"CAC procedures for leaky bucket-constrained sources."

Guillaume Urvoy, Yves Dallery, Gérard Hébuterne (2000)
a service of Schloss Dagstuhl - Leibniz Center for Informatics