Patents by Inventor Padmanabhan Krishnan

Padmanabhan Krishnan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170185504
    Abstract: A method for analyzing software with pointer analysis may include obtaining a software program, and determining a first independent program slice of the software program describing a first code segment of the software program. The method may further include determining, using a first pointer analysis objective, a first result from performing a first pointer analysis on the first independent program slice, and determining, using the first result, a first dependent program slice of the software program. The method may further include determining, using a second pointer analysis objective, a second result from performing a second pointer analysis on the first dependent program slice. The method may further include generating a report, using these results, indicating whether the software program satisfies a predetermined criterion.
    Type: Application
    Filed: December 23, 2015
    Publication date: June 29, 2017
    Inventors: Padmanabhan Krishnan, Raghavendra Kagalavadi Ramesh
  • Publication number: 20160254956
    Abstract: A system and a method for method for automatically detecting and configuring server uplink network interfaces in a network environment. An exemplary method includes receiving a discovery packet from a network element on a network interface of a server connected to the network element; evaluating the discovery packet to determine whether the network element possesses virtual bridging capabilities; and configuring the network interface of the server as an uplink interface for communicating with a network when the discovery packet indicates that the network element possesses virtual bridging capabilities.
    Type: Application
    Filed: March 17, 2015
    Publication date: September 1, 2016
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Milton Y. Xu, Padmanabhan Krishnan
  • Publication number: 20160217010
    Abstract: Embodiments include determining computing resources within one or more data centers onto which a virtual workload can be deployed. Network state data is determined for a plurality of network resources within a network fabric of a data center. For each of the plurality of computing resources, embodiments determine a respective suitability value describing a fitness of the respective physical server for deploying at least a portion of the virtual workload. Such a determination includes determining a respective at least one of the plurality of network resources within the at least one network fabric corresponding to the respective computing resource and determining a current workload of the at least one network resource, based on the network state data. Upon selecting one or more computing resources of the plurality of computing resources based on the determined suitability values, embodiments deploy the virtual workload onto the selected one or more computing resources.
    Type: Application
    Filed: August 26, 2015
    Publication date: July 28, 2016
    Inventors: Padmanabhan KRISHNAN, Rajesh Babu NATARAJA, Shyam KAPADIA, Nader LAHOUTI, Viral Rajeshbhai BAROT, Jay Ajaykumar GHEEWALA
  • Patent number: 9367307
    Abstract: A method, system, and computer-readable medium (CRM) for performing a staged points-to analysis of an object-oriented codebase, including obtaining the codebase and a points-to query, slicing the codebase to obtain a program slice, and performing a type analysis of the program slice to compute a type set. The method, system, and CRM include refining the program slice, after performing the type analysis, by resolving virtual dispatch sites based on the type set, and performing, after refining the program slice, a context-insensitive points-to analysis of the program slice to compute a first points-to set. The method, system, and CRM include re-refining the program slice, after performing the context-insensitive points-to analysis, by resolving the virtual dispatch sites based on the first points-to set, and performing, after re-refining the program slice, a context-sensitive points-to analysis of the program slice to compute a second points-to set, which is provided to a developer.
    Type: Grant
    Filed: October 15, 2014
    Date of Patent: June 14, 2016
    Assignee: Oracle International Corporation
    Inventors: Nicholas Allen, Bernhard F. Scholz, Padmanabhan Krishnan
  • Patent number: 9361467
    Abstract: Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving, from a computing device used by an authenticated user, a validation request, the validation request including a first hash value and a first validation token, the first hash value being generated based on restricted content of a workflow object and the first validation token being associated with a first state of the workflow object, and determining that the authenticated user is authorized to request validation of the workflow object and, in response: decrypting the validation token to provide a second hash value, and determining that the second hash value is equal to both the first hash value and a third hash value and, in response, transmitting a validation response to the computing device, the validation response indicating that the workflow object is valid.
    Type: Grant
    Filed: February 29, 2012
    Date of Patent: June 7, 2016
    Assignee: SAP SE
    Inventors: Shane Bracher, Padmanabhan Krishnan
  • Patent number: 9336397
    Abstract: In general, in one aspect, the invention relates to a method for statically analyzing a library that includes obtaining native method annotations associated with native methods invoked by the library and extracting facts corresponding to the library from the library to obtain library facts. The library is written in a first programming language. The method also includes constructing a type-object lattice, modeling an abstracted heap using the type-object lattice, expressing abstracted heap update operations as heap update rules, and constructing, based on the library, a most general application (MGA) for the library. The method additionally includes analyzing the library using the native method annotations, the library facts, the MGA, the abstracted heap, and the heap update rules to obtain results, storing the results of the analysis, and performing an action based on the results.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: May 10, 2016
    Assignee: Oracle International Corporation
    Inventors: Nicholas John Allen, Padmanabhan Krishnan, Bernhard Friedrich Scholz
  • Publication number: 20160110191
    Abstract: A method, system, and computer-readable medium (CRM) for performing a staged points-to analysis of an object-oriented codebase, including obtaining the codebase and a points-to query, slicing the codebase to obtain a program slice, and performing a type analysis of the program slice to compute a type set. The method, system, and CRM include refining the program slice, after performing the type analysis, by resolving virtual dispatch sites based on the type set, and performing, after refining the program slice, a context-insensitive points-to analysis of the program slice to compute a first points-to set. The method, system, and CRM include re-refining the program slice, after performing the context-insensitive points-to analysis, by resolving the virtual dispatch sites based on the first points-to set, and performing, after re-refining the program slice, a context-sensitive points-to analysis of the program slice to compute a second points-to set, which is provided to a developer.
    Type: Application
    Filed: October 15, 2014
    Publication date: April 21, 2016
    Inventors: Nicholas Allen, Bernhard F. Scholz, Padmanabhan Krishnan
  • Publication number: 20160099858
    Abstract: A monitoring session associated with a virtual nickname may be established in a TRILL network. A monitoring station may be connected to an edge switch of the TRILL network specifying the virtual nickname for the monitoring session. The monitoring station is set as a destination for the monitoring session and the virtual nickname is flooded throughout the TRILL network. A source may then be configured to the monitoring session by specifying the virtual nickname of the monitoring session without knowing the destination tied to the monitoring session. Network traffic through the source may then be forwarded to the destination tied to the monitoring session.
    Type: Application
    Filed: December 14, 2015
    Publication date: April 7, 2016
    Inventors: Rajagopalan Janakiraman, Yibin Yang, Pags Krishnamoorthy, Padmanabhan Krishnan
  • Publication number: 20150379271
    Abstract: In general, in one aspect, the invention relates to a method for statically analyzing a library that includes obtaining native method annotations associated with native methods invoked by the library and extracting facts corresponding to the library from the library to obtain library facts. The library is written in a first programming language. The method also includes constructing a type-object lattice, modeling an abstracted heap using the type-object lattice, expressing abstracted heap update operations as heap update rules, and constructing, based on the library, a most general application (MGA) for the library. The method additionally includes analyzing the library using the native method annotations, the library facts, the MGA, the abstracted heap, and the heap update rules to obtain results, storing the results of the analysis, and performing an action based on the results.
    Type: Application
    Filed: June 30, 2014
    Publication date: December 31, 2015
    Inventors: Nicholas John Allen, Padmanabhan Krishnan, Bernhard Friedrich Scholz
  • Patent number: 9215147
    Abstract: A monitoring session associated with a virtual nickname may be established in a TRILL network. A monitoring station may be connected to an edge switch of the TRILL network specifying the virtual nickname for the monitoring session. The monitoring station is set as a destination for the monitoring session and the virtual nickname is flooded throughout the TRILL network. A source may then be configured to the monitoring session by specifying the virtual nickname of the monitoring session without knowing the destination tied to the monitoring session. Network traffic through the source may then be forwarded to the destination tied to the monitoring session.
    Type: Grant
    Filed: July 15, 2013
    Date of Patent: December 15, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Rajagopalan Janakiraman, Yibin Yang, Pags Krishnamoorthy, Padmanabhan Krishnan
  • Patent number: 9130836
    Abstract: A method is provided in one example embodiment and includes identifying for a new node added to a communications network a plurality of existing network nodes respectively connected to one of a plurality of ports of the new node and capable of implementing a particular routing protocol; selecting one of the identified existing network nodes to serve as a designated forwarder (“DF”) for the new node; performing a power on auto provisioning (“PoAP”) procedure in connection with the new node; and opening the ports of the new node to which the identified existing network nodes are connected.
    Type: Grant
    Filed: February 4, 2013
    Date of Patent: September 8, 2015
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Shyam Kapadia, Padmanabhan Krishnan, Vipin Jain, Srividya S. Vemulakonda
  • Publication number: 20150016301
    Abstract: A monitoring session associated with a virtual nickname may be established in a TRILL network. A monitoring station may be connected to an edge switch of the TRILL network specifying the virtual nickname for the monitoring session. The monitoring station is set as a destination for the monitoring session and the virtual nickname is flooded throughout the TRILL network. A source may then be configured to the monitoring session by specifying the virtual nickname of the monitoring session without knowing the destination tied to the monitoring session. Network traffic through the source may then be forwarded to the destination tied to the monitoring session.
    Type: Application
    Filed: July 15, 2013
    Publication date: January 15, 2015
    Inventors: Rajagopalan Janakiraman, Yibin Yang, Pags Krishnamoorthy, Padmanabhan Krishnan
  • Publication number: 20140219079
    Abstract: A method is provided in one example embodiment and includes identifying for a new node added to a communications network a plurality of existing network nodes respectively connected to one of a plurality of ports of the new node and capable of implementing a particular routing protocol; selecting one of the identified existing network nodes to serve as a designated forwarder (“DF”) for the new node; performing a power on auto provisioning (“PoAP”) procedure in connection with the new node; and opening the ports of the new node to which the identified existing network nodes are connected.
    Type: Application
    Filed: February 4, 2013
    Publication date: August 7, 2014
    Applicant: Cisco Technology, Inc.
    Inventors: Shyam Kapadia, Padmanabhan Krishnan, Vipin Jain, Srividya S. Vemulakonda
  • Publication number: 20130227285
    Abstract: Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving, from a computing device used by an authenticated user, a validation request, the validation request including a first hash value and a first validation token, the first hash value being generated based on restricted content of a workflow object and the first validation token being associated with a first state of the workflow object, and determining that the authenticated user is authorized to request validation of the workflow object and, in response: decrypting the validation token to provide a second hash value, and determining that the second hash value is equal to both the first hash value and a third hash value and, in response, transmitting a validation response to the computing device, the validation response indicating that the workflow object is valid.
    Type: Application
    Filed: February 29, 2012
    Publication date: August 29, 2013
    Applicant: SAP AG
    Inventors: Shane Bracher, Padmanabhan Krishnan
  • Patent number: 7724745
    Abstract: A method and device for efficient transmission of flood data frames in a backbone network comprising a plurality of virtual local area networks (VLANs). A flood data frame is received at an intermediate network device communicatively coupled to a backbone network, wherein the destination of the flood data frame is unknown. A customer associated with the flood data frame is identified. A customer multicast group associated with the customer is identified, the customer multicast group identifying at least one destination intermediate network device coupled to the backbone network. The flood data frame is forwarded to at least one destination intermediate network device of the customer multicast group.
    Type: Grant
    Filed: March 9, 2006
    Date of Patent: May 25, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Anusankar Elangovan, Padmanabhan Krishnan, Giovanni Meo