Sciweavers

433 search results - page 32 / 87
» Web-Enabling Legacy Applications
Sort
View
HICSS
2002
IEEE
136views Biometrics» more  HICSS 2002»
14 years 2 months ago
Using XML to Facilitate Information Management across Multiple Local Government Agencies
The main barriers to the level of electronic data interchange required to seamlessly integrate services offered by legacy systems in an Internet environment are the need for appli...
G. M. Bryan, Joanne M. Curry, Carolyn McGregor, D....
COLCOM
2005
IEEE
14 years 3 months ago
The Nizza secure-system architecture
The trusted computing bases (TCBs) of applications running on today’s commodity operating systems have become extremely large. This paper presents an architecture that allows to...
Hermann Härtig, Michael Hohmuth, Norman Feske...
NOMS
2000
IEEE
14 years 2 months ago
Using CORBA and Java for PBX management
Telephone Switches are characteristically long-lived, evolving systems. We describe how a legacy two-tier system for telephone switch management was reengineered as a three-tier w...
P. Hasselmeyer, M. Andrew
IWPC
1996
IEEE
14 years 2 months ago
Extracting Business Rules from Source Code
This paper reviews the state of the art on application knowledge acquisiton from existing software systems and defines the role of business rules. It then goes on to present a met...
Harry M. Sneed, Katalin Erdös
CAISE
2004
Springer
14 years 3 months ago
Modeling and Realizing Interoperability
Interoperability between enterprise applications requires an understanding of the obstacles to interoperability in order to provide methods for overcoming these obstacles. We addre...
Manfred A. Jeusfeld, Willem-Jan van den Heuvel, Je...