loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Wanderley Augusto Radaelli Junior ; Gleison Samuel do Nascimento and Cirano Iochpe

Affiliation: Informatics Institute and Federal University of Rio Grande do Sul, Brazil

ISBN: 978-989-8425-55-3

Keyword(s): Legacy systems modernization, Reverse engineering, Business process, Business rules, Source code manipulation, Execution logs mining.

Related Ontology Subjects/Areas/Topics: Artificial Intelligence ; Biomedical Engineering ; Business Process Management ; Data Engineering ; e-Business ; Engineering Information System ; Enterprise Engineering ; Enterprise Information Systems ; Health Information Systems ; Information Systems Analysis and Specification ; Knowledge Management ; Knowledge Management and Information Sharing ; Knowledge-Based Systems ; Ontologies and the Semantic Web ; Society, e-Business and e-Government ; Software Engineering ; Symbolic Systems ; Tools, Techniques and Methodologies for System Development ; Web Information Systems and Technologies

Abstract: Computer systems implement business processes from different organizations. Among the currently operating computer systems, much of it is classified as legacy system. Typically, legacy systems are complex applications that are still active, due to the high cost of modernization and a high degree of criticality. In recent years, were published several works addressing the importance of legacy systems modernization, emphasizing the extraction of the business process model implemented in these systems. Within this context, a key step is to extract knowledge from source code and / or systems execution logs, aiming to use this information in reverse engineering processes. In this work are presented and analyzed methods based on source code manipulation and system’s execution logs mining, which can be used to extract knowledge from legacy systems, prioritizing business rules identification. A comparison between the two different approaches is presented, as well as their positive and negativ e characteristics. Our results include a list of desired features and a proposal of a method for legacy systems reverse engineering and business rules identification. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 35.175.201.14

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Radaelli Junior, W.; do Nascimento, G. and Iochpe, C. (2011). SURVEY AND PROPOSAL OF A METHOD FOR BUSINESS RULES IDENTIFICATION IN LEGACY SYSTEMS SOURCE CODE AND EXECUTION LOGS.In Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 4: ICEIS, ISBN 978-989-8425-55-3, pages 207-213. DOI: 10.5220/0003483802070213

@conference{iceis11,
author={Wanderley Augusto Radaelli Junior. and Gleison Samuel do Nascimento. and Cirano Iochpe.},
title={SURVEY AND PROPOSAL OF A METHOD FOR BUSINESS RULES IDENTIFICATION IN LEGACY SYSTEMS SOURCE CODE AND EXECUTION LOGS},
booktitle={Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 4: ICEIS,},
year={2011},
pages={207-213},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003483802070213},
isbn={978-989-8425-55-3},
}

TY - CONF

JO - Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 4: ICEIS,
TI - SURVEY AND PROPOSAL OF A METHOD FOR BUSINESS RULES IDENTIFICATION IN LEGACY SYSTEMS SOURCE CODE AND EXECUTION LOGS
SN - 978-989-8425-55-3
AU - Radaelli Junior, W.
AU - do Nascimento, G.
AU - Iochpe, C.
PY - 2011
SP - 207
EP - 213
DO - 10.5220/0003483802070213

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.