On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes | IEEE Conference Publication | IEEE Xplore