On the performance of bursty and modulated sources subject to leaky bucket rate-based access control schemes | IEEE Journals & Magazine | IEEE Xplore