Login / Signup

CAC procedures for leaky bucket-constrained sources.

Guillaume UrvoyYves DalleryGérard Hébuterne
Published in: Perform. Evaluation (2000)
Keyphrases
  • information sources
  • databases
  • multiple sources
  • cellular networks
  • case study
  • search procedures
  • call admission control
  • objective function
  • data structure
  • resource allocation
  • knowledge sources
  • admission control