Model-Driven Approaches for Reverse Engineering - A Systematic Literature Review

HA Siala, K Lano, H Alfraihi - IEEE Access, 2024 - ieeexplore.ieee.org
Many organizations depend on software systems to accomplish their daily tasks, but these
systems need to be maintained and evolved to cope with various changes and …

Integration of static and dynamic code analysis for understanding legacy source code

W Kirchmayr, M Moser, L Nocke… - … and evolution (ICSME …, 2016 - ieeexplore.ieee.org
In software development we are faced with the problem to comprehend and take over
source code from other developers. The key challenge is to understand the underlying …

Extracting business rules from COBOL: A model-based framework

V Cosentino, J Cabot, P Albert… - 2013 20th Working …, 2013 - ieeexplore.ieee.org
Organizations rely on the logic embedded in their Information Systems for their daily
operations. This logic implements the business rules in place in the organization, which …

System and method for extracting a business rule embedded in an application source code

T Mehalingam, S Ramasamy, NKS Krishnan… - US Patent …, 2018 - Google Patents
Disclosed is a method and system for extracting a business rule embedded in an application
source code. The method comprises creating a call structure of one or more programs …

Mainframe migration based on screen scraping

S Flores-Ruiz, R Perez-Castillo… - … and Evolution (ICSME …, 2018 - ieeexplore.ieee.org
Companies possess a history and large array of legacy information systems that consume a
great part of their IT budget in operations and maintenance. These systems are mission …

A method for business logic extraction from legacy COBOL code of industrial systems

AA Guba, AV Kolchin, SV Potiyenko - PROBLEMS IN …, 2016 - pp.isofts.kiev.ua
The purpose of this work is to develop a software tool for analysis automation and
simplifying of understanding of software systems behavior. Methods for translation …

Fault-Tolerant Network-Server Architecture for Time-Critical Web Applications

K Akpinar, F Jafariakinabad, KA Hua… - 2017 IEEE 15th Intl …, 2017 - ieeexplore.ieee.org
Parallel to recent evolution in web content, technologies such as WebSockets and WebRTC
allow development of real-time web applications-something that has not been possible in …

DroidSentry: Efficient code integrity and control flow verification on TrustZone devices

DA Suciu, R Sion - … on Control Systems and Computer Science …, 2017 - ieeexplore.ieee.org
The fast evolution of mobile devices has made them the center of attention for not only the
research industry, but also malicious actors, as smartphones are used to store, transmit and …

Метод извлечения логики поведения из промышленного программного кода на языке Кобол

АА Губа, АВ Колчин… - Проблеми …, 2016 - dspace.nbuv.gov.ua
Цель работы–разработка комплекса инструментальных средств для автоматизации
анализа и упрощения понимания поведения кода программных систем. Предложены …