Search the dblp DataBase
Deepinder P. Sidhu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Deepinder P. Sidhu , Carole S. Crall Executable Logic Specifications for Protocol Service Interfaces. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Software Eng., 1988, v:14, n:1, pp:98-121 [Journal ] Anthony Chung , Howard E. Motteler , Deepinder P. Sidhu On undetected faults in homogeneous methods for protocol testing. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:158-164 [Conf ] Deepinder P. Sidhu , Anthony Chung Experience with Formal Methods in Protocol Development. [Citation Graph (0, 0)][DBLP ] FORTE, 1989, pp:437-453 [Conf ] Ying Zhang , Deepinder P. Sidhu A Multicast Protection Algorithm for Optical WDM Networks. [Citation Graph (0, 0)][DBLP ] ICCCN, 2004, pp:315-320 [Conf ] Deepinder P. Sidhu , Robert H. Pollack A Robust Distributed Solution to the Generalized Dining Philosophers' Problem. [Citation Graph (0, 3)][DBLP ] ICDE, 1984, pp:483-489 [Conf ] Gargi Banerjee , Deepinder P. Sidhu Path Computation for Traffic Engineering in MPLS Networks. [Citation Graph (0, 0)][DBLP ] ICN (2), 2001, pp:302-308 [Conf ] Thomas P. Blumer , Deepinder P. Sidhu Experience with an Automated Protocol Development System. [Citation Graph (0, 0)][DBLP ] Protocol Specification, Testing, and Verification, 1983, pp:369-380 [Conf ] Deepinder P. Sidhu Protocol Verification via Executable Logic Specifications. [Citation Graph (0, 0)][DBLP ] Protocol Specification, Testing, and Verification, 1983, pp:237-248 [Conf ] Ali Aydin Selçuk , Deepinder P. Sidhu Probabilistic Methods in Multicast Key Management. [Citation Graph (0, 0)][DBLP ] ISW, 2000, pp:179-193 [Conf ] Umang Choudhary , Edward Perl , Deepinder P. Sidhu Using T.38 and SIP for Real-Time Fax Transmission over IP Networks. [Citation Graph (0, 0)][DBLP ] LCN, 2001, pp:74-81 [Conf ] Sashi Lazar , Sethuram Balaji Kodeswaran , Rekuram Varadharaj , Deepinder P. Sidhu ATM Network Connection Management Using Mobile Agents. [Citation Graph (0, 0)][DBLP ] LCN, 2000, pp:620-0 [Conf ] Sashi Lazar , Deepinder P. Sidhu , Sethuram Balaji Kodeswaran , Rekuram Varadharaj ATM Network Discovery Using Mobile Agents. [Citation Graph (0, 0)][DBLP ] LCN, 1999, pp:98-105 [Conf ] Ying Zhang , Deepinder P. Sidhu An Analysis Comparing Light-Tree and Lightpath in Wavelength Routed Optical Networks. [Citation Graph (0, 0)][DBLP ] LCN, 2001, pp:486-487 [Conf ] Gargi Banerjee , Rob Rosenberry , Deepinder P. Sidhu Performance Analysis of IP Switching and Tag Switching. [Citation Graph (0, 0)][DBLP ] NETWORKING, 2000, pp:752-762 [Conf ] Deepinder P. Sidhu Protocol Design Rules. [Citation Graph (0, 0)][DBLP ] PSTV, 1982, pp:283-300 [Conf ] Deepinder P. Sidhu The first ten years, the next ten years. [Citation Graph (0, 0)][DBLP ] PSTV, 1990, pp:47-68 [Conf ] Deepinder P. Sidhu , Thomas P. Blumer Some Problems with the Specification of the Military Standard Transmission Control Protocol. [Citation Graph (0, 0)][DBLP ] PSTV, 1984, pp:375-381 [Conf ] Anthony Chung , Deepinder P. Sidhu Applications of Sufficient Conditions for Efficient Protocol Test Generation. [Citation Graph (0, 0)][DBLP ] Protocol Test Systems, 1992, pp:219-228 [Conf ] Howard E. Motteler , Anthony Chung , Deepinder P. Sidhu Fault Coverage of UIO-based Methods for Protocol Testing. [Citation Graph (0, 0)][DBLP ] Protocol Test Systems, 1993, pp:21-34 [Conf ] Deepinder P. Sidhu , C.-S. Chang Probabilistic Testing of Protocols. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1989, pp:295-302 [Conf ] Deepinder P. Sidhu , Tayang Fu , Shukri Abdallah , Raj Nair , Rob Coltun Open Shortest Path First (OSPF) Routing Protocol Simulation. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1993, pp:53-62 [Conf ] Deepinder P. Sidhu , Ting-Kau Leung Experience with test generation for real protocols. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1988, pp:257-261 [Conf ] Deepinder P. Sidhu , Raj Nair , Shukri Abdallah Finding Disjoint Paths in Networks. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1991, pp:43-51 [Conf ] Deepinder P. Sidhu Executable Logic Specifications: A New Approach to Computer Security. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1984, pp:142-153 [Conf ] Sashi Lazar , Ishan P. Weerakoon , Deepinder P. Sidhu A Scalable Location Tracking and Message Delivery Scheme for Mobile Agents. [Citation Graph (0, 0)][DBLP ] WETICE, 1998, pp:243-249 [Conf ] Christopher B. McCubbin , Ali Aydin Selçuk , Deepinder P. Sidhu Initialization Vector Attacks on the IPsec Protocol Suite. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:171-175 [Conf ] Gargi Banerjee , Deepinder P. Sidhu Comparative analysis of path computation techniques for MPLS traffic engineering. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2002, v:40, n:1, pp:149-165 [Journal ] Ali Aydin Selçuk , Deepinder P. Sidhu Probabilistic optimization techniques for multicast key management. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2002, v:40, n:2, pp:219-234 [Journal ] Deepinder P. Sidhu Authentication Protocols for Computer Networks: I. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1986, v:11, n:, pp:297-310 [Journal ] Deepinder P. Sidhu , Thomas P. Blumer Semi-Automatic Implementation of OSI Protocols. [Citation Graph (0, 0)][DBLP ] Computer Networks and ISDN Systems, 1989, v:18, n:3, pp:221-238 [Journal ] Jorge Arturo Cobb , Mohamed G. Gouda , Deepinder P. Sidhu Hello again: Stabilization of the Hello protocol in OSPF. [Citation Graph (0, 0)][DBLP ] J. High Speed Networks, 2005, v:14, n:1, pp:39-57 [Journal ] Deepinder P. Sidhu , Alexander L. Wijesinha Performance analysis of a constrained resource sharing system. [Citation Graph (0, 0)][DBLP ] Queueing Syst., 1998, v:29, n:2-4, pp:293-311 [Journal ] Steven M. Kramer , Deepinder P. Sidhu Security Information Flow in Multidimensional Arrays. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1983, v:32, n:12, pp:1188-1191 [Journal ] Deepinder P. Sidhu , Howard E. Motteler , Raghu Vallurupalli On testing hierarchies for protocols. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1993, v:1, n:5, pp:590-599 [Journal ] Thomas P. Blumer , Deepinder P. Sidhu Mechanical Verification and Automatic Implementation of Communication Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1986, v:12, n:8, pp:827-843 [Journal ] Anthony Chung , Deepinder P. Sidhu On Conditions for Defining a Closed Cover to Verify Progress for Communicating Finite State Machines. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1989, v:15, n:11, pp:1491-1494 [Journal ] Deepinder P. Sidhu , Juan Aristizabal Constructing Submodule Specifications and Network Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1988, v:14, n:11, pp:1565-1577 [Journal ] Deepinder P. Sidhu , Ting-Kau Leung Formal Methods for Protocol Testing: A Detailed Study. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1989, v:15, n:4, pp:413-426 [Journal ] Ishan P. Weerakoon , Alexander L. Wijesinha , Deepinder P. Sidhu On properties of read and write sets in the Awerbuch-Peleg scheme for tracking mobile users. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2000, v:6, n:3, pp:235-247 [Journal ] Alexander L. Wijesinha , Srikanta P. Kumar , Deepinder P. Sidhu Handover and new call blocking performance with dynamic single-channel assignment in linear cellular arrays. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2000, v:6, n:2, pp:121-129 [Journal ] Anthony Chung , Deepinder P. Sidhu A tool for simulating telecommunications networks and its application in networking courses. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 1999, pp:338-341 [Conf ] Anthony Chung , Deepinder P. Sidhu A formal description technique and an environment for protocol engineering. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 1998, pp:131-135 [Conf ] Search in 0.006secs, Finished in 0.285secs