Login / Signup
CAC procedures for leaky bucket-constrained sources.
Guillaume Urvoy
Yves Dallery
Gérard Hébuterne
Published in:
Perform. Evaluation (2000)
Keyphrases
</>
information sources
databases
multiple sources
cellular networks
case study
search procedures
call admission control
objective function
data structure
resource allocation
knowledge sources
admission control