A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Extracting business logic from existing COBOL programs as a basis for redevelopment
Proceedings 9th International Workshop on Program Comprehension. IWPC 2001
First, the programs were restructured, secondly the programs were sliced into business logic modules, third the business modules were subjected to a multi view analysis and finally the views were integrated ...
The following paper describes an industrial pilot study carried out to regain the business knowledge embedded in a legacy COBOL application. ...
The Logic Extraction Method Once an organization has decided to redevelop it's applications, one of the first steps is to extract the business logic from the existing programs. ...
doi:10.1109/wpc.2001.921728
dblp:conf/iwpc/Sneed01
fatcat:ynodczhqgzcqhk7afh77t5wxsq
Business Rule Management Framework For N-Tier E-Business Applications
2018
Zenodo
With a motive to resolve the above issues, several tools for extracting the rules from the business program code have been developed. ...
In this paper, a robust architecture for an extraction engine to isolate rules from the base source code has been proposed. ...
The method was implemented in a reverse engineering tool SOFT-REDOC for COBOL programs [14] . ...
doi:10.5281/zenodo.1317858
fatcat:temjekukobcmpdhb5y377bbyda
Automated Mass Maintenance of Software Assets
2007
11th European Conference on Software Maintenance and Reengineering (CSMR'07)
A consistent, automated approach reduces Acknowledgements We thank all reviewers for their comments. ...
Our thanks are also due to Peter Bol from Getronics PinkRoccade and Carl Iglesias and Grant LeMyre from Telecom Management Consulting Group for their cooperation. ...
business logic. ...
doi:10.1109/csmr.2007.15
dblp:conf/csmr/Veerman07
fatcat:wbdt5nlnunbinfdutdlmmliub4
Automated reverse engineering of legacy 4GL information system applications using the ITOC workbench
[chapter]
1998
Lecture Notes in Computer Science
The anticipated cost of this redevelopment can deter an organisation from changing vendors, hence denying it the benefits that would otherwise result, for example, the exploitation of more sophisticated ...
A tool resulting from the project has been utilised to recover design information from several deployed commercial applications. ...
(Rugaber and Doddapaneni, 1993) attempted to automate the extraction of and SQL schema from a COBOL program that used fiat ISAM files. ...
doi:10.1007/bfb0054218
fatcat:zlso6g3w7bct7cd5mwjuwrkxfm
Aligning technology and business: Applying patterns for legacy transformation
2005
IBM Systems Journal
This paper describes our approach for mapping business requirements to application software, for using patterns to help translate business requirements to software requirements, and for using patterns ...
Two key goals for aligning technology and business are to increase an organization's ability to change rapidly and to reduce the costs of technology. ...
Screen Handling Separated From Business Logic, in which online programs are well-suited for invocation of business logic from a wrapper or service interface. ...
doi:10.1147/sj.441.0025
fatcat:etxb3es3brcyff2rzsvwcb2cne
A Formal Model for Legacy System Understanding
2018
International Journal of Intelligent Systems and Applications
A formal mathematical model for representing the status of LSU and application of the same on a case study has been presented. ...
These findings have enabled us to formulate a process for building up an artefact repository and artefact dependency repository. ...
Program slicing, concept slicing, graph transformation code translation, model-driven program transformation, screen scraping, code query technology etc [4] are used for extracting the legacy code as ...
doi:10.5815/ijisa.2018.10.04
fatcat:5dv3alov5rdl7o3xzoohh3zgza
Wrapper-based evolution of legacy information systems
2006
ACM Transactions on Software Engineering and Methodology
For instance, a wrapper can be generated for a collection of COBOL files in order to allow external programs to access them through a relational, object-oriented or XML interface, while offering referential ...
System evolution most often implies the integration of legacy components, such as databases, with newly developed ones, leading to mixed architectures that suffer from severe heterogeneity problems. ...
For example, the logical schema of a database that comprises a collection of coordinated COBOL files will include unique keys and foreign keys. ...
doi:10.1145/1178625.1178626
fatcat:dctqi3rg5zdhrafq4lsmi22mpa
Program understanding: Challenge for the 1990s
1989
IBM Systems Journal
The history and background which motivated and which led to the start of this research on tools to assist programmers in understanding existing program code is reported here. ...
Remove defects Address new requirements Improve design and/or performance Interface to new programs Adjust to changes in data structures or formats Exploit new hardware and software features As we extended ...
Analyzing one's business competitors is a prototypical example. The task begins with an analyst extracting scraps of information about competitors from available sources. ...
doi:10.1147/sj.282.0294
fatcat:dyasbkozifaktlgobd5s24dhay
METHODOLOGY AND PRACTICE
1973
Philosophia Reformata
It has generally been recognized for some time that the relational database management system (DBMS) DB2 offers a superior platform when compared with file systems and networked DBMSs. ...
This document is written for managers and senior professionals who are considering upgrading heritage systems by converting them to use the DB2 family. ...
DB2 is a powerful relational database management system (DBMS) where the data is stored in easy-to-understand tables. • Data is extracted (copied) from existing operational systems on a regular basis and ...
doi:10.1163/22116117-90001250
fatcat:rgqrzwb3gjam3mhi3gfm4euuue
Research directions in software reuse
1995
Proceedings of the 1995 Symposium on Software reusability - SSR '95
We are able to look back at more than 15 years of research and should use the opportunity of such a symposium to critically evaluate the past research in order to identify promising future research areas ...
Component programming is a methodology for software construction from catalogs of standard components. ...
Well-
designed
imperative
programs,
for instance,
can have
as high a reuse potential
as well-designed
programs
im-
plemented
in a "modern"
paradigm,
such as the object-
oriented
one. ...
doi:10.1145/211782.211850
dblp:conf/ssr/GallJK95
fatcat:uz4j3otxpff2jerhxlzken3qke
Reverse Engineering Application Instruments and Code Reliability: A Comparative Study of Tools
[chapter]
2021
Advances in Transdisciplinary Engineering
These instruments are used for a better understanding of the program algorithm, logic, and program specifics in windows API functions, programming assembler language, network interaction principle. ...
These business rules are implemented in the form of a line code whereas actual source code is hidden and only gets the binary form of the code. ...
RE can be stated as the method of investigating a previously executed programming system to reveal its design or extract knowledge from that software [2] . ...
doi:10.3233/atde210012
fatcat:fwbf26el2bayfpypbkrdbaqflq
Reengineering legacy systems for distributed environments
2002
Journal of Systems and Software
It is important to note that existing programs or systems represent important assets of companies, where business rules, operations and expertise are implemented. ...
Existing legacy systems use a variety of software paradigms (e.g., unstructured: COBOL, structured: C, and even object-oriented: C++) and a variety of hardware platforms. ...
u to P la c * H o Id • rB a tc h 65 nsT ra ns ac tio n M anagcr 20 nsAuloRults 66 nsT ransac tio nR*doS tack 2 1 nsAutoS*l*ctionR*s*t 67 n s T ransactionR*l*as*
DOCTORAL EXAM INATION AND D IS S E R ...
doi:10.1016/s0164-1212(02)00020-1
fatcat:husaa4kzqbg5zddzh2pebvaxrm
A Service-Oriented Componentization Framework for Java Software Systems
2006
2006 13th Working Conference on Reverse Engineering
i) identifying critical business services embedded in an existing Java system by utilizing graph representations of the system models, ii) realizing each identified service as a self-contained component ...
In the fast growing global market for services, providing competitive services to these markets is critical for the success of businesses and organizations. ...
By applying the Ephedra method, parts of C code can be implemented into Java platforms which makes it possible to avoid a complete redevelopment of the business logic that was already presented in the ...
doi:10.1109/wcre.2006.7
dblp:conf/wcre/LiT06
fatcat:lizqlmikmvcoviell6qov4dzgq
Iterative reengineering of legacy systems
2003
IEEE Transactions on Software Engineering
Moreover, each program needs to be reengineered within a short period of time. ...
During its life a legacy system is subjected to many maintenance activities, which cause degradation of the quality of the system: when this degradation exceeds a critical threshold the legacy system needs ...
Pragnell, B.A. for her contribution as technical-writer. Finally, we are grateful to the anonymous reviewers for their interesting suggestions, comments and remarks.
7. ...
doi:10.1109/tse.2003.1183932
fatcat:gpbz56aenfad5kjloeesv6txqe
Specialized system development
2003
International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003.
Computer crimes range from using the computer or computer network as a target, to using computer as a medium (i.e. misleading information), to using computers as a planning or deception tool (Turban et ...
-Responsibility
modeling
-Security
semantics
-Logical
approach
-ERM, DFD, OO
and business
process
modeling for
security. ...
doi:10.1109/itre.2003.1270587
fatcat:puqck3rnbzef5bpwfiwvj3sbh4
« Previous
Showing results 1 — 15 out of 44 results