Google - San Francisco Bay Area since Jul 2011
Software Engineer
Microsoft - Greater Seattle Area Oct 2008 - Jul 2011
Software Engineering
Qualcomm Oct 2004 - Oct 2008
Senior Engineer
Garmin International Dec 2003 - Oct 2004
Software Engineer
Aditi Technologies Jul 2000 - Aug 2001
Software Engineer
Education:
University of Kansas
M.S., Computer Engineering
Bharathiar University
B.E., Electrical and Electronics Engg.
Skills:
Mobile Devices Distributed Systems Testing Software Development Product Management Software Engineering Wireless C++ Agile Methodologies Networking
Us Patents
Sleep Optimization Based On System Information Block Scheduling
Ali Taha - San Diego CA, US Chih-Ping Hsu - San Diego CA, US Shawn C. Morrison - Boulder CO, US Vivek Ramachandran - Carlsbad CA, US
International Classification:
G06F 9/30
US Classification:
712204
Abstract:
Methods and apparatuses are presented for sleep optimization based on system information block SIB scheduling. A method for invoking sleep states within user equipment (UE) is presented. The method includes decoding a broadcast control channel with a cell, determining a System Information Block (SIB) schedule associated with the cell, determining a sleep time interval based upon the SIB schedule, and placing the UE in a sleep state using the sleep time intervals. An apparatus for invoking sleep states within UE is presented. The apparatus includes logic configured to decode a broadcast control channel with a cell, logic configured to determine a SIB schedule associated with the cell, logic configured to determine a sleep time interval based upon the SIB schedule, and logic configured to place the UE in a sleep state using the sleep time intervals.
Uninterrupted Transmission During A Change In Ciphering Configuration
Shailesh Maheshwari - San Diego CA, US Kiran Chikkappa - San Diego CA, US Vivek Ramachandran - Carlsbad CA, US
International Classification:
H04K 1/00
US Classification:
380270
Abstract:
Techniques for sending information without interruption during a change in ciphering configuration are described. A user equipment (UE) communicates with a wireless communication network for a call. The UE sends first information to the wireless network using a first ciphering configuration. For a change in ciphering configuration, the UE selects an activation time for a second ciphering configuration and sends a security message with the activation time. This activation time is the time at which the UE applies the second ciphering configuration to transmission sent to the wireless network. The UE thereafter sends second information (e.g., a measurement report message) using the first ciphering configuration after sending the security message and before the activation time. The UE sends third information using the second ciphering configuration after the activation time.
Method And Apparatus For Managing System Information Modification In A Wireless Communication System
Daniel Amerga - San Diego CA, US Nathan Edward Tenny - Poway CA, US Vivek V. Ramachandran - Redmond WA, US
Assignee:
QUALCOMM INCORPORATED - San Diego CA
International Classification:
H04L 12/28
US Classification:
370254
Abstract:
Systems and methodologies are described that facilitate improved management of a system information modification in a wireless communication environment. Various techniques can be utilized as described herein to provide respective users with information indicative of changes to specific blocks or elements within a set of system information, thereby simplifying and accelerating acquisition of new system information after a modification. In a first example, a bitmap is generated and transmitted upon a system information modification that indicates which blocks(s) and/or element(s) of the system information changed in the modification, thereby allowing an associated user to abstain from reading or processing unchanged system information. In a second example, respective block(s) and/or element(s) of the system information can include an internal value tag that indicates to a receiving entity whether the corresponding block(s) or element(s) have changed, thereby allowing a user to discard unchanged block(s) or element(s) without performing further processing.
Out-Of-Synchronization Handling Method And Apparatus
Samson Jim - San Diego CA, US Sanjay Kenchareddy - San Diego CA, US Supratik Bhattacharjee - San Diego CA, US Vivek Ramachandran - San Diego CA, US Tim T. Liou - Taipei, TW
Assignee:
QUALCOMM Incorporated - San Diego CA
International Classification:
H04W 4/00 H04J 3/00
US Classification:
370338, 370498
Abstract:
A method for handling out-of-synchronization (SYNC) includes generating a plurality of combination sets of transport channels utilized by a communication device. The method also includes selecting, based on a window-based parameter, a highest-ranking combination set of transport channels out of the plurality of combination sets of transport channels. The highest-ranking combination set of transport channels excludes one or more out-of-SYNC transport channels. The method further comprises providing, to a window-based data processing unit, data packets from transport channels in the highest-ranking combination set of transport channels, without providing data packets from the one or more out-of-SYNC transport channels to the window-based data processing unit. Apparatus and machine-readable media for out-of-SYNC avoidance and/or detection are also provided.
Methods And Apparatus For Service Continuity In A Communication Network
Sanjay Kenchareddy - San Diego CA, US Vivek Venkatesh Ramachandran - San Diego CA, US Daniel Amerga - San Diego CA, US Supratik Bhattacharjee - San Diego CA, US
Assignee:
QUAI.COMM Incorporated - San Diego CA
International Classification:
H04W 40/00
US Classification:
370312
Abstract:
Methods and apparatus for service continuity in a communication network. A method includes receiving a service in a first network coverage area, detecting entry into a second coverage area, acquiring control signaling information of the second coverage area in response to entering into the second coverage area, establishing traffic channels in the second coverage area while the service is received from the first coverage area, and switching to receive the service on the traffic channels in the second coverage area so that service disruption is minimized. Another method includes receiving a service in a first network coverage area, acquiring control signaling information associated with other coverage areas while in the first coverage area, detecting entry into a second coverage area, establishing traffic channels in the second coverage area, and switching to receive the service on the traffic channels in the second coverage area so that service disruption is minimized.
Method For Measuring End-To-End Internet Application Performance
- Mountain View CA, US Pawel Jurczyk - Newton MA, US Vivek Ramachandran - Mountain View CA, US
International Classification:
H04L 12/24 H04L 12/54
Abstract:
Technology for characterizing internet application performance is described. An example method may involve, analyzing client requests from a plurality of internet service providers, the client requests comprising requests to access media items and being associated with internet service provider identities; identifying a set of the client requests that are associated with a first internet service provider; determining for at least one client request of the set: a request time, a payload data quantity, and an elapsed time; calculating a transfer rate comprising an application level throughput for the at least one client request, the transfer rate being based on the payload data quantity and the elapsed time; and calculating a performance measurement of the first and second internet service providers, the performance measurements being based on the transfer rate and on a portion of the set of client requests that have a transfer rate meeting a transfer threshold.
Method For Measuring End-To-End Internet Application Performance
- Mountain View CA, US Pawel Jurczyk - Newton MA, US Vivek Ramachandran - Mountain View CA, US
International Classification:
H04L 12/24 H04L 12/54
Abstract:
Technology for characterizing internet application performance is described. An example method may involve, analyzing client requests from a plurality of internet service providers, the client requests comprising requests to access media items and being associated with internet service provider identities; identifying a set of the client requests that are associated with a first internet service provider; determining for at least one client request of the set: a request time, a payload data quantity, and an elapsed time; calculating a transfer rate comprising an application level throughput for the at least one client request, the transfer rate being based on the payload data quantity and the elapsed time; and calculating a performance measurement of the first and second internet service providers, the performance measurements being based on the transfer rate and on a portion of the set of client requests that have a transfer rate meeting a transfer threshold.
Method For Measuring End-To-End Internet Application Performance
- Mountain View CA, US Pawel Jurczyk - Newton MA, US Vivek Ramachandran - Mountain View CA, US
Assignee:
Google Inc. - Mountain View CA
International Classification:
H04L 12/26
Abstract:
In a method and system for characterizing Internet application performance, requests for media items from at least one client can be identified. For each of request, a request time, an Internet service provider identity, a location of the client, a data quantity transferred, and an elapsed time for fulfillment of the request can be determined. An evaluation period, a geographic boundary, and an Internet service provider can be identified, and matching requests can be determined, where the matching requests have a request time within the evaluation period, a location within the geographic boundary, and an Internet service provider identity corresponding to the Internet service provider. A transfer rate for each matching request can be calculated based on the data quantity transferred and elapsed time. A percentage of matching requests with a transfer rate meeting a transfer threshold can then be calculated.
Youtube
Hacktivity 2012 - Vivek Ramachandran - Cracki...
In this talk, we will explore the bleeding edge techniques used to com...
At the moment, buyers and suppliers use a letter of credit, typically concluded by physically transferring paper documents, to underpin transactions, said Vivek Ramachandran, global head of innovation and growth at HSBCs commercial banking unit.