Papers by Srinivas Padmanabhuni
Table of Contents 2005 IEEE International Conference on Services Computing SCC 2005
Software Engineering Comments Sentiment Analysis Using LSTM with Various Padding Sizes
Future Directions and Conclusions
John Wiley & Sons, Ltd eBooks, Feb 11, 2009
Empirical Analysis for Investigating the Effect of Machine Learning Techniques on Malware Prediction
Optimizing Semantic Segmentation for Enhanced Football Analytics: A Pixel-level Approach
Procedia computer science, 2024

Proceedings of the 7th ACM India Computing Conference
Proceedings of the 7th ACM India Computing Conference, 2014
For the past six years, Compute, the annual conference organized by various ACM Chapters in India... more For the past six years, Compute, the annual conference organized by various ACM Chapters in India, has provided an excellent forum for computer science and information technology researchers - from both academia and industry - to present and share their work. These meetings have enabled and nurtured many symbiotic relationships between academia and industry and benefited the IT industry, entrepreneurs, investors and academia. This year, Compute, in its seventh edition as an ACM India event, is being hosted by ACM Nagpur Chapter and VNIT. We are witnessing an explosive growth of digital content fuelled by the internet, and more recently, by the unprecedented proliferation of information content across diverse computing platforms. This explosive growth has led to a significant increase in the complexity of today's information needs, and computing needs. Compute conference intends to explore the practical implications and desiderata for dealing with the increased complexity of information, and the enhanced scalable and high performance computing needs for the next generation of enterprises and consumers. The aim of this conference is to bring together researchers, practitioners, technology market movers, and thought leaders, with a view to advance the state of the art, and the state of the practice in applied research in areas of information management, and scalable computing. We believe that these advances will serve as a catalyst in leveraging ICT for the betterment of the society.
Large, multinational software development organizations face a number of issues in supporting sof... more Large, multinational software development organizations face a number of issues in supporting software design and modeling by geographically distributed architects. To address these issues, we present CoDesign, an extensible, collaborative, event-based software modeling framework developed in a distributed, collaborative setting by our two organizations. CoDesign's core capabilities include real-time model synchronization between geographically distributed architects, as well as detection and resolution of a range of modeling conflicts via several off-the-shelf conflict detection engines.

ITM Web of Conferences
The extensive usage of online applications and social media has raised serious concerns from the ... more The extensive usage of online applications and social media has raised serious concerns from the public regarding the exposure of their personal information. So, there is a strong need for data anonymization to prevent privacy breaches and leakages. The era of attacks on databases and servers is an old trend. Now, most attacks are based on earning access to users’ private data. There are techniques like k-anonymity and l-diversity to protect Personally Identifiable Information (PII) from adversaries. However, these techniques still cannot provide security from homogeneity attacks, and their application is limited to structural data only. Till now, the frameworks are only available to anonymize the human face data in image format. In this paper, we proposed a new architecture for protecting privacy-related information in images of Indian vehicle number plates. We propose an architecture for anonymizing the vehicle number plates using Wasserstein’s Generative Adversarial Network (WGAN...
Deep-Learning Approach with DeepXplore for Software Defect Severity Level Prediction
Computational Science and Its Applications – ICCSA 2021, 2021

Proceedings of the 6th ACM India Computing Convention, COMPUTE 2013, Vellore, Tamil Nadu, India, August 22 - 24, 2013
For the past five years, Compute, the annual conference organized by various ACM Chapters in Indi... more For the past five years, Compute, the annual conference organized by various ACM Chapters in India, has provided an excellent forum for computer science and information technology researchers - from both academia and industry - to present and share their work. These meetings have enabled and nurtured many symbiotic relationships between academia and industry and benefited the IT industry, entrepreneurs, investors and academia. This year, Compute, in its sixth edition as an ACM India event, is being hosted by ACM Student Chapter, VIT university. We are witnessing an explosive growth of digital content fuelled by the internet, and more recently, by the unprecedented proliferation of information content across diverse computing platforms. This explosive growth has led to a significant increase in the complexity of today's information needs, computing needs and security needs.The Compute conference intends to explore the practical implications and desiderata for dealing with the inc...

Predicting Software Defect Severity Level using Sentence Embedding and Ensemble Learning
2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 2021
Bug tracking is one of the prominent activities during the maintenance phase of software developm... more Bug tracking is one of the prominent activities during the maintenance phase of software development. The severity of the bug acts as a key indicator of its criticality and impact towards planning evolution and maintenance of various types of software products. This indicator measures how negatively the bug may affect the system functionality. This helps in determining how quickly the development teams need to address the bug for successful execution of the software system. Due to a large number of bugs reported every day, the developers find it really difficult to assign the severity level to bugs accurately. Assigning incorrect severity level results in delaying the bug resolution process. Thus automated systems were developed which will assign a severity level using various machine learning techniques. In this work, five different types of sentence embedding techniques have been applied on bugs description to convert the description comments to an n-dimensional vector. These computed vectors are used as an input of the software defect severity level prediction models and ensemble techniques like Bagging, Random Forest classifier, Extra Trees classifier, AdaBoost and Gradient Boosting have been used to train these models. We have also considered different variants of the Synthetic Minority Oversampling Technique (SMOTE) to handle the class imbalance problem as the considered datasets are not evenly distributed. The experimental results on six projects highlight that the usage of sentence embedding, ensemble techniques, and different variants of SMOTE techniques helps in improving the predictive ability of defect severity level prediction models.
Infrastructure-Level Solutions
Distributed Systems Security
Reckoning Legislative Compliances with Service Oriented Architecture A Proposed Approach
2005 IEEE International Conference on Services Computing (SCC'05) Vol-1, 2005
Recent accounting scandals involving firms such as such as Enron, Worldcom, Tyco etc. have result... more Recent accounting scandals involving firms such as such as Enron, Worldcom, Tyco etc. have resulted in the emergence of stringent regulations aimed at safeguarding the interest of enterprise stakeholders. Important regulations such as Sarbanes-Oxley Act (SOX), the US PATRIOT ...
A Constraint Satisfaction Approach to Non-functional Requirements in Adaptive Web Services
International Conference on Next Generation Web Services Practices, 2006
Abstract While agility is a key driver for business processes as envisaged in service oriented ar... more Abstract While agility is a key driver for business processes as envisaged in service oriented architecture (SOA) deployments, very little thought has been put forward in the direction of managing the non-functional requirements adaptively. Adaptive SOA and Web services ...
Coupling RDF/RSS, WSRP and AJAX for Dynamic Reusable Portlets: An Approach and a Use Case
2007 IEEE Congress on Services (Services 2007), 2007
... Srinivas Padmanabhuni, Krishnendu Kunti, Lipika Sahoo, Shaurabh Bharti Infosys Technologies L... more ... Srinivas Padmanabhuni, Krishnendu Kunti, Lipika Sahoo, Shaurabh Bharti Infosys Technologies Limited, Hosur Road, Bangalore, India - 560100 {Krishnendu_Kunti, Shaurabh_Bharti, Lipika_Shahoo, Srinivas_P ... (accessed Feb 21, 2007) [21] Bijoy Majumdar, Anshuk Chinmoy ...
An Approach to Automating Transaction Management in a Data Services Platform
International Conference on Next Generation Web Services Practices, 2006
In today's enterprises data lies across multiple sources in custom formats, often there exis... more In today's enterprises data lies across multiple sources in custom formats, often there exists no means to access (query and update) these data sources in a common enterprise wide uniform format. The requirement has led to emergence of data services platforms that allow real ...
Empowering Next Generation Flexible Operational Data Stores with Service Orientation
International Conference on Next Generation Web Services Practices (NWeSP'05)
Abstract The paradigm of service oriented architecture (SOA) facilitates construction of software... more Abstract The paradigm of service oriented architecture (SOA) facilitates construction of software in a modular and reusable manner, due to the delivery of software functionality in form of well-abstracted contractually binding interfaces, independent of the underlying ...
2007 Working IEEE/IFIP Conference on Software Architecture (WICSA'07), 2007
A common approach to defining architectural views is to have independent heterogeneous representa... more A common approach to defining architectural views is to have independent heterogeneous representations that are tailored to each view's purpose, but this makes reconciling views into an overall architectural description harder. In this paper we put forward a complementary (not alternative) approach in which some views are derived from a given architecture description language (ADL) in a systematic way, by listing the design questions each view should answer. The approach is based on constructing the language's metamodel and extending it with the entities and associations needed to capture and explicitly relate the required views.
Preventing Service Oriented Denial of Service (PreSODoS): A Proposed Approach
2006 IEEE International Conference on Web Services (ICWS'06), 2006
Today Web services have grown in context of both business to business (B2B) and business to custo... more Today Web services have grown in context of both business to business (B2B) and business to customer (B2C) applications. Web services are the most popular mode of implementing Service Oriented Architecture (SOA). With this growth and acceptance in the industry, the role of ...

IEEE International Conference on Web Services (ICWS'05), 2005
SOA and Web Services are the hottest topics of discussion currently with regards to enterprise ar... more SOA and Web Services are the hottest topics of discussion currently with regards to enterprise architecture. The technologies are maturing from a standardization perspective and the level of understanding of various aspects of a SOA is gradually rising with an increasing number of clients thinking about service implementation and adoption. This trend has generated significant interest in IT and business circles alike, owing to the promise of bridging the gap between business strategists and IT architects. Service Oriented Architecture builds upon decades of distributed computing technologies and advocates the delivery of software applications in the form of an open interface based on strict contracts, leading to loosely coupled systems which are implementation independent. This tutorial will focus on providing an overview of service oriented architecture with emphasis on the evolution of SOA from other technologies such as object oriented programming and distributed computing. Subsequently, the tutorial will delve into exploring SOA from multiple perspectives, such as the relevance of SOA in EAI, SOA features of J2EE and .NET apart from illustrating specific recommendations on migrating to SOA based on some sample implementations.
Uploads
Papers by Srinivas Padmanabhuni