Using Design Recovery Techniques to Transform Legacy Systems
نویسندگان
چکیده
The year 2000 problem posed a difficult problem for many IT shops world wide. The most difficult part of the problem was not the actual changes to ensure compliance, but finding and classifying the data fields that represent dates. This is a problem well suited to design recovery. This paper presents an overview of LS/2000, a system that used design recovery to analyze source code for year 2000 risks and guide a source transformation that was able to automatically remediate over 99% of the year 2000 risks in over three billion lines of production IT source.
منابع مشابه
Identification of Data Cohesive Subsystems Using Data Mining Techniques
The activity of reengineering and maintaining large legacy systems involves the use of design recovery techniques to produce abstractions that facilitate the understanding of the system. In this paper, we present an approach to design recovery based on data mining. This approach derives from the observation that data mining can discover unsuspected non-trivial relationships among elements in la...
متن کاملArchitecture Recovery Based on Design Rule Hierarchy
Software clustering techniques have been extensively studied for the purpose of retrieving a high-level structure of a software system. While prior work has been effective for legacy systems, we observe that a key feature of modern software architectures has not been exploited to improve architecture recovery from code. In this paper, we contribute new architecture recovery techniques based on ...
متن کاملReverse Engineering and Abstaction of Legacy Systems
Extremely large software systems which have been developed and maintained by many diierent people are termed legacy systems. These legacy systems were traditionally developed using methods such as structured analysis and design, or even individual programming techniques and styles. Over time, maintenance has changed the original program structure and speciications. However, usually the speciica...
متن کاملCREAT: Customizable Reverse Engineering Abstraction Technique
Emergent advancements in technology, new business requirements and stakeholder’s needs escort to frequent migration from legacy systems to more powerful, dedicated, secure and reliable computing systems. Different reverse engineering methodologies, techniques and tools are used to extract artifacts from existing legacy systems starting from the implementations and going back to design, architec...
متن کاملArchitectural Design Recovery using Data Mining Techniques
This paper presents a technique for recovering the high level design of legacy software systems according to user defined architectural plans. Architectural plans are represented using a description language and specify system components and their interfaces. Such descriptions are viewed as queries that are applied on a large data base which stores information extracted from the source code of ...
متن کامل