Abstract
By using several reverse engineering tools and techniques, it is possible to extract business rules from legacy source code that are easy to understand by the non-IT experts. To make this information usable to business analysts, it is necessary to connect the artifacts extracted to existing documents. In this paper, we present how we use source code analysis and keyphrase extraction techniques to connect legacy code, business rules and documentation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Senik, D.: Doyletech Corporation, Associates Inc.: Legacy applications trend report. Technical report, Information and Communications Technology Council (May 2008)
Software AG: Customer survey report: Legacy modernization. Technical report (2007)
Putrycz, E., Kark, A.: Recovering business rules from legacy source code for system modernization. In: Paschke, A., Biletskiy, Y. (eds.) RuleML 2007. LNCS, vol. 4824, pp. 107–118. Springer, Heidelberg (2007)
Bisbal, J., Lawless, D., Wu, B., Grimson, J.: Legacy information systems: issues and directions. Software, IEEE 16(5), 103–111 (1999)
Ricadela, A., Babcock, C.: Taming the beast. InformationWeek (2003)
Witte, R., Li, Q., Zhang, Y., Rilling, J.: Ontological text mining of software documents. In: Kedad, Z., Lammari, N., Métais, E., Meziane, F., Rezgui, Y. (eds.) NLDB 2007. LNCS, vol. 4592, pp. 168–180. Springer, Heidelberg (2007)
Witte, R., Zhang, Y., Rilling, J.: Empowering software maintainers with semantic web technologies. In: Proceedings of the 4th European Semantic Web Conference (2007)
Antoniol, G., Antoniol, G., Canfora, G., Casazza, G., De Lucia, A.: Information retrieval models for recovering traceability links between code and documentation. In: Canfora, G. (ed.) Proc. International Conference on Software Maintenance, pp. 40–49 (2000)
OMG: Semantics of Business Vocabulary and Business Rules (SBVR). dtc/06-08-05
Turney, P.D.: Learning algorithms for keyphrase extraction. Information Retrieval (2), 303–336 (2000)
Turney, P.: Learning to extract keyphrases from text (1999)
Frank, E., Paynter, G.W., Witten, I.H., Gutwin, C., Nevill-manning, C.G.: Domain-specific keyphrase extraction (1999)
Medelyan, O., Medelyan, O., Witten, I.: Thesaurus based automatic keyphrase indexing. In: Witten, I. (ed.) Proc. 6th ACM/IEEE-CS Joint Conference on Digital Libraries JCDL 2006, pp. 296–297 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Putrycz, E., Kark, A.W. (2008). Connecting Legacy Code, Business Rules and Documentation. In: Bassiliades, N., Governatori, G., Paschke, A. (eds) Rule Representation, Interchange and Reasoning on the Web. RuleML 2008. Lecture Notes in Computer Science, vol 5321. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88808-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-88808-6_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88807-9
Online ISBN: 978-3-540-88808-6
eBook Packages: Computer ScienceComputer Science (R0)