A method for the manual extraction of business rules from legacy source code
暂无分享,去创建一个
[1] C. J. Pound,et al. Extracting Business Rules from Information Systems , 1999 .
[2] Wei-Tek Tsai,et al. Business rule extraction from legacy code , 1996, Proceedings of 20th International Computer Software and Applications Conference: COMPSAC '96.
[3] Harry M. Sneed,et al. Extracting business rules from source code , 1996, WPC '96. 4th Workshop on Program Comprehension.
[4] Anna Rita Fasolino,et al. Recovering the architectural design for software comprehension , 1994, Proceedings 1994 IEEE 3rd Workshop on Program Comprehension- WPC '94.
[5] Joe D. Warren,et al. The program dependence graph and its use in optimization , 1987, TOPL.
[6] Michael Stonebraker,et al. Migrating Legacy Systems: Gateways, Interfaces, and the Incremental Approach , 1995 .
[7] Mark Weiser,et al. Program Slicing , 1981, IEEE Transactions on Software Engineering.
[8] Arie van Deursen,et al. Identifying objects using cluster and concept analysis , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[9] Gordon I. McCalla,et al. Cliche recognition in legacy software: a scalable, knowledge-based approach , 1997, Proceedings of the Fourth Working Conference on Reverse Engineering.
[10] Kathryn A. Ingle,et al. Reverse Engineering , 1996, Springer US.
[11] Martin P. Ward. Derivation of Data Intensive Algorithms by Formal Transformation: The Schnorr-Waite Graph Marking Algorithm , 1996, IEEE Trans. Software Eng..
[12] Akihiko Matsuo,et al. A maintenance support system based on high-level control-flow and data dependency , 1995, Proceedings 1995 Asia Pacific Software Engineering Conference.
[13] Michael R. Blaha. Dimensions of database reverse engineering , 1997, Proceedings of the Fourth Working Conference on Reverse Engineering.
[14] Michael R. Blaha. Dimensions of Data ase Reverse Engineering , 1997 .