Sciweavers

123 search results - page 3 / 25
» Business Rule Extraction from Legacy Code
Sort
View
131
Voted
RE
2005
Springer
15 years 8 months ago
Reverse Engineering Goal Models from Legacy Code
A reverse engineering process aims at reconstructing el abstractions from source code. This paper presents a novel reverse engineering methodology for recovering stakeholder goal ...
Yijun Yu, Yiqiao Wang, John Mylopoulos, Sotirios L...
137
Voted
APSEC
2001
IEEE
15 years 6 months ago
A Framework for Migrating Procedural Code to Object-Oriented Platforms
With the rapid growth of the Internet and pervasive computing activities, the migration of back-end legacy systems to network centric environments has become a focal point for res...
Ying Zou, Kostas Kontogiannis
126
Voted
WECWIS
2005
IEEE
142views ECommerce» more  WECWIS 2005»
15 years 8 months ago
Design and Implementation of a Service-Oriented Business Rules Broker
Business rules define or constrain some business [24]. Many different business rules engines exist to capture and manage the rules that comprise ones business. The lack of standa...
Florian Rosenberg, Schahram Dustdar
122
Voted
ELPUB
2006
ACM
15 years 8 months ago
Automated Building of OAI Compliant Repository from Legacy Collection
In this paper, we report on our experience with the creation of an automated, human-assisted process to extract metadata from documents in a large (>100,000), dynamically growi...
Jianfeng Tang, Kurt Maly, Steven J. Zeil, Mohammad...
126
Voted
ICST
2008
IEEE
15 years 9 months ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...