Reengineering and Wrapping Legacy Modules for Reuse as Web Services

2012 ◽  
pp. 71-101 ◽  
Author(s):  
Harry M. Sneed

This chapter deals with how this reengineering can be done. The goal is to make modular, flexible, and independent Web services from the monolithic, rigid, and dependent legacy modules. The methods used to achieve this goal are static analysis, code restructuring, code stripping, code transformation, and code wrapping. The legacy code can be either left in a procedural form in the original language or translated to an object-oriented architecture in the Java language. The result is in both cases an independent, wrapped service with a standard WSDL interface and a separate database access shell. All of the steps of the migration process are supported by automated tools. The wrapped services are available to all applications capable of sending and receiving SOAP messages. The automated process described here has been successfully applied in three industrial migration projects. The experience gained in those projects is discussed at the end of the chapter.

Replication [7] must work. In fact, few cyberneticists would disagree with the signifi-cant unification of the lookaside buffer and I/O automata, which embodies the practi-cal principles of Bayesian complexity theory. In order to solve this question, we describe a novel methodology for the deployment of object-oriented languages (YAMP), discon-firming that the World Wide Web and robots can collude to realize this intent.


2014 ◽  
Vol 556-562 ◽  
pp. 5267-5270
Author(s):  
Tai Fa Zhang ◽  
Ya Jiang Zhang ◽  
Jun Yao

Nowadays, object-oriented design is the trend of software design patterns, and the database connection pool is one of the important research topics. The paper firstly describes the basic principle of connection pool under traditional, tomcat and hibernate modes. Based on that, a new connection pool method is proposed, and these four methods are experimentally simulated in java language at last. The comparative analysis has verified that the presented connection pool owns the optimum access time and it can greatly improve the access efficiency of database.


Author(s):  
Dumitru Roman ◽  
Ioan Toma ◽  
Dieter Fensel

Service-oriented computing (SOC) is the new emerging paradigm for distributed computing, especially in the area of e-business and e-work processing, that has evolved from object-oriented and component-based computing to enable the building of scalable and agile networks of collaborating business applications distributed within and across organizational boundaries; services will count for customers and not the specific software or hardware component that is used to implement the services. In this context, services become the next level of abstraction in the process of creating systems that would enable automation of e-businesses and e-works.


Author(s):  
GERARDO CANFORA ◽  
ANDREA DE LUCIA ◽  
GIUSEPPE A. DI LUCCA

We present a strategy for incrementally migrating legacy systems to object-oriented platforms. The migration process consists of six sequential phases and encompasses reverse engineering and reengineering activities. The aim of reverse engineering is to decompose programs into components implementing the user interface and components implementing application domain objects. The identification of objects is centred around persistent data stores and exploits object-oriented design metrics. Wrapping is the core of the reengineering activities. It makes new systems able to exploit existing resources, thus allowing an incremental and selective replacement of the identified objects. The migration strategy has been defined and experimented within the project ERCOLE (Encapsulation, Reengineering and Coexistence of Object with Legacy) on legacy systems developed in RPG for the IBM AS/400 environment.


2013 ◽  
Vol 411-414 ◽  
pp. 572-575
Author(s):  
Gang Ding ◽  
Hong Min Nie ◽  
Ying Zhe Liu

Nowadays, a variety of database systems coexist and the application softwares access and operation for database is often custom-written, which can lead to more complicated cross-database access. Through analysis of the operational process of the database middleware, adding the generic database query middleware eQueryMW which can shield the difference of the data source to the traditional three-tier architecture as the middleware level can realize the access of relational heterogeneity database, providing a unified database query interface and cross-database integration method for the users.


2012 ◽  
Vol 271-272 ◽  
pp. 674-678
Author(s):  
Yong Yong Sun ◽  
Guang Qiu Huang

Software protection technology is necessary for software security and property right of software. The algorithm of code obfuscation based on class is proposed that uses of obfuscation technology. The overall architecture of the system is hidden by changing the class diagram for class aggregation, and the algorithm of class aggregation can be used to design class hierarchy in object-oriented program. It makes static analysis difficult while preserving function of program. The interfaces replace original classes to achieve reference in order to implement type hidden, and automatic analysis becomes more difficult.


2014 ◽  
Vol 608-609 ◽  
pp. 23-30
Author(s):  
Qing Kai Jin ◽  
Jun Yi Li ◽  
Yan Zhang

For the redundant codes caused by software reuse and rapid development in object-oriented program, the paper proposes a cutting model and designs a cutting scheme based on this model. Firstly, a cutting model is established. Then, static analysis is made for object-oriented codes and the cutting information base of objects to be clipped is established. Lastly, the cutting information base and cutting model is matched to cut the program. A test on a practical java project indicates that the cutting scheme can make the volume of the project reduce by about 21%.


2012 ◽  
Vol 271-272 ◽  
pp. 636-640
Author(s):  
Yong Yong Sun ◽  
Guang Qiu Huang

The security of software is threatened by piracy, tampering and reverse engineering. Attackers attempt to get important algorithms and sensitive data of software by static analysis or reverse engineering. Software protection becomes an important problem. The algorithm of code obfuscation based on class splitting is proposed that uses of obfuscation technology. The definition of class splitting and realization on algorithm are described. At the same time, the performance on algorithm is analyzed. The obfuscation method enhances the degree of complication about program and static analysis becomes more difficult. The algorithm is applicable to object-oriented program with class structure.


2005 ◽  
Vol 12 (32) ◽  
Author(s):  
Anders Møller ◽  
Mads Østerby Olesen ◽  
Michael I. Schwartzbach

XSL Transformations (XSLT) is a programming language for defining transformations between XML languages. The structure of these languages is formally described by schemas, for example using DTD, which allows individual documents to be validated. However, existing XSLT tools offer no static guarantees that, under the assumption that the input is valid relative to the input schema, the output of the transformation is valid relative to the output schema.<br /> <br />We present a validation technique for XSLT based on the summary graph formalism introduced in the static analysis of JWIG Web services. Being able to provide static guarantees, we can detect a large class of errors in an XSLT stylesheet at the time it is written instead of later when it has been deployed, and thereby provide benefits similar to those of static type checkers for modern programming languages.<br /> <br />Our analysis takes a pragmatic approach that focuses its precision on the essential language features but still handles the entire XSLT 1.0 language. We evaluate the analysis precision on a range of real stylesheets and demonstrate how it may be useful in practice.


2016 ◽  
pp. 662-683
Author(s):  
Evelina Pencheva

Provisioning of applications and value-added services for mobile (remote) monitoring and access to measurements data is supported by advanced communication models such as Internet of Things (IoT). IoT provides ubiquitous connectivity anytime and with anything. IoT applications are able to communicate with the environment, to receive information about its status, to exchange and use the information. Identification of generic functions for monitoring management, data acquisition, and access to information provides capabilities to define abstraction of transport technology and control protocols. This chapter presents an approach to design Web Services Application Programming Interfaces (API) for mobile monitoring and database access. Aspects of the Web Services implementation are discussed. A traffic model of Web Services application server is described formally. The Web Services application server handles traffic of different priorities generated by third party applications and by processes at the database server's side. The traffic model takes into account the distributed structure of the Web Services application server and applies mechanisms for adaptive admission control and load balancing to prevent overload. The utilization of Web Services application server is evaluated through simulation.


Sign in / Sign up

Export Citation Format

Share Document