Filters








850 Hits in 6.7 sec

Extracting business rules from COBOL: A model-based tool

Valerio Cosentino, Jordi Cabot, Patrick Albert, Philippe Bauquel, Jacques Perronnet
2013 2013 20th Working Conference on Reverse Engineering (WCRE)  
This paper presents a Business Rule Extraction tool for COBOL systems.  ...  Starting from a COBOL program, we derive a model-based representation of the source code and we provide a set of model transformations to identify and visualize the embedded business rules.  ...  In order to facilitate the comprehension and the evolution of COBOL-based systems, we present a Business Rule Extraction (BREX) tool 1 , that aims at extracting the (business) logic hardcoded in a system  ... 
doi:10.1109/wcre.2013.6671329 dblp:conf/wcre/CosentinoCABP13a fatcat:bk3r4f47wfh6bmky4tebpaberi

Extracting business rules from COBOL: A model-based framework

Valerio Cosentino, Jordi Cabot, Patrick Albert, Philippe Bauquel, Jacques Perronnet
2013 2013 20th Working Conference on Reverse Engineering (WCRE)  
In this sense, the goal of this paper is to facilitate the comprehension of legacy systems (in particular COBOL-based ones) by providing a model driven reverse engineering framework able to extract and  ...  In those systems, it is not even clear which business rules are enforced nor whether rules are still consistent with the current organizational policies.  ...  In [15] and [16] , the authors propose a framework that extracts business rules from COBOL legacy code.  ... 
doi:10.1109/wcre.2013.6671316 dblp:conf/wcre/CosentinoCABP13 fatcat:2mny4mj5pvdlrml2ll346qdtmq

Extracting Business Rule from existing COBOL programs for Redevelopment

Emmanuel Nwabueze Ekwonwune, Egwuonwu Deborah I
2019 International Journal Of Engineering And Computer Science  
The paper describes an industrial business study carried out to regain the business knowledge embedded in a legacy COBOL application.  ...  The aim of this work was to extract out the information required to re- implement the Legacy programs in a new client/server environment. The progress solution is in four step.  ...  Taking a COBOL example that is well known : To extract a business rule we identify the candidate variables, and then use program slicing to extract the code segment.  ... 
doi:10.18535/ijecs/v8i05.4317 fatcat:nl7tz343zjfzxgxz7cuc52ncti

Getting Objects Methods and Interactions by Extracting Business Rules from Legacy Systems

Omar El Beggar, Brahim Bousetta, Taoufiq Gadi
2014 Journal of Systems Integration  
This paper aims to present an approach for knowledge acquisition from existing legacy systems by extracting business rules from source code.  ...  In fact, the business rules are extracted and assigned next to the domain entities in order to generate objects methods and interactions in an object-oriented platform.  ...  .,1996) is a reverse engineering tool for COBOL program which extracts business rules embedded in code by manually input of the criteria elements.  ... 
doi:10.20470/jsi.v5i3.204 fatcat:pg4xbbxpyrcqjow2jcz4fzzrke

From Knowledge Discovery to Implementation: A Business Intelligence Approach Using Neural Network Rule Extraction and Decision Tables [chapter]

Christophe Mues, Bart Baesens, Rudy Setiono, Jan Vanthienen
2005 Lecture Notes in Computer Science  
In this paper, we propose a framework for the development of business intelligence (BI) systems which centers on the use of neural network rule extraction and decision tables.  ...  Two different types of neural network rule extraction algorithms, viz. Neurolinear and Neurorule, are compared, and subsequent implementation strategies based on decision tables are discussed.  ...  A straightforward transformation of a DT into a decision tree, and from there to Pascal, C, COBOL, Java, Eiffel or Visual Basic program code, is provided.  ... 
doi:10.1007/11590019_55 fatcat:lh5kmkvhpvhs5d4bfv7i4lykiy

Restructuring of COBOL/CICS legacy systems

Alex Sellink, Harry Sneed, Chris Verhoef
2002 Science of Computer Programming  
In this paper we approach the problems from a technical viewpoint and we report on the methods and tools that are necessary to bring structure in transaction systems.  ...  We provide a strategy to restructure transaction processing systems. Such systems are core assets of most modern business operations, so their enhancement is crucial.  ...  research described in this paper is intended to solve the problem of restructuring CICS programs in order to make them more maintainable and to facilitate the migration into di erent environments such as to a  ... 
doi:10.1016/s0167-6423(02)00061-8 fatcat:gvks22y6qngwpdviugacbxarba

An empirical study into COBOL type inferencing

Arie van Deursen, Leon Moonen
2001 Science of Computer Programming  
In a typical COBOL program, the data division consists of 50% of the lines of code.  ...  The main results include a tool set to carry out type inference experiments, a suite of metrics characterizing type inference outcomes, and the experimental observation that only one instance of pollution  ...  When do two different variables hold values that represent the same business entity? Can a given variable ever receive a value from some other given variable?  ... 
doi:10.1016/s0167-6423(01)00015-6 fatcat:mx2gtrcyoremdpunezsu3uefpm

Cognac: A Framework for Documenting and Verifying the Design of Cobol Systems

Andy Kellens, Kris De Schutter, Theo D'Hondt, Luc Jorissen, Bart Van Passel
2009 2009 13th European Conference on Software Maintenance and Reengineering  
Next to discussing the architecture of Cognac, we present a validation of our tool on an industrial, large-scale Cobol system.  ...  In this paper we present Cognac, an extension of the IntensiVE tool that allows for documenting and verifying design rules in Cobol systems.  ...  Kris De Schutter received support from the AspectLab research project, sponsored by the IWT Vlaanderen.  ... 
doi:10.1109/csmr.2009.9 dblp:conf/csmr/KellensSDJP09 fatcat:u7d2dqlanbetvdzbq54sremjcu

Verifying the design of an outsourced COBOL system with IntensiVE

Andy Kellens, Carlos Noguera, Theo D'Hondt, Luc Jorissen, Bart Van Passel
2010 2010 IEEE International Conference on Software Maintenance  
This paper reports on a collaboration between academia and industry, where the research tool IntensiVE has been applied to verify the design rules underlying a large-scale COBOL system.  ...  We describe how the IntensiVE tool was customized in order to support verification of the COBOL system, and how this academic tool aided in providing an initial quality assessment of the outsourced software  ...  ACKNOWLEDGMENT Andy Kellens is funded by a research mandate provided by the "Institute for the Promotion of Innovation through Science and Technology in Flanders" (IWT Vlaanderen).  ... 
doi:10.1109/icsm.2010.5609534 dblp:conf/icsm/KellensNDJP10 fatcat:lbvst6vjyrgwzh3waf75upltw4

Using Aspect Orientation in Understanding Legacy COBOL Code

Jianjun Pu, Zhuopeng Zhang, Jian Kang, Yang Xu, Hongji Yang
2007 Computer Software and Applications Conference (COMPSAC) Proceedings of the IEEE International  
Furthermore, the approach for aspect location and operations in COBOL code is presented. Program slicing technique is adopted to locate aspect code from large COBOL systems.  ...  Understanding and maintaining legacy COBOL systems are still a challenging task for both academic research and industry practice.  ...  It is necessary to model generalization relationships between objects. Generalization is used to eliminate redundancy from the analysis model.  ... 
doi:10.1109/compsac.2007.232 dblp:conf/compsac/PuZKXY07 fatcat:24nneqfuz5acdi46aof56lc7gi

Extracting business rules from source code

H.M. Sneed, K. Erdos
WPC '96. 4th Workshop on Program Comprehension  
It then goes on to present a method for identifying and extracting business rules by means of data output identification and program stripping.  ...  This method has been implemented in a reverse engineering tool SOFT-REDOC for COBOL programs. The results are intended to aide the business analyst in comprehending legacy programs.  ...  for deriving business rules from COBOL programs by the tool COBOL-REDOC.  ... 
doi:10.1109/wpc.1996.501138 dblp:conf/iwpc/SneedE96 fatcat:n2dwmhkfpjgdbjh3qq3hh35x3u

Comparing Selected Criteria of Programming Languages Java, PHP, C++, Perl, Haskell, AspectJ, Ruby, COBOL, Bash Scripts and Scheme Revision 1.0 - a Team CPLgroup COMP6411-S10 Term Report [article]

Sultan S. Al-Qahtani, Pawel Pietrzynski, Luis F. Guzman, Rafik Arif, Adrien Tevoedjre
2010 arXiv   pre-print
In this paper we present a comparative study between ten programming languages: Haskell, Java, Perl, C++, AspectJ, COBOL, Ruby, PHP, Bash Scripts, and Scheme; with respect of the following criteria: Secure  ...  Comparison of programming languages is a common topic of discussion among software engineers.  ...  There are some commercial tools to use with COBOL in order to design GUI. For instance the COBOL sp2 is a graphical user interface tool for COBOL applications.  ... 
arXiv:1008.3434v1 fatcat:yc767tog7ze7xf2zboj4lfcaqy

Connecting Legacy Code, Business Rules and Documentation [chapter]

Erik Putrycz, Anatol W. Kark
2008 Lecture Notes in Computer Science  
By using several reverse engineering tools and techniques, it is possible to extract business rules from legacy source code that are easy to understand by the non-IT experts.  ...  In this paper, we present how we use source code analysis and keyphrase extraction techniques to connect legacy code, business rules and documentation.  ...  Acknowledgements We would like to thank to Peter Turney for all his help on keyphrase extraction.  ... 
doi:10.1007/978-3-540-88808-6_5 fatcat:5mjh7zg6a5dx5drndef6zskxee

The SOAMIG Process Model in Industrial Applications

C. Zillmann, A. Winter, A. Herget, W. Teppe, M. Theurer, A. Fuhr, T. Horn, V. Riediger, U. Erdmenger, U. Kaiser, D. Uhlig, Y. Zimmermann
2011 2011 15th European Conference on Software Maintenance and Reengineering  
The SOAMIG Project aims at a general migration process model with an emphasis on transformationbased conversion.  ...  The SOAMIG Process Model is divided into several phases and disciplines, which describe and organize general migration activities.  ...  Finally, a three-step tool chain was developed and adapted in Tool Initialization and Tool Adaptation including (1) JavaFE [18] for extracting facts from the legacy system, (2) JGralab/GReQL ( [8] ,  ... 
doi:10.1109/csmr.2011.48 dblp:conf/csmr/ZillmannWHTTFHREKUZ11 fatcat:ec7vccs6offlxnouvdr635tgmm

Towards a Computer Assisted Approach for Migrating Legacy Systems to SOA [chapter]

Gonzalo Salvatierra, Cristian Mateos, Marco Crasso, Alejandro Zunino
2012 Lecture Notes in Computer Science  
Resulting services have been compared with those that resulted from migrating a real system by following two classic approaches.  ...  This paper describes an approach to assist software analysts in the definition of produced services, which bases on the fact that poorly designed service interfaces may be due to bad design and implementation  ...  The anti-pattern described in the sixth row is related to badly designed data models. Redundant data models usually arise from limitations or bad use of WSDL generation tools.  ... 
doi:10.1007/978-3-642-31128-4_36 fatcat:sxcjhetsurhzxbcubyqg3ur47a
« Previous Showing results 1 — 15 out of 850 results