The program dependence graph and its use in optimization
ACM Transactions on Programming Languages and Systems (TOPLAS)
Migrating legacy systems: gateways, interfaces & the incremental approach
Migrating legacy systems: gateways, interfaces & the incremental approach
IEEE Transactions on Software Engineering - Special issue: best papers of the sixth international workshop on Petri nets and performance models (PNPM'95)
Identifying objects using cluster and concept analysis
Proceedings of the 21st international conference on Software engineering
Extracting Business Rules from Information Systems
BT Technology Journal
CAiSE ;96 Proceedings of the 8th International Conference on Advances Information System Engineering
A Maintenance Support System based on High-Level Control-Flow and Data Dependency
APSEC '95 Proceedings of the Second Asia Pacific Software Engineering Conference
Cliche Recognition in Legacy Software: A Scalable, Knowledge-Based Approach
WCRE '97 Proceedings of the Fourth Working Conference on Reverse Engineering (WCRE '97)
Dimensions of Data ase Reverse Engineering
WCRE '97 Proceedings of the Fourth Working Conference on Reverse Engineering (WCRE '97)
Extracting Business Rules from Source Code
WPC '96 Proceedings of the 4th International Workshop on Program Comprehension (WPC '96)
Business Rule Extraction from Legacy Code
COMPSAC '96 Proceedings of the 20th Conference on Computer Software and Applications
Algorithms for analysing related constraint business rules
Data & Knowledge Engineering
Recovering business processes from business applications
Journal of Software Maintenance and Evolution: Research and Practice
Analysing the impact of adding integrity constraints to information systems
CAiSE'03 Proceedings of the 15th international conference on Advanced information systems engineering
Deriving business rules from the models of existing information systems
Proceedings of the 12th International Conference on Computer Systems and Technologies
Business Rule Management for Enterprise Information Systems
Information Resources Management Journal
Hi-index | 0.00 |
One of the main barriers to the successful migration of legacy systems is lack of information about the system to be migrated.With the complexity of modern information systems, it is rarely the case that an organisation has a complete end-to-endunderstanding of its systems, business processes and information. This is particularly true of the business rules enforced by suchsystems, which are often poorly documented (if at all) and incompletely understood by those who own, use and maintain suchsystems. These business rules must be migrated, along with the other system functionality, but this is difficult when they areburied deep within the source code of the system. In this paper, we propose a method for the discovery of business rules throughinspection of the source code of legacy systems. We also describe the results of a comprehensive evaluation exercise undertakenwithin BT, in which the method was applied to a legacy system about to undergo migration. The results of this study indicatedconsiderable success for the method in extracting valid business rules, but also highlighted some weaknesses. Most significantly,the cost of applying the method is a factor of the size and complexity of the system being analysed, and not of the number ofbusiness rules elicited. In order to address this, we propose a cut-down version of the method that can be used to produce a quickestimate of the likely yield of business rules from a program. Together, these two forms of the method aid personnel engaged insystem migration projects in making maximum use of the scarce resources are available for business rule discovery.