Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 84 matches
- 2020
- Miltiadis Alamaniotis:
Fuzzy Leaky Bucket System for Intelligent Management of Consumer Electricity Elastic Load in Smart Grids. Frontiers Artif. Intell. 3: 1 (2020) - Yaming Zhang, Yaya Hamadou Koura, Yanyuan Su:
SIR approach in modeling data packets forwarding at a leaky bucket. Int. J. Model. Simul. Sci. Comput. 11(5): 2050043:1-2050043:13 (2020) - 2018
- Miltiadis Alamaniotis, Iosif Papadakis Ktistakis:
Fuzzy Leaky Bucket with Application to Coordinating Smart Appliances in Smart Homes. ICTAI 2018: 878-883 - 2017
- Xiangyu Chen, Ka-Cheong Leung, Albert Y. S. Lam:
Leaky bucket-inspired power output smoothing with load-adaptive algorithm. ICC 2017: 1-6 - 2016
- Miltiadis Alamaniotis, Antonia Nasiakou, Rafik Fainti, Lefteri H. Tsoukalas:
Leaky bucket approach implementing anticipatory control for nodal power flow management in smart energy systems. ISGT Europe 2016: 1-6 - Jie Chu, Ping Ji:
The privacy leaky bucket: your mobile devices: poster. MobiHoc 2016: 395-396 - 2014
- Muhammad T. Alam, Sai Zhang:
Leaky bucket like packet controller for SAVI. CCECE 2014: 1-4 - 2013
- Bogdan Solomon, Dan Ionescu, Cristian Gadea, Stejarel Veres, Marin Litoiu:
Leaky bucket model for autonomic control of distributed, collaborative systems. SACI 2013: 483-488 - 2012
- Sami S. Alwakeel, Shaker S. AlGhanmi:
A real time leaky bucket based admission control scheme for VoIP networks. ICMCS 2012: 651-656 - Osman Ugus, Dirk Westhoff, Hariharan Rajasekaran:
A leaky bucket called smartphone. PerCom Workshops 2012: 374-380 - Karima B. Hein, Leander B. Hörmann, Reinhold Weiss:
Using a leaky bucket counter as an advanced threshold mechanism for event detection in wireless sensor networks. WISES 2012: 51-56 - 2011
- Zhengyong Feng, Guangjun Wen, Zixuan Zou, Chang Wen Chen:
Wireless Video Streaming QoS Guarantees Based on Virtual Leaky Bucket. GLOBECOM 2011: 1-6 - 2010
- Stefano Bregni, Paolo Giacomazzi, Gabriella Saddemi:
Characterization of long-range dependent traffic regulated by leaky-bucket policers and shapers. Comput. Commun. 33(6): 714-720 (2010) - 2009
- Paolo Giacomazzi:
Variance envelopes of the output traffic of leaky bucket policers. IEEE Trans. Commun. 57(4): 937-939 (2009) - 2007
- Stefano Bregni, Paolo Giacomazzi, Gabriella Saddemi:
Properties of the Traffic Output by a Leaky-Bucket Policer with Long-Range Dependent Input Traffic. ICC 2007: 603-609 - Paolo Giacomazzi, Luigi Musumeci, Gabriella Saddemi, Giacomo Verticale:
Analytical Methods for Resource Allocation and Admission Control with Dual-Leaky-Bucket Regulated Traffic. ICC 2007: 499-505 - Gianluca Rizzo, Jean-Yves Le Boudec:
Generalization of the RIN Result to Heterogeneous Networks of Aggregate Schedulers and Leaky Bucket Constrained Flows. ICON 2007: 388-393 - Amir Seyfi, Farid Ashtiani:
Effect of Leaky-Bucket-Based Traffic Shaping on Capacity Enhancement for VSG-CDMA Cellular Networks. WCNC 2007: 3692-3696 - 2006
- Yen Chieh Ouyang, Ching-Wen Yang, Wei Shi Lian:
Neural networks based variable bit rate traffic prediction for traffic control using multiple leaky bucket. J. High Speed Networks 15(2): 111-122 (2006) - 2005
- Theofanis Orphanoudakis, Christos N. Charopoulos, Helen-Catherine Leligou:
Leaky-bucket shaper design based on time interval grouping. IEEE Commun. Lett. 9(6): 573-575 (2005) - Ping Li, Weisi Lin, Susanto Rahardja, Xiao Lin, Xiaokang Yang, Zhengguo Li:
Geometrically determining the leaky bucket parameters for video streaming over constant bit-rate channels. Signal Process. Image Commun. 20(2): 193-204 (2005) - Wenjun Luo, Arulsaravana Jeyaraj, Magda El Zarki:
Optimal resource allocation and leaky bucket based power control for CBR MIMO systems. IPCCC 2005: 561-566 - Nicola Blefari-Melazzi, John N. Daigle, Mauro Femminella:
On the modeling of voice sources regulated by dual leaky buckets. MASCOTS 2005: 345-356 - 2004
- Daniel C. Lee:
Worst average queueing delay of multiple leaky-bucket-regulated streams and jumping-window regulated stream. J. Commun. Networks 6(1): 78-87 (2004) - Bárbara González-Arévalo:
Performance of a Leaky Bucket System with Long-Range Dependent Input Traffic. Queueing Syst. Theory Appl. 46(3-4): 439-459 (2004) - Chung-Ju Chang, Chung-Hsun Yu, Chih-Sheng Chang, Li-Fong Lin:
Intelligent leaky bucket algorithms for sustainable-cell-rate usage parameter control in ATM networks. IEEE Trans. Multim. 6(5): 749-759 (2004) - Kwan-Woong Kim, Sang-Tae Lee, Dae-Ik Kim, Mike Myung-Ok Lee, Byoung-Sil Chon:
Leaky Bucket Based Buffer Management Scheme for TCP/IP Traffic over GFR Service. HSNMC 2004: 224-232 - Ping Li, Weisi Lin, Susanto Rahardja, Xiao Lin, Xiaokang Yang, Zhengguo Li:
Geometrically determining leaky bucket parameters for video streaming over constant bit-rate channels. ICASSP (3) 2004: 153-156 - Edgar den Boef, Jan H. M. Korst, Wim F. J. Verhaegh:
Optimal Bus and Buffer Allocation for a Set of Leaky-Bucket-Controlled Streams. ICT 2004: 1337-1346 - Kwan-Woong Kim, Sang-Tae Lee, Dae-Ik Kim, Mike Myung-Ok Lee:
Leaky Bucket Based Buffer Management Scheme to Support Differentiated Service in Packet-Switched Networks. SAPIR 2004: 291-300
skipping 54 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-08 08:42 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint