Search

Srinivas L Devadas

age ~61

from Lexington, MA

Also known as:
  • Srini L Devadas
  • Sulochana S Devadas
  • Srinvas Devadas
  • Srinivas Devada
  • Devada Srinivas
Phone and address:
7 Whittier Rd, Lexington, MA 02420
(781)8638514

Srinivas Devadas Phones & Addresses

  • 7 Whittier Rd, Lexington, MA 02420 • (781)8638514
  • Boston, MA
  • Malden, MA
  • Newton, MA
  • 7 Whittier Rd, Lexington, MA 02420

Us Patents

  • Method And Apparatus For Allocating Link Bandwidth

    view source
  • US Patent:
    7415477, Aug 19, 2008
  • Filed:
    Jul 5, 2001
  • Appl. No.:
    10/482864
  • Inventors:
    Srinivas Devadas - Lexington MA, US
    Hari Balakrishnan - Winchester MA, US
    Daniel Rosenband - Cambridge MA, US
  • Assignee:
    Broadcom Corporation - Irvine CA
  • International Classification:
    G06F 15/16
    G06F 15/173
    G06F 17/00
  • US Classification:
    707101, 709230, 709223
  • Abstract:
    A method and apparatus for selecting a queue for service across a shared link. The method includes determining a priority for each queue () within a plurality of ingresses (), wherein the priority is instantaneous for a given timeslot for data transfer, selecting a queue having a first priority for each group of queues within each ingress () having packets destined for a particular egress (), selecting a queue having a second priority for each subset of queues having first priorities and having packets destined for the particular egress (), and selecting the queue having the second priority for service across the shared link in the given timeslot.
  • Volatile Device Keys And Applications Thereof

    view source
  • US Patent:
    7564345, Jul 21, 2009
  • Filed:
    Nov 14, 2005
  • Appl. No.:
    11/273920
  • Inventors:
    Srinivas Devadas - Lexington MA, US
    Thomas Ziola - Merlo Park CA, US
  • Assignee:
    Verayo, Inc. - Palo Alto CA
  • International Classification:
    G08B 1/08
  • US Classification:
    3405391, 340 101, 3405721, 713100
  • Abstract:
    A key is determined from a volatile response using circuitry on the device. The volatile response depend on process variation in fabrication of the device. Error control data that depends on the first volatile response can be computed, stored externally to the device, and then used to generate the key using a volatile response using the circuit. Applications of volatile keys include authentication and rights management for content and software.
  • Reliable Generation Of A Device-Specific Value

    view source
  • US Patent:
    7681103, Mar 16, 2010
  • Filed:
    Jun 1, 2006
  • Appl. No.:
    11/421588
  • Inventors:
    Srinivas Devadas - Lexington MA, US
    Blaise Gassend - Cambridge MA, US
  • Assignee:
    Massachusetts Institute of Technology - Cambridge MA
  • International Classification:
    G06F 11/00
  • US Classification:
    714752, 714807, 714811
  • Abstract:
    A device-specific value is reliably generated in a device. In a first component of the device, a first digital value is generated that is substantially dependent fabrication variation among like device. Redundancy information is computed based on the first digital value. A subsequent digital value is later generated in the first component of the device. The first digital value is then determined in a second component of the device from the subsequent digital value and the redundancy information.
  • Securely Field Configurable Device

    view source
  • US Patent:
    7702927, Apr 20, 2010
  • Filed:
    Nov 14, 2005
  • Appl. No.:
    11/272995
  • Inventors:
    Srinivas Devadas - Lexington MA, US
    Thomas J. Ziola - Menlo Park CA, US
  • Assignee:
    Verayo, Inc. - Palo Alto CA
  • International Classification:
    G06F 12/14
  • US Classification:
    713194, 713191, 717168
  • Abstract:
    A field configurable device, such as an FPGA, supports secure field configuration without using non-volatile storage for cryptographic keys on the device and without requiring a continuous or ongoing power source to maintain a volatile storage on the device. The approach can be used to secure the configuration data such that it can in general be used on a single or a selected set of devices and/or encryption of the configuration data so that the encrypted configuration data can be exposed without compromising information encoded in the configuration data.
  • Method And Apparatus For Bandwidth Guarantee And Overload Protection In A Network Switch

    view source
  • US Patent:
    7724760, May 25, 2010
  • Filed:
    Aug 12, 2003
  • Appl. No.:
    10/639269
  • Inventors:
    Hari Balakrishnan - Winchester MA, US
    Srinivas Devadas - Lexington MA, US
    Arvind Mithal - Arlington MA, US
  • Assignee:
    Broadcom Corporation - Irvine CA
  • International Classification:
    H04L 12/56
  • US Classification:
    370416, 3702301, 370414
  • Abstract:
    A method for selecting a queue for service across a shared link. The method includes classifying each queue from a group of queues within a plurality of ingresses into one tier of a number ā€œNā€ of tiers. The number ā€œNā€ is greater than or equal to 2. Information about allocated bandwidth is used to classify at least some of the queues into the tiers. Each tier is assigned a different priority. The method also includes matching queues to available egresses by matching queues classified within tiers with higher priorities before matching queues classified within tiers with lower priorities.
  • Integrated Circuit That Uses A Dynamic Characteristic Of The Circuit

    view source
  • US Patent:
    7757083, Jul 13, 2010
  • Filed:
    Jun 1, 2006
  • Appl. No.:
    11/421577
  • Inventors:
    Srinivas Devadas - Lexington MA, US
    Blaise Gassend - Cambridge MA, US
  • Assignee:
    Massachusetts Institute of Technology - Cambridge MA
  • International Classification:
    H04L 9/32
    H04L 29/00
  • US Classification:
    713168, 380232, 380229, 713155, 726 19, 726 20, 726 34, 705 67
  • Abstract:
    An integrated circuit has a first component that has a dynamic characteristic that varies among like integrated circuits, for example, among integrated circuits fabricated using the same lithography mask. Operating the first component produces an output that is dependent on the dynamic characteristic of the first component. A digital value associated with the integrated circuit is generated using the output of the first component, and then the generated digital value is used in operation of the integrated circuit.
  • Data Protection And Cryptographic Functions Using A Device-Specific Value

    view source
  • US Patent:
    7818569, Oct 19, 2010
  • Filed:
    Jun 1, 2006
  • Appl. No.:
    11/421582
  • Inventors:
    Srinivas Devadas - Lexington MA, US
    Blaise Gassend - Cambridge MA, US
  • Assignee:
    Massachusetts Institute of Technology - Cambridge MA
  • International Classification:
    G08B 29/00
    G06F 21/02
    H01L 23/58
  • US Classification:
    713168, 380232, 726 34, 257E23179
  • Abstract:
    A digital value is generated in an integrated circuit such that the generated value substantially depends on circuit parameters that vary among like devices. The generated digital value is then used, for example, to access protected information in the device or to perform a cryptographic function in the integrated circuit.
  • Volatile Device Keys And Applications Thereof

    view source
  • US Patent:
    7839278, Nov 23, 2010
  • Filed:
    Jun 16, 2009
  • Appl. No.:
    12/485479
  • Inventors:
    Srinivas Devadas - Lexington MA, US
    Thomas Ziola - Merlo Park CA, US
  • Assignee:
    Verayo, Inc. - Palo Alto CA
  • International Classification:
    G08B 1/08
  • US Classification:
    3405391, 340500, 340501
  • Abstract:
    A key is determined from a volatile response using circuitry on the device. The volatile response depend on process variation in fabrication of the device. Error control data that depends on the first volatile response can be computed, stored externally to the device, and then used to generate the key using a volatile response using the circuit. Applications of volatile keys include authentication and rights management for content and software.

Isbn (Books And Publications)

Logic Synthesis

view source

Author
Srinivas Devadas

ISBN #
0070165009

Vlsi: Systems on a Chip Ifip Tc10 Wg10.5 Tenth International Conference on Very Large Scale Integration (Vlsi 99) December 1-4, 1999, Lisboa, Portugal

view source

Author
Srinivas Devadas

ISBN #
0792377311

Sequential Logic Testing and Verification

view source

Author
Srinivas Devadas

ISBN #
0792391888

Youtube

CSAIL Alliances Researcher Spotlight: Srini D...

Within CSAIL, Professor Devadas' work concentrates on computer archite...

  • Duration:
    10m 48s

Puzzle 3: You Can Read Minds (with a little c...

... IAP 2018 View the complete course: Instructor: Srini Devadas Pro...

  • Duration:
    46m 59s

Srinivas Devadas receives 2014 IEEE Computer ...

The IEEE Computer Society presented its 2014 Technical Achievement Awa...

  • Duration:
    3m 3s

Srini Devadas: Time Traveling Hardware and So...

EECS Colloquium, UC Berkeley Wednesday, October 26, 2016 Captions avai...

  • Duration:
    56m 4s

Srini Devadas First Friday Lunch

Srini Devadas joins CSAIL Alliances for a First Friday Lunch presentat...

  • Duration:
    1h 13s

21. Cryptography: Hash Functions

... Instructor: Srinivas Devadas In this lecture, Professor Devadas ...

  • Duration:
    1h 22m 1s

Get Report for Srinivas L Devadas from Lexington, MA, age ~61
Control profile