Author of the publication

A leaky bucket with memory.

, , and . Broadband Communications, volume C-4 of IFIP Transactions, page 275-285. North-Holland, (1992)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing the Benefits of Incorporating Function Clone Detection in a Development Process., , , , and . ICSM, page 314-321. IEEE Computer Society, (1997)Measuring clone based reengineering opportunities, , , , and . page 292--303. IEEE Press, (November 1999)Software assessment using metrics: A comparison across large C++ and Java systems., , , , and . Ann. Softw. Eng., (2000)A Generalization of Some Policing Mechanisms., , and . INFOCOM, page 767-775. IEEE Computer Society, (1992)An Analysis Framework for Understanding Layered Software Architectures., , , , and . IWPC, page 37-44. IEEE Computer Society, (1998)A leaky bucket with memory., , and . Broadband Communications, volume C-4 of IFIP Transactions, page 275-285. North-Holland, (1992)On the capability of the policing function to release an ATM connection., , and . Telecommun. Syst., 2 (1): 239-259 (1993)A heuristic framework for source policing in ATM networks., and . IEEE/ACM Trans. Netw., 2 (4): 387-397 (1994)EMERALD: a case study in enhancing software reliability., , and . ISSRE Case Studies, page 85-91. IEEE, (1997)Datrix™ source code model and its interchange format: lessons learned and considerations for future work., , and . ACM SIGSOFT Softw. Eng. Notes, 26 (1): 53-56 (2001)