default search action
Deepinder P. Sidhu
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c38]Anil Jangam, Deepinder P. Sidhu:
nlsrSIM: Porting and Simulation of Named-data Link State Routing Protocol into ndnSIM. DIVANet@MSWiM 2017: 39-46 - 2014
- [c37]Ravi Teja Koganti, Deepinder P. Sidhu:
Analysis of Routing and Wavelength Assignment in Large WDM Networks. FNC/MobiSPC 2014: 71-78
2000 – 2009
- 2005
- [j26]Jorge Arturo Cobb, Mohamed G. Gouda, Deepinder P. Sidhu:
Hello again: Stabilization of the Hello protocol in OSPF. J. High Speed Networks 14(1): 39-57 (2005) - 2004
- [c36]Ying Zhang, Deepinder P. Sidhu:
A Multicast Protection Algorithm for Optical WDM Networks. ICCCN 2004: 315-320 - 2003
- [c35]Ying Zhang, Aniruddha Rangnekar, Ali Aydin Selçuk, Ali Biçak, Deepinder P. Sidhu:
A performance comparison of zone-based multicast protocols for mobile ad hoc networks. ICON 2003: 543-548 - 2002
- [j25]Gargi Banerjee, Deepinder P. Sidhu:
Comparative analysis of path computation techniques for MPLS traffic engineering. Comput. Networks 40(1): 149-165 (2002) - [j24]Ali Aydin Selçuk, Deepinder P. Sidhu:
Probabilistic optimization techniques for multicast key management. Comput. Networks 40(2): 219-234 (2002) - 2001
- [j23]Ishan P. Weerakoon, Deepinder P. Sidhu:
Simulation and analysis of Awerbuch-Peleg and GSM schemes for location tracking of mobile users. Int. J. Commun. Syst. 14(1): 69-81 (2001) - [c34]Gargi Banerjee, Deepinder P. Sidhu:
Label switched path restoration under two random failures. GLOBECOM 2001: 30-34 - [c33]Vijay Devarapalli, Deepinder P. Sidhu:
MZR: a multicast protocol for mobile ad hoc networks. ICC 2001: 886-891 - [c32]Gargi Banerjee, Deepinder P. Sidhu:
Path Computation for Traffic Engineering in MPLS Networks. ICN (2) 2001: 302-308 - [c31]Umang Choudhary, Edward Perl, Deepinder P. Sidhu:
Using T.38 and SIP for Real-Time Fax Transmission over IP Networks. LCN 2001: 74-81 - [c30]Ying Zhang, Deepinder P. Sidhu:
An Analysis Comparing Light-Tree and Lightpath in Wavelength Routed Optical Networks. LCN 2001: 486-487 - 2000
- [j22]Robert D. Rosenberry, Deepinder P. Sidhu:
Signaling network architectures in B-ISDN environments. J. High Speed Networks 9(2): 57-66 (2000) - [j21]Alexander L. Wijesinha, Srikanta P. Kumar, Deepinder P. Sidhu:
Handover and new call blocking performance with dynamic single-channel assignment in linear cellular arrays. Wirel. Networks 6(2): 121-129 (2000) - [j20]Ishan P. Weerakoon, Alexander L. Wijesinha, Deepinder P. Sidhu:
On properties of read and write sets in the Awerbuch-Peleg scheme for tracking mobile users. Wirel. Networks 6(3): 235-247 (2000) - [c29]Anthony Chung, Howard E. Motteler, Deepinder P. Sidhu:
On undetected faults in homogeneous methods for protocol testing. CATA 2000: 158-164 - [c28]Ali Aydin Selçuk, Deepinder P. Sidhu:
Probabilistic Methods in Multicast Key Management. ISW 2000: 179-193 - [c27]Sashi Lazar, Sethuram Balaji Kodeswaran, Rekuram Varadharaj, Deepinder P. Sidhu:
ATM Network Connection Management Using Mobile Agents. LCN 2000: 620-621 - [c26]Gargi Banerjee, Robert D. Rosenberry, Deepinder P. Sidhu:
Performance Analysis of IP Switching and Tag Switching. NETWORKING 2000: 752-762 - [c25]Christopher B. McCubbin, Ali Aydin Selçuk, Deepinder P. Sidhu:
Initialization Vector Attacks on the IPsec Protocol Suite. WETICE 2000: 171-175
1990 – 1999
- 1999
- [c24]Anthony Chung, Deepinder P. Sidhu:
A tool for simulating telecommunications networks and its application in networking courses. CATA 1999: 338-341 - [c23]Sashi Lazar, Deepinder P. Sidhu, Sethuram Balaji Kodeswaran, Rekuram Varadharaj:
ATM Network Discovery Using Mobile Agents. LCN 1999: 98-105 - 1998
- [j19]Deepinder P. Sidhu, Alexander L. Wijesinha:
Performance analysis of a constrained resource sharing system. Queueing Syst. Theory Appl. 29(2-4): 293-311 (1998) - [c22]Anthony Chung, Deepinder P. Sidhu:
A formal description technique and an environment for protocol engineering. CATA 1998: 131-135 - [c21]Sashi Lazar, Ishan P. Weerakoon, Deepinder P. Sidhu:
A Scalable Location Tracking and Message Delivery Scheme for Mobile Agents. WETICE 1998: 243-249 - 1996
- [j18]Alexander L. Wijesinha, Deepinder P. Sidhu, Srikanta P. Kumar:
Call blocking probabilities for dynamic and fixed assignment of a single channel in a linear cellular array. J. High Speed Networks 5(1): 35-51 (1996) - 1995
- [j17]Howard E. Motteler, Anthony Chung, Deepinder P. Sidhu:
Undetected faults in protocol testing. IEEE Trans. Commun. 43(8): 2289-2297 (1995) - 1994
- [j16]Deepinder P. Sidhu, Anthony Chung, Chun-Shi Chang:
Probabilistic testing of OSI protocols. IEEE Trans. Commun. 42(7): 2432-2440 (1994) - 1993
- [j15]Deepinder P. Sidhu, Howard E. Motteler, Raghu Vallurupalli:
On testing hierarchies for protocols. IEEE/ACM Trans. Netw. 1(5): 590-599 (1993) - [c20]Howard E. Motteler, Anthony Chung, Deepinder P. Sidhu:
Fault Coverage of UIO-based Methods for Protocol Testing. Protocol Test Systems 1993: 21-34 - [c19]Deepinder P. Sidhu, Tayang Fu, Shukri Abdallah, Raj Nair, Rob Coltun:
Open Shortest Path First (OSPF) Routing Protocol Simulation. SIGCOMM 1993: 53-62 - 1992
- [j14]Deepinder P. Sidhu:
Message from the Editor-in-Chief. J. High Speed Networks 1(1) (1992) - [j13]Deepinder P. Sidhu, Shukri Abdallah, Raj Nair:
Congestion Control in High Speed Networks via Alternate Path Routing. J. High Speed Networks 1(2): 129-144 (1992) - [c18]Anthony Chung, Deepinder P. Sidhu:
Applications of Sufficient Conditions for Efficient Protocol Test Generation. Protocol Test Systems 1992: 219-228 - [e1]Deepinder P. Sidhu, David Oran:
Proceedings of the Conference on Communications Architecture & Protocols, SIGCOMM 1992, Baltimore, Maryland, USA, August 17-20, 1992. ACM 1992, ISBN 0-89791-525-9 [contents] - 1991
- [j12]Deepinder P. Sidhu, Anthony Chung, Thomas P. Blumer:
Experience with formal methods in protocol development. Comput. Commun. Rev. 21(2): 81-101 (1991) - [c17]Deepinder P. Sidhu, Raj Nair, Shukri Abdallah:
Finding Disjoint Paths in Networks. SIGCOMM 1991: 43-51 - 1990
- [c16]Anthony Chung, Deepinder P. Sidhu:
Experience with an Estelle development system. Formal Methods in Software Development 1990: 8-17 - [c15]Deepinder P. Sidhu:
The first ten years, the next ten years. PSTV 1990: 47-68
1980 – 1989
- 1989
- [j11]Deepinder P. Sidhu, Thomas P. Blumer:
Semi-Automatic Implementation of OSI Protocols. Comput. Networks ISDN Syst. 18(3): 221-238 (1989) - [j10]Deepinder P. Sidhu, Ting-Kau Leung:
Formal Methods for Protocol Testing: A Detailed Study. IEEE Trans. Software Eng. 15(4): 413-426 (1989) - [j9]Anthony Chung, Deepinder P. Sidhu:
On Conditions for Defining a Closed Cover to Verify Progress for Communicating Finite State Machines. IEEE Trans. Software Eng. 15(11): 1491-1494 (1989) - [c14]Deepinder P. Sidhu, Anthony Chung:
Experience with Formal Methods in Protocol Development. FORTE 1989: 437-453 - [c13]Deepinder P. Sidhu, Chun-Shi Chang:
Probabilistic Testing of Protocols. SIGCOMM 1989: 295-302 - 1988
- [j8]Deepinder P. Sidhu, Carole S. Crall:
Executable Logic Specifications for Protocol Service Interfaces. IEEE Trans. Software Eng. 14(1): 98-121 (1988) - [j7]Deepinder P. Sidhu, Juan Aristizabal:
Constructing Submodule Specifications and Network Protocols. IEEE Trans. Software Eng. 14(11): 1565-1577 (1988) - [c12]Deepinder P. Sidhu, Ting-Kau Leung:
Fault coverage of protocol test methods. INFOCOM 1988: 80-85 - [c11]Deepinder P. Sidhu, Ting-Kau Leung:
Experience with test generation for real protocols. SIGCOMM 1988: 257-261 - 1987
- [j6]Thomas P. Blumer, Deepinder P. Sidhu:
Automated Verification of the Connection Management Aspects of the IEEE 802.2 Logical Link Control Protocol. IEEE Trans. Commun. 35(12): 1377-1379 (1987) - 1986
- [j5]Deepinder P. Sidhu:
Authentication Protocols for Computer Networks: I. Comput. Networks 11: 297-310 (1986) - [j4]Deepinder P. Sidhu, Thomas P. Blumer:
Verification of NBS Class 4 Transport Protocol. IEEE Trans. Commun. 34(8): 781-789 (1986) - [j3]Thomas P. Blumer, Deepinder P. Sidhu:
Mechanical Verification and Automatic Implementation of Communication Protocols. IEEE Trans. Software Eng. 12(8): 827-843 (1986) - 1985
- [i2]Deepinder P. Sidhu:
Some problems with the specification of the Military Standard Internet Protocol. RFC 963: 1-19 (1985) - [i1]Deepinder P. Sidhu, Thomas P. Blumer:
Some problems with the specification of the Military Standard Transmission Control Protocol. RFC 964: 1-10 (1985) - 1984
- [c10]Deepinder P. Sidhu, Robert H. Pollack:
A Robust Distributed Solution to the Generalized Dining Philosophers' Problem. ICDE 1984: 483-489 - [c9]Deepinder P. Sidhu:
Logic programming applied to hardware design specification and verification. MICRO 1984: 309-313 - [c8]Deepinder P. Sidhu, Thomas P. Blumer:
Some Problems with the Specification of the Military Standard Transmission Control Protocol. PSTV 1984: 375-381 - [c7]Deepinder P. Sidhu:
Executable Logic Specifications: A New Approach to Computer Security. S&P 1984: 142-153 - 1983
- [j2]Steven M. Kramer, Deepinder P. Sidhu:
Security Information Flow in Multidimensional Arrays. IEEE Trans. Computers 32(12): 1188-1191 (1983) - [c6]Deepinder P. Sidhu:
Perspective on local area networks. ACM Annual Conference 1983: 2-3 - [c5]Deepinder P. Sidhu:
Protocol Verification via Executable Logic Specifications. Protocol Specification, Testing, and Verification 1983: 237-248 - [c4]Thomas P. Blumer, Deepinder P. Sidhu:
Experience with an Automated Protocol Development System. Protocol Specification, Testing, and Verification 1983: 369-380 - 1982
- [j1]Deepinder P. Sidhu:
Rules for synthesizing correct communication protocols. Comput. Commun. Rev. 12(1): 35-51 (1982) - [c3]Deepinder P. Sidhu:
Protocol Design Rules. PSTV 1982: 283-300 - [c2]Deepinder P. Sidhu:
Specification of Key Distribution Protocols for Networks. S&P 1982: 90 - [c1]Deepinder P. Sidhu, Morrie Gasser:
A Multilevel Secure Local Area Network. S&P 1982: 137-143
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint