swapnil soner - Academia.edu (original) (raw)
Papers by swapnil soner
2011 3rd International Conference on Electronics Computer Technology, 2011
Bookmarks Related papers MentionsView impact
2011 3rd International Conference on Electronics Computer Technology, 2011
Bookmarks Related papers MentionsView impact
... of the department Prof. Anshu Tripathi, my project guide Prof. Abhishek Singh Rathore who hel... more ... of the department Prof. Anshu Tripathi, my project guide Prof. Abhishek Singh Rathore who helped us lot in calculating the facts and figures related to our paper. I would also like to thank Prof. JK Khatwani, Mr. Samay Mahajan ...
Bookmarks Related papers MentionsView impact
International Conference on Software Technology and Engineering, 2010
This paper presents an experiment to reverse engineer a legacy source code. Here, it is used as a... more This paper presents an experiment to reverse engineer a legacy source code. Here, it is used as a part of a project to develop and upgrade the existing system written in C++ language. To accomplish this task some information's must be need to be extracted from that legacy C++ code. The extracted information now used to implement a new version
Bookmarks Related papers MentionsView impact
International Journal of Computer Applications, 2015
Bookmarks Related papers MentionsView impact
2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015
Bookmarks Related papers MentionsView impact
2010 2nd International Conference on Education Technology and Computer, 2010
Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount o... more Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount of effort is devoted by software developers on this issue. In the world of software one cannot get rid of the bugs, fixes, patches etc. each of them have a severity and priority associated to it. There is not yet any formal relation between these components
Bookmarks Related papers MentionsView impact
Communications in Computer and Information Science, 2011
... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ ... more ... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ (n) = (p − 1) (q − 1) Pick e, so that gcd (e, Φ (n)) = 1, 1 < e < Φ (n) Calculate, so that d. e mod Φ (n) = 1, d is the multiplicative inverse of e in mod Φ (n) Get public key as PUK = {e, n ...
Bookmarks Related papers MentionsView impact
2010 2nd International Conference on Software Technology and Engineering, 2010
Collecting software engineering data is difficult process since it involves calculation on variou... more Collecting software engineering data is difficult process since it involves calculation on various parameters such as development, testing, integration, quality assurance and deployment activity. This excerpt discusses the metric calculations for the deployment process. People that are the part of a project need to collect, maintain and update relevant data from different development processes. Due to such a complexity of
Bookmarks Related papers MentionsView impact
International Conference on Software Technology and Engineering, 2010
Collecting software engineering data is difficult process since it involves calculation on variou... more Collecting software engineering data is difficult process since it involves calculation on various parameters such as development, testing, integration, quality assurance and deployment activity. This excerpt discusses the metric calculations for the deployment process. People that are the part of a project need to collect, maintain and update relevant data from different development processes. Due to such a complexity of
Bookmarks Related papers MentionsView impact
2011 3rd International Conference on Electronics Computer Technology, 2011
Bookmarks Related papers MentionsView impact
2011 3rd International Conference on Electronics Computer Technology, 2011
Bookmarks Related papers MentionsView impact
... of the department Prof. Anshu Tripathi, my project guide Prof. Abhishek Singh Rathore who hel... more ... of the department Prof. Anshu Tripathi, my project guide Prof. Abhishek Singh Rathore who helped us lot in calculating the facts and figures related to our paper. I would also like to thank Prof. JK Khatwani, Mr. Samay Mahajan ...
Bookmarks Related papers MentionsView impact
International Conference on Software Technology and Engineering, 2010
This paper presents an experiment to reverse engineer a legacy source code. Here, it is used as a... more This paper presents an experiment to reverse engineer a legacy source code. Here, it is used as a part of a project to develop and upgrade the existing system written in C++ language. To accomplish this task some information's must be need to be extracted from that legacy C++ code. The extracted information now used to implement a new version
Bookmarks Related papers MentionsView impact
International Journal of Computer Applications, 2015
Bookmarks Related papers MentionsView impact
2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015
Bookmarks Related papers MentionsView impact
2010 2nd International Conference on Education Technology and Computer, 2010
Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount o... more Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount of effort is devoted by software developers on this issue. In the world of software one cannot get rid of the bugs, fixes, patches etc. each of them have a severity and priority associated to it. There is not yet any formal relation between these components
Bookmarks Related papers MentionsView impact
Communications in Computer and Information Science, 2011
... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ ... more ... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ (n) = (p − 1) (q − 1) Pick e, so that gcd (e, Φ (n)) = 1, 1 < e < Φ (n) Calculate, so that d. e mod Φ (n) = 1, d is the multiplicative inverse of e in mod Φ (n) Get public key as PUK = {e, n ...
Bookmarks Related papers MentionsView impact
2010 2nd International Conference on Software Technology and Engineering, 2010
Collecting software engineering data is difficult process since it involves calculation on variou... more Collecting software engineering data is difficult process since it involves calculation on various parameters such as development, testing, integration, quality assurance and deployment activity. This excerpt discusses the metric calculations for the deployment process. People that are the part of a project need to collect, maintain and update relevant data from different development processes. Due to such a complexity of
Bookmarks Related papers MentionsView impact
International Conference on Software Technology and Engineering, 2010
Collecting software engineering data is difficult process since it involves calculation on variou... more Collecting software engineering data is difficult process since it involves calculation on various parameters such as development, testing, integration, quality assurance and deployment activity. This excerpt discusses the metric calculations for the deployment process. People that are the part of a project need to collect, maintain and update relevant data from different development processes. Due to such a complexity of
Bookmarks Related papers MentionsView impact