Application instantiation based upon attributes and values stored in a meta data repository, including tiering of application layers, objects, and components

C Stauber, J Ambrose, TM Rothwein - US Patent 7,630,953, 2009 - Google Patents
Our invention relates to instantiation of Software applica tions running on a computer. More
particularly, our invention relates to instantiation of these applications, especially multi tiered …

Iterative reengineering of legacy systems

A Bianchi, D Caivano, V Marengo… - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
During its life, a legacy system is subjected to many maintenance activities, which cause
degradation of the quality of the system: When this degradation exceeds a critical threshold …

[PDF][PDF] Integration of Shadow IT Systems with Enterprise Systems-A Literature Review

M Huber, S Zimmermann, C Rentrop, C Felden - 2017 - scholar.archive.org
Organizations deploy a plethora of information technology (IT) systems. Various types of
enterprise systems (ES) may coexist with the shadow IT systems (SITS) implemented by …

Competitive agility and the challenge of legacy information systems

SB Reddy, R Reddy - Industrial Management & Data Systems, 2002 - emerald.com
Using a case study in the temporary services industry, this paper illustrates the common
concerns of large multinational corporations with their legacy information systems. The …

System and method for translating to and from hierarchical information systems

WN Milleker, DM Joshi, J Phillips… - US Patent …, 2006 - Google Patents
Two Appendixes are included in this application that contain material which is Subject to
copyright protection. The copyright owner has no objection to the facsimile reproduction by …

A use-case driven method of architecture recovery for program understanding and reuse reengineering

D Bojic, D Velasevic - … of the Fourth European Conference on …, 2000 - ieeexplore.ieee.org
This work focuses on architectural recovery for program understanding and reuse
reengineering of legacy object-oriented systems. The proposed method is based on …

Evaluating and adopting application integration: The case of a multinational petroleum company

M Themistocleous, Z Irani - Proceedings of the 35th Annual …, 2002 - ieeexplore.ieee.org
Many organisations use a diversity of information systems such as custom applications, e-
business solutions and enterprise resource planning (ERP) to support their organisational …

Clustering and tailoring user session data for testing web applications

X Luo, F Ping, MH Chen - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
Web applications have become major driving forces for world business. Effective and
efficient testing of evolving Web applications is essential for providing reliable services. In …

A systematic analysis of reuse strategies for design of electronic circuits

M Koegst, P Conradi, D Garte… - … Design, Automation and …, 1998 - ieeexplore.ieee.org
In this paper a number of reuse approaches for circuit design are analysed. Based on this
analysis, an algebraic core model for discussion of a general reuse strategy is proposed …

Reverse engineering of use case realizations in UML

D Bojic, D Velasevic - ACM SIGSOFT Software Engineering Notes, 2001 - dl.acm.org
We propose a novel technique for recovering certain elements of the UML model of a
software system. These include relationships between use cases as well as class roles in …