Sciweavers

769 search results - page 15 / 154
» Identifying objects in legacy systems
Sort
View
IWPC
1996
IEEE
13 years 11 months ago
Extracting Business Rules from Source Code
This paper reviews the state of the art on application knowledge acquisiton from existing software systems and defines the role of business rules. It then goes on to present a met...
Harry M. Sneed, Katalin Erdös
WCRE
1999
IEEE
13 years 12 months ago
Type-Check Elimination: Two Object-Oriented Reengineering Patterns
In reengineering an object-oriented system we want to benefit from the expertise developed in earlier efforts. It is therefore essential to have a way to communicate expertise at ...
Stéphane Ducasse, Tamar Richner, Robb Nebbe
ACSAC
2001
IEEE
13 years 11 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
OOPSLA
2004
Springer
14 years 1 months ago
A language-independent approach to software maintenance using grammar adapters
A long-standing goal of software engineering is to construct software that is easily modified and extended. Recent advances in software design techniques, such as aspect-oriented ...
Suman Roychoudhury
LREC
2008
126views Education» more  LREC 2008»
13 years 9 months ago
Identifying Strategic Information from Scientific Articles through Sentence Classification
We address here the need to assist users in rapidly accessing the most important or strategic information in the text corpus by identifying sentences carrying specific information...
Fidelia Ibekwe-Sanjuan, Chaomei Chen, Roberto Pinh...