Draft Recommendation 1.371, CCITT Period 1989-1992, July 1992.[2]Rathgeb E P. IEEE Journal of Selected Areas in Communication, 1991, 9(3):325-332.[3]Turner J S. IEEE Commun. Mag., 1986, 24(10): 15-18.[4]Cidon I, Gopal I S.[J]. International Journal of Digital Analog Cabled Systems.1988,1(2):7786-[5]Sidi M, et al. Congestion Control Through Input Rate Regulation. Proc. GLOBECOM,59, Dal[6]last 1989, 1764-1768.[7]Ahmadi H, et al. Analysis of Leaky Bucket Access Control Mechanism with Batch Arrival Process, Proc. GLOBECOM'90, San Diego: 1990. 344-349.[8]Khosrow Sohraby, et al. On the Performance of Bursty and Correlated Sources Subject to Leaky Bucket Rate Based Access Control Schemes, Proc. INFOCOM'91, Bat Harbour: 1991, 426-434.[9]Butto M, et al. IEEE Journal of Selectecd Areas in Communication, 1991, 9(3):335-342.[10]Nanyin Yin, et al. Analysis of Leaky Bucket Algorithm for On-Off Data Sources. Proc., GLOBECOM'91. Phoenix: 1991. 254-260.[11]Kim Y H, et al. Comp[J].Commu. 1SDN Systems.1992, 25(3):295-303[12]孙海荣.城域网介质访问控制协议及性能研究:[博士论文].电子科技大学,成都,1993.
|