A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Extracting business rules from COBOL: A model-based tool
2013
2013 20th Working Conference on Reverse Engineering (WCRE)
This paper presents a Business Rule Extraction tool for COBOL systems. ...
Starting from a COBOL program, we derive a model-based representation of the source code and we provide a set of model transformations to identify and visualize the embedded business rules. ...
In order to facilitate the comprehension and the evolution of COBOL-based systems, we present a Business Rule Extraction (BREX) tool 1 , that aims at extracting the (business) logic hardcoded in a system ...
doi:10.1109/wcre.2013.6671329
dblp:conf/wcre/CosentinoCABP13a
fatcat:bk3r4f47wfh6bmky4tebpaberi
Extracting business rules from COBOL: A model-based framework
2013
2013 20th Working Conference on Reverse Engineering (WCRE)
In this sense, the goal of this paper is to facilitate the comprehension of legacy systems (in particular COBOL-based ones) by providing a model driven reverse engineering framework able to extract and ...
In those systems, it is not even clear which business rules are enforced nor whether rules are still consistent with the current organizational policies. ...
In [15] and [16] , the authors propose a framework that extracts business rules from COBOL legacy code. ...
doi:10.1109/wcre.2013.6671316
dblp:conf/wcre/CosentinoCABP13
fatcat:2mny4mj5pvdlrml2ll346qdtmq
Extracting Business Rule from existing COBOL programs for Redevelopment
2019
International Journal Of Engineering And Computer Science
The paper describes an industrial business study carried out to regain the business knowledge embedded in a legacy COBOL application. ...
The aim of this work was to extract out the information required to re- implement the Legacy programs in a new client/server environment. The progress solution is in four step. ...
Taking a COBOL example that is well known : To extract a business rule we identify the candidate variables, and then use program slicing to extract the code segment. ...
doi:10.18535/ijecs/v8i05.4317
fatcat:nl7tz343zjfzxgxz7cuc52ncti
Getting Objects Methods and Interactions by Extracting Business Rules from Legacy Systems
2014
Journal of Systems Integration
This paper aims to present an approach for knowledge acquisition from existing legacy systems by extracting business rules from source code. ...
In fact, the business rules are extracted and assigned next to the domain entities in order to generate objects methods and interactions in an object-oriented platform. ...
.,1996) is a reverse engineering tool for COBOL program which extracts business rules embedded in code by manually input of the criteria elements. ...
doi:10.20470/jsi.v5i3.204
fatcat:pg4xbbxpyrcqjow2jcz4fzzrke
From Knowledge Discovery to Implementation: A Business Intelligence Approach Using Neural Network Rule Extraction and Decision Tables
[chapter]
2005
Lecture Notes in Computer Science
In this paper, we propose a framework for the development of business intelligence (BI) systems which centers on the use of neural network rule extraction and decision tables. ...
Two different types of neural network rule extraction algorithms, viz. Neurolinear and Neurorule, are compared, and subsequent implementation strategies based on decision tables are discussed. ...
A straightforward transformation of a DT into a decision tree, and from there to Pascal, C, COBOL, Java, Eiffel or Visual Basic program code, is provided. ...
doi:10.1007/11590019_55
fatcat:lh5kmkvhpvhs5d4bfv7i4lykiy
Restructuring of COBOL/CICS legacy systems
2002
Science of Computer Programming
In this paper we approach the problems from a technical viewpoint and we report on the methods and tools that are necessary to bring structure in transaction systems. ...
We provide a strategy to restructure transaction processing systems. Such systems are core assets of most modern business operations, so their enhancement is crucial. ...
research described in this paper is intended to solve the problem of restructuring CICS programs in order to make them more maintainable and to facilitate the migration into di erent environments such as to a ...
doi:10.1016/s0167-6423(02)00061-8
fatcat:gvks22y6qngwpdviugacbxarba
An empirical study into COBOL type inferencing
2001
Science of Computer Programming
In a typical COBOL program, the data division consists of 50% of the lines of code. ...
The main results include a tool set to carry out type inference experiments, a suite of metrics characterizing type inference outcomes, and the experimental observation that only one instance of pollution ...
When do two different variables hold values that represent the same business entity? Can a given variable ever receive a value from some other given variable? ...
doi:10.1016/s0167-6423(01)00015-6
fatcat:mx2gtrcyoremdpunezsu3uefpm
Cognac: A Framework for Documenting and Verifying the Design of Cobol Systems
2009
2009 13th European Conference on Software Maintenance and Reengineering
Next to discussing the architecture of Cognac, we present a validation of our tool on an industrial, large-scale Cobol system. ...
In this paper we present Cognac, an extension of the IntensiVE tool that allows for documenting and verifying design rules in Cobol systems. ...
Kris De Schutter received support from the AspectLab research project, sponsored by the IWT Vlaanderen. ...
doi:10.1109/csmr.2009.9
dblp:conf/csmr/KellensSDJP09
fatcat:u7d2dqlanbetvdzbq54sremjcu
Verifying the design of an outsourced COBOL system with IntensiVE
2010
2010 IEEE International Conference on Software Maintenance
This paper reports on a collaboration between academia and industry, where the research tool IntensiVE has been applied to verify the design rules underlying a large-scale COBOL system. ...
We describe how the IntensiVE tool was customized in order to support verification of the COBOL system, and how this academic tool aided in providing an initial quality assessment of the outsourced software ...
ACKNOWLEDGMENT Andy Kellens is funded by a research mandate provided by the "Institute for the Promotion of Innovation through Science and Technology in Flanders" (IWT Vlaanderen). ...
doi:10.1109/icsm.2010.5609534
dblp:conf/icsm/KellensNDJP10
fatcat:lbvst6vjyrgwzh3waf75upltw4
Using Aspect Orientation in Understanding Legacy COBOL Code
2007
Computer Software and Applications Conference (COMPSAC) Proceedings of the IEEE International
Furthermore, the approach for aspect location and operations in COBOL code is presented. Program slicing technique is adopted to locate aspect code from large COBOL systems. ...
Understanding and maintaining legacy COBOL systems are still a challenging task for both academic research and industry practice. ...
It is necessary to model generalization relationships between objects. Generalization is used to eliminate redundancy from the analysis model. ...
doi:10.1109/compsac.2007.232
dblp:conf/compsac/PuZKXY07
fatcat:24nneqfuz5acdi46aof56lc7gi
Extracting business rules from source code
WPC '96. 4th Workshop on Program Comprehension
It then goes on to present a method for identifying and extracting business rules by means of data output identification and program stripping. ...
This method has been implemented in a reverse engineering tool SOFT-REDOC for COBOL programs. The results are intended to aide the business analyst in comprehending legacy programs. ...
for deriving business rules from COBOL programs by the tool COBOL-REDOC. ...
doi:10.1109/wpc.1996.501138
dblp:conf/iwpc/SneedE96
fatcat:n2dwmhkfpjgdbjh3qq3hh35x3u
Comparing Selected Criteria of Programming Languages Java, PHP, C++, Perl, Haskell, AspectJ, Ruby, COBOL, Bash Scripts and Scheme Revision 1.0 - a Team CPLgroup COMP6411-S10 Term Report
[article]
2010
arXiv
pre-print
In this paper we present a comparative study between ten programming languages: Haskell, Java, Perl, C++, AspectJ, COBOL, Ruby, PHP, Bash Scripts, and Scheme; with respect of the following criteria: Secure ...
Comparison of programming languages is a common topic of discussion among software engineers. ...
There are some commercial tools to use with COBOL in order to design GUI. For instance the COBOL sp2 is a graphical user interface tool for COBOL applications. ...
arXiv:1008.3434v1
fatcat:yc767tog7ze7xf2zboj4lfcaqy
Connecting Legacy Code, Business Rules and Documentation
[chapter]
2008
Lecture Notes in Computer Science
By using several reverse engineering tools and techniques, it is possible to extract business rules from legacy source code that are easy to understand by the non-IT experts. ...
In this paper, we present how we use source code analysis and keyphrase extraction techniques to connect legacy code, business rules and documentation. ...
Acknowledgements We would like to thank to Peter Turney for all his help on keyphrase extraction. ...
doi:10.1007/978-3-540-88808-6_5
fatcat:5mjh7zg6a5dx5drndef6zskxee
The SOAMIG Process Model in Industrial Applications
2011
2011 15th European Conference on Software Maintenance and Reengineering
The SOAMIG Project aims at a general migration process model with an emphasis on transformationbased conversion. ...
The SOAMIG Process Model is divided into several phases and disciplines, which describe and organize general migration activities. ...
Finally, a three-step tool chain was developed and adapted in Tool Initialization and Tool Adaptation including (1) JavaFE [18] for extracting facts from the legacy system, (2) JGralab/GReQL ( [8] , ...
doi:10.1109/csmr.2011.48
dblp:conf/csmr/ZillmannWHTTFHREKUZ11
fatcat:ec7vccs6offlxnouvdr635tgmm
Towards a Computer Assisted Approach for Migrating Legacy Systems to SOA
[chapter]
2012
Lecture Notes in Computer Science
Resulting services have been compared with those that resulted from migrating a real system by following two classic approaches. ...
This paper describes an approach to assist software analysts in the definition of produced services, which bases on the fact that poorly designed service interfaces may be due to bad design and implementation ...
The anti-pattern described in the sixth row is related to badly designed data models. Redundant data models usually arise from limitations or bad use of WSDL generation tools. ...
doi:10.1007/978-3-642-31128-4_36
fatcat:sxcjhetsurhzxbcubyqg3ur47a
« Previous
Showing results 1 — 15 out of 850 results