Filters








44 Hits in 5.7 sec

Extracting business logic from existing COBOL programs as a basis for redevelopment

H.M. Sneed
Proceedings 9th International Workshop on Program Comprehension. IWPC 2001  
First, the programs were restructured, secondly the programs were sliced into business logic modules, third the business modules were subjected to a multi view analysis and finally the views were integrated  ...  The following paper describes an industrial pilot study carried out to regain the business knowledge embedded in a legacy COBOL application.  ...  The Logic Extraction Method Once an organization has decided to redevelop it's applications, one of the first steps is to extract the business logic from the existing programs.  ... 
doi:10.1109/wpc.2001.921728 dblp:conf/iwpc/Sneed01 fatcat:ynodczhqgzcqhk7afh77t5wxsq

Business Rule Management Framework For N-Tier E-Business Applications

M.Thirumaran, P.Dhavachelvan, S.Subhashree
2018 Zenodo  
With a motive to resolve the above issues, several tools for extracting the rules from the business program code have been developed.  ...  In this paper, a robust architecture for an extraction engine to isolate rules from the base source code has been proposed.  ...  The method was implemented in a reverse engineering tool SOFT-REDOC for COBOL programs [14] .  ... 
doi:10.5281/zenodo.1317858 fatcat:temjekukobcmpdhb5y377bbyda

Automated Mass Maintenance of Software Assets

Niels Veerman
2007 11th European Conference on Software Maintenance and Reengineering (CSMR'07)  
A consistent, automated approach reduces Acknowledgements We thank all reviewers for their comments.  ...  Our thanks are also due to Peter Bol from Getronics PinkRoccade and Carl Iglesias and Grant LeMyre from Telecom Management Consulting Group for their cooperation.  ...  business logic.  ... 
doi:10.1109/csmr.2007.15 dblp:conf/csmr/Veerman07 fatcat:wbdt5nlnunbinfdutdlmmliub4

Automated reverse engineering of legacy 4GL information system applications using the ITOC workbench [chapter]

John V. Harrison, Wie Ming Lim
1998 Lecture Notes in Computer Science  
The anticipated cost of this redevelopment can deter an organisation from changing vendors, hence denying it the benefits that would otherwise result, for example, the exploitation of more sophisticated  ...  A tool resulting from the project has been utilised to recover design information from several deployed commercial applications.  ...  (Rugaber and Doddapaneni, 1993) attempted to automate the extraction of and SQL schema from a COBOL program that used fiat ISAM files.  ... 
doi:10.1007/bfb0054218 fatcat:zlso6g3w7bct7cd5mwjuwrkxfm

Aligning technology and business: Applying patterns for legacy transformation

H. M. Hess
2005 IBM Systems Journal  
This paper describes our approach for mapping business requirements to application software, for using patterns to help translate business requirements to software requirements, and for using patterns  ...  Two key goals for aligning technology and business are to increase an organization's ability to change rapidly and to reduce the costs of technology.  ...  Screen Handling Separated From Business Logic, in which online programs are well-suited for invocation of business logic from a wrapper or service interface.  ... 
doi:10.1147/sj.441.0025 fatcat:etxb3es3brcyff2rzsvwcb2cne

A Formal Model for Legacy System Understanding

A.Sivagnana Ganesan, Dept. of Banking Technology, Pondicherry University, Puducherry, India, T. Chithralekha, M. Rajapandian
2018 International Journal of Intelligent Systems and Applications  
A formal mathematical model for representing the status of LSU and application of the same on a case study has been presented.  ...  These findings have enabled us to formulate a process for building up an artefact repository and artefact dependency repository.  ...  Program slicing, concept slicing, graph transformation code translation, model-driven program transformation, screen scraping, code query technology etc [4] are used for extracting the legacy code as  ... 
doi:10.5815/ijisa.2018.10.04 fatcat:5dv3alov5rdl7o3xzoohh3zgza

Wrapper-based evolution of legacy information systems

Philippe Thiran, Jean-Luc Hainaut, Geert-Jan Houben, Djamal Benslimane
2006 ACM Transactions on Software Engineering and Methodology  
For instance, a wrapper can be generated for a collection of COBOL files in order to allow external programs to access them through a relational, object-oriented or XML interface, while offering referential  ...  System evolution most often implies the integration of legacy components, such as databases, with newly developed ones, leading to mixed architectures that suffer from severe heterogeneity problems.  ...  For example, the logical schema of a database that comprises a collection of coordinated COBOL files will include unique keys and foreign keys.  ... 
doi:10.1145/1178625.1178626 fatcat:dctqi3rg5zdhrafq4lsmi22mpa

Program understanding: Challenge for the 1990s

T. A. Corbi
1989 IBM Systems Journal  
The history and background which motivated and which led to the start of this research on tools to assist programmers in understanding existing program code is reported here.  ...  Remove defects Address new requirements Improve design and/or performance Interface to new programs Adjust to changes in data structures or formats Exploit new hardware and software features As we extended  ...  Analyzing one's business competitors is a prototypical example. The task begins with an analyst extracting scraps of information about competitors from available sources.  ... 
doi:10.1147/sj.282.0294 fatcat:dyasbkozifaktlgobd5s24dhay

METHODOLOGY AND PRACTICE

J. P. A. MEKKES
1973 Philosophia Reformata  
It has generally been recognized for some time that the relational database management system (DBMS) DB2 offers a superior platform when compared with file systems and networked DBMSs.  ...  This document is written for managers and senior professionals who are considering upgrading heritage systems by converting them to use the DB2 family.  ...  DB2 is a powerful relational database management system (DBMS) where the data is stored in easy-to-understand tables. • Data is extracted (copied) from existing operational systems on a regular basis and  ... 
doi:10.1163/22116117-90001250 fatcat:rgqrzwb3gjam3mhi3gfm4euuue

Research directions in software reuse

Harald Gall, Mehdi Jazayeri, René Klösch
1995 Proceedings of the 1995 Symposium on Software reusability - SSR '95  
We are able to look back at more than 15 years of research and should use the opportunity of such a symposium to critically evaluate the past research in order to identify promising future research areas  ...  Component programming is a methodology for software construction from catalogs of standard components.  ...  Well- designed imperative programs, for instance, can have as high a reuse potential as well-designed programs im- plemented in a "modern" paradigm, such as the object- oriented one.  ... 
doi:10.1145/211782.211850 dblp:conf/ssr/GallJK95 fatcat:uz4j3otxpff2jerhxlzken3qke

Reverse Engineering Application Instruments and Code Reliability: A Comparative Study of Tools [chapter]

Manaqib Ahmad Zeeshan, Salman Sagheer Waris
2021 Advances in Transdisciplinary Engineering  
These instruments are used for a better understanding of the program algorithm, logic, and program specifics in windows API functions, programming assembler language, network interaction principle.  ...  These business rules are implemented in the form of a line code whereas actual source code is hidden and only gets the binary form of the code.  ...  RE can be stated as the method of investigating a previously executed programming system to reveal its design or extract knowledge from that software [2] .  ... 
doi:10.3233/atde210012 fatcat:fwbf26el2bayfpypbkrdbaqflq

Reengineering legacy systems for distributed environments

Miguel A. Serrano, Doris L. Carver, Carlos Montes de Oca
2002 Journal of Systems and Software  
It is important to note that existing programs or systems represent important assets of companies, where business rules, operations and expertise are implemented.  ...  Existing legacy systems use a variety of software paradigms (e.g., unstructured: COBOL, structured: C, and even object-oriented: C++) and a variety of hardware platforms.  ...  u to P la c * H o Id • rB a tc h 65 nsT ra ns ac tio n M anagcr 20 nsAuloRults 66 nsT ransac tio nR*doS tack 2 1 nsAutoS*l*ctionR*s*t 67 n s T ransactionR*l*as* DOCTORAL EXAM INATION AND D IS S E R  ... 
doi:10.1016/s0164-1212(02)00020-1 fatcat:husaa4kzqbg5zddzh2pebvaxrm

A Service-Oriented Componentization Framework for Java Software Systems

Shimin Li, Ladan Tahvildari
2006 2006 13th Working Conference on Reverse Engineering  
i) identifying critical business services embedded in an existing Java system by utilizing graph representations of the system models, ii) realizing each identified service as a self-contained component  ...  In the fast growing global market for services, providing competitive services to these markets is critical for the success of businesses and organizations.  ...  By applying the Ephedra method, parts of C code can be implemented into Java platforms which makes it possible to avoid a complete redevelopment of the business logic that was already presented in the  ... 
doi:10.1109/wcre.2006.7 dblp:conf/wcre/LiT06 fatcat:lizqlmikmvcoviell6qov4dzgq

Iterative reengineering of legacy systems

A. Bianchi, D. Caivano, V. Marengo, G. Visaggio
2003 IEEE Transactions on Software Engineering  
Moreover, each program needs to be reengineered within a short period of time.  ...  During its life a legacy system is subjected to many maintenance activities, which cause degradation of the quality of the system: when this degradation exceeds a critical threshold the legacy system needs  ...  Pragnell, B.A. for her contribution as technical-writer. Finally, we are grateful to the anonymous reviewers for their interesting suggestions, comments and remarks. 7.  ... 
doi:10.1109/tse.2003.1183932 fatcat:gpbz56aenfad5kjloeesv6txqe

Specialized system development

O. Eljabiri
2003 International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003.  
Computer crimes range from using the computer or computer network as a target, to using computer as a medium (i.e. misleading information), to using computers as a planning or deception tool (Turban et  ...  -Responsibility modeling -Security semantics -Logical approach -ERM, DFD, OO and business process modeling for security.  ... 
doi:10.1109/itre.2003.1270587 fatcat:puqck3rnbzef5bpwfiwvj3sbh4
« Previous Showing results 1 — 15 out of 44 results