLOBECOM91, Phenix, USA: 1991, 254-260.[9]蒋志刚,李乐民.ATM网络中漏桶流量控制特性的研究.通信学报,1994, 15(3): 102-108.[10]邓永录,梁之舜编著.随机点过程及其应用.北京:科学出版社,1992,447-455.[11]Stefano G, Achille P. Performance analysis of traffic patterns. Proc. IEEE INFOCOM93, San Francison, USA: 1993, 943-952.[12]Keilson J. Sojourn times, exit times, and fitter in multivariable Markov process. Adv. Appl. Prob., 1974, 13(6): 747-756.[13]孙海荣,李乐民编著.ATM技术:概念,原理和应用.成都:电子科技大学出版社,1995.
|