C4.5: programs for machine learning
C4.5: programs for machine learning
Transforming command-line driven systems to Web applications
Selected papers from the sixth international conference on World Wide Web
Information Retrieval
Software Engineering: A Practitioner's Approach
Software Engineering: A Practitioner's Approach
IEEE Software
Knowledge-Based User Interface Migration
ICSM '94 Proceedings of the International Conference on Software Maintenance
Legacy Interface Migration: A Task-Centered Approach
Proceedings of HCI International (the 8th International Conference on Human-Computer Interaction) on Human-Computer Interaction: Ergonomics and User Interfaces-Volume I - Volume I
From run-time behavior to usage scenarios: an interaction-pattern mining approach
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
MoJo: A Distance Metric for Software Clusterings
WCRE '99 Proceedings of the Sixth Working Conference on Reverse Engineering
Model Based User-Interface Reengineering
WCRE '99 Proceedings of the Sixth Working Conference on Reverse Engineering
An Architectural-Based Approach for Synthesizing and Integrating Adapters for Legacy Software
WCRE '00 Proceedings of the Seventh Working Conference on Reverse Engineering (WCRE'00)
Modeling the System-User Dialog Using Interaction Traces
WCRE '01 Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE'01)
Application and user interface migration from BASIC to Visual C++
ICSM '95 Proceedings of the International Conference on Software Maintenance
A comprehensive conceptual analysis using ER and conceptual graphs
Journal of Experimental & Theoretical Artificial Intelligence - Special issue: conceptual graphs workshop
Improving the Usability of E-Commerce Applications using Business Processes
IEEE Transactions on Software Engineering
Automated reverse engineering of hard-coded GUI layouts
AUIC '08 Proceedings of the ninth conference on Australasian user interface - Volume 76
Developing legacy system migration methods and tools for technology transfer
Software—Practice & Experience
Evaluating legacy system migration technologies through empirical studies
Information and Software Technology
Recovering business processes from business applications
Journal of Software Maintenance and Evolution: Research and Practice
Reverse engineered formal models for GUI testing
FMICS'07 Proceedings of the 12th international conference on Formal methods for industrial critical systems
User driven evolution of user interface models - The FLEPR approach
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part III
Model-driven reverse engineering of legacy graphical user interfaces
Automated Software Engineering
Hi-index | 0.00 |
Legacy systems constitute valuable assets to the organizations that own them, and today, there is an increased demand to make them accessible through the World Wide Web to support e-commerce activities. As a result, the problem of legacy-interface migration is becoming very important. In the context of the CELLEST project, we have developed a new process for migrating legacy user interfaces to web-accessible platforms. Instead of analyzing the application code to extract a model of its structure, the CELLEST process analyzes traces of the system-user interaction to model the behavior of the application's user interface. The produced state-transition model specifies the unique legacy-interface screens (as states) and the possible commands leading from one screen to another (as transitions between the states). The interface screens are identified as clusters of similar-in-appearance snapshots in the recorded trace. Next, the syntax of each transition command is extracted as the pattern shared by all the transition instances found in the trace. This user-interface model is used as the basis for constructing models of the tasks performed by the legacy-application users; these task models are subsequently used to develop new web-accessible interface front ends for executing these tasks. In this paper, we discuss the CELLEST method for reverse engineering a state-transition model of the legacy interface, we illustrate it with examples, we discuss the results of our experimentation with it, and we discuss how this model can be used to support the development of new interface front ends.