Anubhav Gupta - Santa Clara CA, US Arunkumar M. Desigan - Santa Clara CA, US Arun Sharma - Pleasanton CA, US
Assignee:
Telefonaktiebolaget L M Ericsson (publ) - Stockholm
International Classification:
H04L 12/28
US Classification:
370419
Abstract:
Line cards receive control packets and perform a hierarchical rate limiting on those control packets. A set of identifier keys are extracted from the control packets and the protocol of those control packets are determined. At a first level, the control packets are rate limited per unique set of identifier keys per protocol. Those packets which fail the first rate limiting level are dropped. Those packets which pass the first rate limiting level are rate limited at a second level per protocol type. Those packets which fail the second level rate limiting are dropped while those packets which pass the second level rate limiting are sent to the control card for further processing.
Boolean Satisfiability Based Verification Of Analog Circuits
Saurabh K. Tiwary - Berkeley CA, US Anubhav Gupta - Berkeley CA, US Joel R. Phillips - Oakland CA, US Claudio Pinello - Berkeley CA, US Radu Zlatanovici - Oakland CA, US
Assignee:
Cadence Design Systems, Inc. - San Jose CA
International Classification:
G06F 9/455 G06F 17/50
US Classification:
716106, 716111
Abstract:
A method is provided to formally verify a property of a circuit design comprising: receiving a description of at least a portion of the circuit; receiving an indication of search accuracy criteria; receiving a description of a relationship between current and voltage (I-V relationship) for one or more of devices of the circuit; converting each I-V relationship to a conservative approximation of such I-V relationship; assigning voltage labels to one or more terminals of one or more identified devices that indicate voltage relationships among the one or more terminals consistent with KVL; defining a respective current relationship among one or more respective sets of currents of the one or more of the identified devices that is consistent with KCL; searching for one or more combinations of current and voltage values that are within at least one region of each conservative approximation and that are consistent with the voltage labels and that are consistent with each respective defined current relationship; converting each region determined to have a searched for combination of current and voltage values to multiple respective smaller regions; and repeating the acts of searching and converting until regions are obtained that meet the received search accuracy criteria.
Anubhav Gupta - Fremont CA, US Veluchamy Dinakaran - Sunnyvale CA, US Avoy Nanda - Milpitas CA, US Avinash Sridharan - Santa Clara CA, US
Assignee:
Telefonaktiebolaget L M Ericsson (Publ) - Stockholm
International Classification:
H04L 12/26 H04H 20/71 H04L 12/28 H04J 3/26
US Classification:
370222, 370225, 370312, 370390, 370432
Abstract:
A network node includes a primary incoming interface, a secondary incoming interface and a data flow control unit. The primary incoming interface is operable to receive traffic associated with a particular source and multicast group. The secondary incoming interface is operable to serve as a backup interface if the primary incoming interface or a transmission path coupled to the primary incoming interface is inoperative. The data flow control unit is operable to determine whether the network node is part of a ring topology and if so, forward traffic received on the primary incoming interface associated with the source and multicast group to both a host which joined the multicast group and the secondary incoming interface and forward traffic received on the secondary incoming interface associated with the source and multicast group to the primary incoming interface.
Anubhav Gupta - Santa Clara CA, US Arunkumar M. Desigan - Santa Clara CA, US Arun Sharma - Pleasanton CA, US Mukund Srinivasan - Mountain View CA, US
Assignee:
Telefonaktiebolaget L M Ericsson (Publ) - Stockholm
International Classification:
H04L 12/28
US Classification:
370419
Abstract:
Line cards receive control packets and perform a hierarchical rate limiting on those control packets. A set of identifier keys are extracted from the control packets and the protocol of those control packets are determined. At a first level, the control packets are rate limited per unique set of identifier keys per protocol. Those packets which fail the first rate limiting level are dropped. Those packets which pass the first rate limiting level are rate limited at a second level per protocol type. Those packets which fail the second level rate limiting are dropped while those packets which pass the second level rate limiting are sent to the control card for further processing.
Method, System, And Computer Program Product For Generating Automated Assumption For Compositional Verification
Anubhav Gupta - Berkeley CA, US Ken L. McMillan - Berkeley CA, US
Assignee:
Cadence Design Systems, Inc. - San Jose CA
International Classification:
G06F 17/50 G06F 9/45
US Classification:
716 5
Abstract:
Disclosed are methods, systems, and computer program products for computing an exact minimal automaton to act as an intermediate assertion in assume-guarantee reasoning. In one embodiment, the computing an exact minimal automaton is performed by using a sampling approach and a Boolean satisfiability. The methods described herein may be used as part of a tool for formal verification.
System And Method Of Detecting Whether A Source Of A Packet Flow Transmits Packets Which Bypass An Operating System Stack
- San Jose CA, US Navindra Yadav - Cupertino CA, US Anubhav Gupta - Fremont CA, US Shashidhar Gandham - Fremont CA, US Rohit Chandra Prasad - Sunnyvale CA, US Abhishek Ranjan Singh - Pleasanton CA, US Shih-Chun Chang - San Jose CA, US
A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed on a second host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that the second packet flow was transmitted by a component that bypassed an operating stack of the first host or a packet capture agent at the device to yield a determination, detecting that hidden network traffic exists, and predicting a malware issue with the first host based on the determination.
Reducing The Impact Of Network Latency During A Restore Operation
- San Jose CA, US Prashant Gothi - San Jose CA, US Anubhav Gupta - Sunnyvale CA, US Manoj Singhal - Sunnyvale CA, US
International Classification:
H04L 12/26 H04L 29/08
Abstract:
Data chunks sent to a content destination are tracked. It is determined whether content of a portion of an object to be sent to the content destination matches one of the data chunks previously sent to the content destination. In response to the determination that the portion of the object to be sent to the content destination matches one of the data chunks previously sent to the content destination, a source reference to the matching previously sent data chunk where the content destination can locally obtain the content for the portion of the object is provided to the content destination.
- San Jose CA, US Aiswarya Bhavani Shankar - San Jose CA, US Anubhav Gupta - Sunnyvale CA, US
International Classification:
G06F 16/11 G06F 16/174 G06F 11/14
Abstract:
An indication to store to a remote storage a new archive of a snapshot of a source storage is received. At least one shared data chunk of the new archive is determined to be already stored in an existing chunk object of the remote storage storing data chunks of a previous archive. One or more evaluation metrics for the existing chunk object are determined based at least in part on a retention period associated with one or more individual chunks stored in the chunk object and a data lock period associated with the entire existing chunk object. It is determined based on the one or more evaluation metrics whether to reference the at least one shared data chunk of the new archive from the existing chunk object or store the at least one shared data chunk in a new chunk object of the remote storage.
Ericsson - San Jose, CA since Sep 2012
Product Manager
Ericsson Sep 2010 - Aug 2012
Technical Lead : Product Introduction
Redback Networks, An Ericsson Company Jan 2007 - Sep 2010
Forwarding Software Engineer
Education:
Purdue University Calumet 2005 - 2006
BS, Computer eng.
Apeejay School Noida
Uttar Pradesh Technical University
Skills:
LTE IP MPLS Routing Routers Ethernet Broadband 4G QoS
Epic - Madison, Wisconsin Area since Jul 2011
Software Developer
Limelight Networks Aug 2010 - May 2011
Intern
New Media Innovation Lab, ASU Jan 2010 - Aug 2010
Web Developer
W.P Carey Business School, ASU Aug 2009 - Jan 2010
Teaching Assistant
Education:
Arizona State University 2009 - 2011
MCS, Computer Science
Devi Ahilya Vishwavidyalaya 2005 - 2009
BE, Information Technology
Modinagar Papers - Director (2011) Ansh Energy Solutions Pvt. Ltd. - Director (2009) Heritage Academy - Director (2009) Modinagar Paper Mills Ltd. - Director (2003)
Education:
IIT, Varanasi - Chemical Engineering
Tagline:
EvilSoul for who Don't know me...
Anubhav Gupta
Lived:
Sunnyvale, CA
Work:
Google - Software Engineer
Education:
Carnegie Mellon University - Computer Science, Indian Institute of Technology Delhi - Compuiter Science
Anubhav Gupta
Work:
Accurate
Education:
B TECH 3RD YEAR CSE STUDENT
Relationship:
Its_complicated
About:
Hey guys ''''' i luv u ol'''''...
Bragging Rights:
No comments
Anubhav Gupta
Education:
Amity School Of Engineering & Technology - B.Tech (Computer Science), St. Francis' College Lucknow - Till class 12th.