swapnil soner - Academia.edu (original) (raw)

Papers by swapnil soner

Research paper thumbnail of An approach for extracting business rules from legacy C++ code

2011 3rd International Conference on Electronics Computer Technology, 2011

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Reverse engineering: Journey from code to design

2011 3rd International Conference on Electronics Computer Technology, 2011

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Reverse engineering": Extracting information from C++ code

... of the department Prof. Anshu Tripathi, my project guide Prof. Abhishek Singh Rathore who hel... more ... of the department Prof. Anshu Tripathi, my project guide Prof. Abhishek Singh Rathore who helped us lot in calculating the facts and figures related to our paper. I would also like to thank Prof. JK Khatwani, Mr. Samay Mahajan ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of “Reverse engineering”: Extracting information from C++ code

International Conference on Software Technology and Engineering, 2010

This paper presents an experiment to reverse engineer a legacy source code. Here, it is used as a... more This paper presents an experiment to reverse engineer a legacy source code. Here, it is used as a part of a project to develop and upgrade the existing system written in C++ language. To accomplish this task some information's must be need to be extracted from that legacy C++ code. The extracted information now used to implement a new version

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Survey on Software Bug Evaluation

International Journal of Computer Applications, 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Green cloud computing: A review on Green IT areas for cloud computing environment

2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A novel approach to calculate the severity and priority of bugs in software projects

2010 2nd International Conference on Education Technology and Computer, 2010

Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount o... more Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount of effort is devoted by software developers on this issue. In the world of software one cannot get rid of the bugs, fixes, patches etc. each of them have a severity and priority associated to it. There is not yet any formal relation between these components

Bookmarks Related papers MentionsView impact

Research paper thumbnail of RSA Based Threshold Cryptography for Secure Routing and Key Exchange in Group Communication

Communications in Computer and Information Science, 2011

... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ ... more ... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ (n) = (p − 1) (q − 1) Pick e, so that gcd (e, Φ (n)) = 1, 1 < e < Φ (n) Calculate, so that d. e mod Φ (n) = 1, d is the multiplicative inverse of e in mod Φ (n) Get public key as PUK = {e, n ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Metrics calculation for deployment process

2010 2nd International Conference on Software Technology and Engineering, 2010

Collecting software engineering data is difficult process since it involves calculation on variou... more Collecting software engineering data is difficult process since it involves calculation on various parameters such as development, testing, integration, quality assurance and deployment activity. This excerpt discusses the metric calculations for the deployment process. People that are the part of a project need to collect, maintain and update relevant data from different development processes. Due to such a complexity of

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Metrics calculation for deployment process

International Conference on Software Technology and Engineering, 2010

Collecting software engineering data is difficult process since it involves calculation on variou... more Collecting software engineering data is difficult process since it involves calculation on various parameters such as development, testing, integration, quality assurance and deployment activity. This excerpt discusses the metric calculations for the deployment process. People that are the part of a project need to collect, maintain and update relevant data from different development processes. Due to such a complexity of

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An approach for extracting business rules from legacy C++ code

2011 3rd International Conference on Electronics Computer Technology, 2011

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Reverse engineering: Journey from code to design

2011 3rd International Conference on Electronics Computer Technology, 2011

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Reverse engineering": Extracting information from C++ code

... of the department Prof. Anshu Tripathi, my project guide Prof. Abhishek Singh Rathore who hel... more ... of the department Prof. Anshu Tripathi, my project guide Prof. Abhishek Singh Rathore who helped us lot in calculating the facts and figures related to our paper. I would also like to thank Prof. JK Khatwani, Mr. Samay Mahajan ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of “Reverse engineering”: Extracting information from C++ code

International Conference on Software Technology and Engineering, 2010

This paper presents an experiment to reverse engineer a legacy source code. Here, it is used as a... more This paper presents an experiment to reverse engineer a legacy source code. Here, it is used as a part of a project to develop and upgrade the existing system written in C++ language. To accomplish this task some information's must be need to be extracted from that legacy C++ code. The extracted information now used to implement a new version

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Survey on Software Bug Evaluation

International Journal of Computer Applications, 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Green cloud computing: A review on Green IT areas for cloud computing environment

2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A novel approach to calculate the severity and priority of bugs in software projects

2010 2nd International Conference on Education Technology and Computer, 2010

Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount o... more Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount of effort is devoted by software developers on this issue. In the world of software one cannot get rid of the bugs, fixes, patches etc. each of them have a severity and priority associated to it. There is not yet any formal relation between these components

Bookmarks Related papers MentionsView impact

Research paper thumbnail of RSA Based Threshold Cryptography for Secure Routing and Key Exchange in Group Communication

Communications in Computer and Information Science, 2011

... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ ... more ... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ (n) = (p − 1) (q − 1) Pick e, so that gcd (e, Φ (n)) = 1, 1 < e < Φ (n) Calculate, so that d. e mod Φ (n) = 1, d is the multiplicative inverse of e in mod Φ (n) Get public key as PUK = {e, n ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Metrics calculation for deployment process

2010 2nd International Conference on Software Technology and Engineering, 2010

Collecting software engineering data is difficult process since it involves calculation on variou... more Collecting software engineering data is difficult process since it involves calculation on various parameters such as development, testing, integration, quality assurance and deployment activity. This excerpt discusses the metric calculations for the deployment process. People that are the part of a project need to collect, maintain and update relevant data from different development processes. Due to such a complexity of

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Metrics calculation for deployment process

International Conference on Software Technology and Engineering, 2010

Collecting software engineering data is difficult process since it involves calculation on variou... more Collecting software engineering data is difficult process since it involves calculation on various parameters such as development, testing, integration, quality assurance and deployment activity. This excerpt discusses the metric calculations for the deployment process. People that are the part of a project need to collect, maintain and update relevant data from different development processes. Due to such a complexity of

Bookmarks Related papers MentionsView impact