Deepinder P. Sidhu

According to our database1, Deepinder P. Sidhu authored at least 65 papers between 1982 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
nlsrSIM: Porting and Simulation of Named-data Link State Routing Protocol into ndnSIM.
Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent VehicularNetworks and Applications, 2017

2014
Analysis of Routing and Wavelength Assignment in Large WDM Networks.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

2005
Hello again: Stabilization of the Hello protocol in OSPF.
J. High Speed Networks, 2005

2004
A Multicast Protection Algorithm for Optical WDM Networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

2003
A performance comparison of zone-based multicast protocols for mobile ad hoc networks.
Proceedings of the 11th IEEE International Conference on Networks, 2003

2002
Probabilistic optimization techniques for multicast key management.
Comput. Networks, 2002

Comparative analysis of path computation techniques for MPLS traffic engineering.
Comput. Networks, 2002

2001
Simulation and analysis of Awerbuch-Peleg and GSM schemes for location tracking of mobile users.
Int. J. Commun. Syst., 2001

An Analysis Comparing Light-Tree and Lightpath in Wavelength Routed Optical Networks.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

Using T.38 and SIP for Real-Time Fax Transmission over IP Networks.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

Path Computation for Traffic Engineering in MPLS Networks.
Proceedings of the Networking, 2001

MZR: a multicast protocol for mobile ad hoc networks.
Proceedings of the IEEE International Conference on Communications, 2001

Label switched path restoration under two random failures.
Proceedings of the Global Telecommunications Conference, 2001

2000
Handover and new call blocking performance with dynamic single-channel assignment in linear cellular arrays.
Wirel. Networks, 2000

On properties of read and write sets in the Awerbuch-Peleg scheme for tracking mobile users.
Wirel. Networks, 2000

Signaling network architectures in B-ISDN environments.
J. High Speed Networks, 2000

Initialization Vector Attacks on the IPsec Protocol Suite.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

Performance Analysis of IP Switching and Tag Switching.
Proceedings of the NETWORKING 2000, 2000

ATM Network Connection Management Using Mobile Agents.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

Probabilistic Methods in Multicast Key Management.
Proceedings of the Information Security, Third International Workshop, 2000

On undetected faults in homogeneous methods for protocol testing.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000

1999
ATM Network Discovery Using Mobile Agents.
Proceedings of the Proceedings 26th Conference on Local Computer Networks, 1999

A tool for simulating telecommunications networks and its application in networking courses.
Proceedings of the Computers and Their Applications (CATA-99), 1999

1998
Performance analysis of a constrained resource sharing system.
Queueing Syst. Theory Appl., 1998

A Scalable Location Tracking and Message Delivery Scheme for Mobile Agents.
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998

A formal description technique and an environment for protocol engineering.
Proceedings of the Computers and Their Applications (CATA-98), 1998

1996
Call blocking probabilities for dynamic and fixed assignment of a single channel in a linear cellular array.
J. High Speed Networks, 1996

1995
Undetected faults in protocol testing.
IEEE Trans. Commun., 1995

1994
Probabilistic testing of OSI protocols.
IEEE Trans. Commun., 1994

1993
On testing hierarchies for protocols.
IEEE/ACM Trans. Netw., 1993

Open Shortest Path First (OSPF) Routing Protocol Simulation.
Proceedings of the ACM SIGCOMM 1993 Conference on Communications Architectures, 1993

Fault Coverage of UIO-based Methods for Protocol Testing.
Proceedings of the Protocol Test Systems, 1993

1992
Congestion Control in High Speed Networks via Alternate Path Routing.
J. High Speed Networks, 1992

Message from the Editor-in-Chief.
J. High Speed Networks, 1992

Applications of Sufficient Conditions for Efficient Protocol Test Generation.
Proceedings of the Protocol Test Systems, V, 1992

1991
Experience with formal methods in protocol development.
Comput. Commun. Rev., 1991

Finding Disjoint Paths in Networks.
Proceedings of the Conference on Communications Architecture & Protocols, 1991

1990
The first ten years, the next ten years.
Proceedings of the Protocol Specification, 1990

Experience with an Estelle development system.
Proceedings of the Conference proceedings on Formal methods in software development, 1990

1989
Formal Methods for Protocol Testing: A Detailed Study.
IEEE Trans. Software Eng., 1989

On Conditions for Defining a Closed Cover to Verify Progress for Communicating Finite State Machines.
IEEE Trans. Software Eng., 1989

Semi-Automatic Implementation of OSI Protocols.
Comput. Networks ISDN Syst., 1989

Probabilistic Testing of Protocols.
Proceedings of the ACM Symposium on Communications Architectures & Protocols, 1989

Experience with Formal Methods in Protocol Development.
Proceedings of the Formal Description Techniques, 1989

1988
Executable Logic Specifications for Protocol Service Interfaces.
IEEE Trans. Software Eng., 1988

Constructing Submodule Specifications and Network Protocols.
IEEE Trans. Software Eng., 1988

Experience with test generation for real protocols.
Proceedings of the ACM Symposium on Communications Architectures and Protocols, 1988

Fault coverage of protocol test methods.
Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?, 1988

1987
Automated Verification of the Connection Management Aspects of the IEEE 802.2 Logical Link Control Protocol.
IEEE Trans. Commun., 1987

1986
Mechanical Verification and Automatic Implementation of Communication Protocols.
IEEE Trans. Software Eng., 1986

Verification of NBS Class 4 Transport Protocol.
IEEE Trans. Commun., 1986

Authentication Protocols for Computer Networks: I.
Comput. Networks, 1986

1985
Some problems with the specification of the Military Standard Transmission Control Protocol.
RFC, November, 1985

Some problems with the specification of the Military Standard Internet Protocol.
RFC, November, 1985

1984
Executable Logic Specifications: A New Approach to Computer Security.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984

Logic programming applied to hardware design specification and verification.
Proceedings of the 17th annual workshop on Microprogramming, 1984

A Robust Distributed Solution to the Generalized Dining Philosophers' Problem.
Proceedings of the First International Conference on Data Engineering, 1984

1983
Security Information Flow in Multidimensional Arrays.
IEEE Trans. Computers, 1983

Protocol Verification via Executable Logic Specifications.
Proceedings of the Protocol Specification, Testing, and Verification, III, Proceedings of the IFIP WG 6.1 Third International Workshop on Protocol Specification, Testing and Verification, organized by IBM Research, Rüschlikon, Switzerland, 31 May, 1983

Experience with an Automated Protocol Development System.
Proceedings of the Protocol Specification, Testing, and Verification, III, Proceedings of the IFIP WG 6.1 Third International Workshop on Protocol Specification, Testing and Verification, organized by IBM Research, Rüschlikon, Switzerland, 31 May, 1983

Perspective on local area networks.
Proceedings of the 1983 Annual Conference on Computers: extending the human resource, 1983

1982
Rules for synthesizing correct communication protocols.
Comput. Commun. Rev., 1982

A Multilevel Secure Local Area Network.
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982

Specification of Key Distribution Protocols for Networks.
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982

Protocol Design Rules.
Proceedings of the Protocol Specification, 1982


  Loading...