ANTLR: a predicated-LL(k) parser generator
Software—Practice & Experience
Formal methods for legacy systems
Journal of Software Maintenance: Research and Practice
Fast discovery of association rules
Advances in knowledge discovery and data mining
Modeling Processes and Workflows by Business Rules
Business Process Management, Models, Techniques, and Empirical Studies
Extracting Business Rules from Source Code
WPC '96 Proceedings of the 4th International Workshop on Program Comprehension (WPC '96)
Business Rules Extraction from Large Legacy Systems
CSMR '04 Proceedings of the Eighth Euromicro Working Conference on Software Maintenance and Reengineering (CSMR'04)
Hybrid web service composition: business processes meet business rules
Proceedings of the 2nd international conference on Service oriented computing
Composition of executable business process models by combining business rules and process flows
Expert Systems with Applications: An International Journal
An Incremental Process Mining Approach to Extract Knowledge from Legacy Systems
EDOC '10 Proceedings of the 2010 14th IEEE International Enterprise Distributed Object Computing Conference
SOA in the real world – experiences
ICSOC'05 Proceedings of the Third international conference on Service-Oriented Computing
Introducing business process into legacy information systems
BPM'05 Proceedings of the 3rd international conference on Business Process Management
Hi-index | 0.00 |
Legacy systems include information and procedures which are fundamental to the organization. However, to maintain a legacy system is a complex and expensive task. Currently, researches propose the legacy systems reengineering using BPM and SOA. The benefits of the reengineering using BPM and SOA are software reuse and documentation of the business processes. However, practical experiences demonstrate that reengineering using BPM and SOA are not easy to apply, because there are no tools that help the developers understand the legacy system behavior. This paper presents a tool to extract the legacy system behavior. Based on the business rules concept, we propose a tool to identify the business rules contained legacy source code. In addition, our technique also enables the discovery of the partial order execution of the business rules during the runtime legacy system.