Using token allocations in a leaky bucket scheme | IEEE Conference Publication | IEEE Xplore