Sciweavers

123 search results - page 7 / 25
» Business Rule Extraction from Legacy Code
Sort
View
SIGSOFT
2007
ACM
14 years 8 months ago
Mining API patterns as partial orders from source code: from usage scenarios to specifications
A software system interacts with third-party libraries through various APIs. Using these library APIs often needs to follow certain usage patterns. Furthermore, ordering rules (sp...
Mithun Acharya, Tao Xie, Jian Pei, Jun Xu
CORR
2010
Springer
161views Education» more  CORR 2010»
13 years 7 months ago
Database Reverse Engineering based on Association Rule Mining
Maintaining a legacy database is a difficult task especially when system documentation is poor written or even missing. Database reverse engineering is an attempt to recover high-...
Nattapon Pannurat, Nittaya Kerdprasop, Kittisak Ke...
DASFAA
2007
IEEE
162views Database» more  DASFAA 2007»
13 years 7 months ago
Framework for Extending RFID Events with Business Rule
Radio frequency identification (RFID) technology is believed to be the next revolutionary step in supply-chain management. Complex process simplification using RFID technology can ...
Mikyeong Moon, Seongjin Kim, Keunhyuk Yeom, Heeseo...
ICSM
1997
IEEE
13 years 12 months ago
MORALE. Mission ORiented Architectural Legacy Evolution
Software evolution is the most costly and time consuming software development activity. Yet software engineering research is predominantly concerned with initial development. MORA...
Gregory D. Abowd, Ashok K. Goel, Dean F. Jerding, ...
SIGMOD
2011
ACM
242views Database» more  SIGMOD 2011»
12 years 10 months ago
The SystemT IDE: an integrated development environment for information extraction rules
Information Extraction (IE) — the problem of extracting structured information from unstructured text — has become the key enabler for many enterprise applications such as sem...
Laura Chiticariu, Vivian Chu, Sajib Dasgupta, Thil...