Interprocedural slicing using dependence graphs
ACM Transactions on Programming Languages and Systems (TOPLAS)
Using an enabling technology to reengineer legacy systems
Communications of the ACM
Reverse Engineering and Design Recovery: A Taxonomy
IEEE Software
A Query Algebra for Program Databases
IEEE Transactions on Software Engineering
Tools to Enable Interoperation of Heterogeneous Databases
ICDE '97 Proceedings of the Thirteenth International Conference on Data Engineering
Establishing a Knowledge Base to Assist Integration of Heterogeneous Databases
BNCOD 16 Proceedings of the 16th British National Conferenc on Databases: Advances in Databases
A Repository System for Business Rules
DS-6 Proceedings of the Sixth IFIP TC-2 Working Conference on Data Semantics: Database Applications Semantics
Program Understanding in Databases Reverse Engineering
DEXA '98 Proceedings of the 9th International Conference on Database and Expert Systems Applications
Structure Elicitation in Database Reverse Engineering
WCRE '96 Proceedings of the 3rd Working Conference on Reverse Engineering (WCRE '96)
Cliche Recognition in Legacy Software: A Scalable, Knowledge-Based Approach
WCRE '97 Proceedings of the Fourth Working Conference on Reverse Engineering (WCRE '97)
Dimensions of Data ase Reverse Engineering
WCRE '97 Proceedings of the Fourth Working Conference on Reverse Engineering (WCRE '97)
DARE: Domain-Augmented ReEngineering
WCRE '97 Proceedings of the Fourth Working Conference on Reverse Engineering (WCRE '97)
Recovering software requirements from system-user interaction traces
SEKE '02 Proceedings of the 14th international conference on Software engineering and knowledge engineering
A method for the manual extraction of business rules from legacy source code
BT Technology Journal
In Cyber Space No One can Hear You Scream
VLDB '99 Proceedings of the 25th International Conference on Very Large Data Bases
Querying Data-Intensive Programs for Data Design
CAiSE '01 Proceedings of the 13th International Conference on Advanced Information Systems Engineering
Algorithms for analysing related constraint business rules
Data & Knowledge Engineering
Recovering business processes from business applications
Journal of Software Maintenance and Evolution: Research and Practice
Analysing the impact of adding integrity constraints to information systems
CAiSE'03 Proceedings of the 15th international conference on Advanced information systems engineering
Journal of Theoretical and Applied Electronic Commerce Research
Modeling Spatial and Temporal Set-Based Constraints During Conceptual Database Design
Information Systems Research
Hi-index | 0.00 |
Business rules are an important asset of an organisation. Many organisations have substantial investment in business rules encoded in legacy information systems. This paper reports on the type of business rules that may be found in an organisation's information systems, and the techniques that may be used to recover business rules from such systems. Also outlined is a new approach which may be used to unlock business rules from legacy information systems.