scispace - formally typeset
S

Sanjai Narain

Researcher at Telcordia Technologies

Publications -  17
Citations -  497

Sanjai Narain is an academic researcher from Telcordia Technologies. The author has contributed to research in topics: Solver & Component (UML). The author has an hindex of 9, co-authored 16 publications receiving 488 citations.

Papers
More filters
Patent

Method and system for estimating the ability of a subscriber loop to support broadband services

TL;DR: In this paper, the authors present a method and apparatus for qualifying ADSL subscriber loops wherein modem 2 (113) talks to modem 1 (103) in a two-hop manner.
Journal ArticleDOI

Declarative Infrastructure Configuration Synthesis and Debugging

TL;DR: This paper presents ConfigAssure to help automatically bridge the large conceptual gap between end-to-end infrastructure requirements and detailed component configuration implementing those requirements, and proposes solutions to four fundamental problems: specification, configuration synthesis, configuration error diagnosis, and configuration error repair.
Proceedings Article

Network configuration management via model finding

TL;DR: This paper shows how to formalize and automate such reasoning using a new logical system called Alloy, based on the concept of model finding, to build a Requirement Solver that takes as input a set of network components and requirements upon their configurations and determines component configurations satisfying those requirements.
Patent

Ip network vulnerability and policy compliance assessment by ip device analysis

TL;DR: In this article, the authors present a solution for automated vulnerability and compliance assessment of IP networks through automated analysis of configurations of devices such as routers, switches, and firewalls.
Proceedings ArticleDOI

Building autonomic systems via configuration

TL;DR: This paper presents a technique called Service Grammar for building tools based on a novel analysis of protocols and distributed algorithms in a domain of interest and shows how lower-layer adaptive protocols can be composed to create adaptive behavior at a higher layer.