Bounds for multiplexing leaky-bucket enforced sources in ATM networks

Jung Shyr Wu, Fang Jang Kuo

Research output: Contribution to journalArticlepeer-review

Fingerprint

Dive into the research topics of 'Bounds for multiplexing leaky-bucket enforced sources in ATM networks'. Together they form a unique fingerprint.

Keyphrases

Computer Science