Sciweavers

123 search results - page 3 / 25
» Business Rule Extraction from Legacy Code
Sort
View
RE
2005
Springer
14 years 2 months ago
Reverse Engineering Goal Models from Legacy Code
A reverse engineering process aims at reconstructing el abstractions from source code. This paper presents a novel reverse engineering methodology for recovering stakeholder goal ...
Yijun Yu, Yiqiao Wang, John Mylopoulos, Sotirios L...
APSEC
2001
IEEE
14 years 13 days ago
A Framework for Migrating Procedural Code to Object-Oriented Platforms
With the rapid growth of the Internet and pervasive computing activities, the migration of back-end legacy systems to network centric environments has become a focal point for res...
Ying Zou, Kostas Kontogiannis
WECWIS
2005
IEEE
142views ECommerce» more  WECWIS 2005»
14 years 2 months ago
Design and Implementation of a Service-Oriented Business Rules Broker
Business rules define or constrain some business [24]. Many different business rules engines exist to capture and manage the rules that comprise ones business. The lack of standa...
Florian Rosenberg, Schahram Dustdar
ELPUB
2006
ACM
14 years 2 months ago
Automated Building of OAI Compliant Repository from Legacy Collection
In this paper, we report on our experience with the creation of an automated, human-assisted process to extract metadata from documents in a large (>100,000), dynamically growi...
Jianfeng Tang, Kurt Maly, Steven J. Zeil, Mohammad...
ICST
2008
IEEE
14 years 3 months ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...