Recovering Legacy Requirements

نویسندگان

  • Paul Rayson
  • Roger Garside
  • Pete Sawyer
چکیده

It is common for organisations to introduce substantial changes to their structure and operations in order to adapt to new business environments. This often confers legacy status on their software systems because they can’t adequately support the new business processes. In this paper, we argue that it is necessary to recover the requirements of in-service legacy software to ensure that its evolution or replacement is properly informed by an understanding of what is redundant, what must be retained and what can be reused. Much of this information is often contained in documents. However, retrieval of the information is often difficult due to problems of completeness, quality and sheer volume. In the REVERE project we are integrating a number of techniques to provide a set of tools to help requirements engineers explore the documentation and reconstruct conceptual models of the software and business processes. At the core of this work is the exploitation of probabilistic NLP tools to provide a ‘quick way in’ to large, complex and imperfectly structured documents, saving much painstaking and error-prone manual effort.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Requirements Reengineering from Legacy Information Systems Using Semiotic Techniques

Recovering users and systems requirements from existing information systems can be valuable in legacy systems reengineering. AMBOLS, a semiotic approach to requirements reengineering, considers recovering the requirements of an existing (legacy) system under the restriction that only the operational system and its current stakeholders are accessible, while the original system documentation may ...

متن کامل

Software Fault Isolation: a first step towards Microreboot in legacy C applications

Microreboot is an attractive technique for recovering an application after a non-malicious failure or deliberate integrity breach even in cases where the precise cause of the failure or breach are not known. Unfortunately, Microreboot functionality has so far been demonstrated only with Java applications meeting a set of peculiar Crash-only architectural requirements. This report describes a me...

متن کامل

A family of case studies on business process mining using MARBLE

Business processes, most of which are automated by information systems, have become a key asset in organizations. Unfortunately, uncontrolled maintenance implies that information systems age overtime until they need to be modernized. During software modernization, ageing systems cannot be entirely discarded because they gradually embed meaningful business knowledge, which is not present in any ...

متن کامل

Recovering Class Diagrams from Data-Intensive Legacy Systems

Several reverse engineering methods for recovering objects from legacy systems have been proposed in the literature, but most of them neglect to identify the relationships among the objects, or recover only a part of them. This paper describes a method for recovering an O-O model together with the objects and relationships among them. The proposed approach integrates the results of reverse engi...

متن کامل

Recovering Artifacts from Legacy Systems Using Pattern Matching

Modernizing legacy applications is the key issue facing IT managers today because there's enormous pressure on organizations to change the way they run their business to meet the new requirements. The importance of software maintenance and reengineering is forever increasing. Understanding the architecture of existing legacy applications is the most critical issue for maintenance and reengineer...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999