scholarly journals XIS-Reverse: A Model-driven Reverse Engineering Approach for Legacy Information Systems

Author(s):  
André Reis ◽  
Alberto Rodrigues da Silva
2021 ◽  
pp. 102202
Author(s):  
Zhibin Yang ◽  
Zhikai Qiu ◽  
Yong Zhou ◽  
Zhiqiu Huang ◽  
Jean-Paul Bodeveix ◽  
...  

Author(s):  
Ricardo Pérez-Castillo ◽  
Ignacio García Rodríguez de Guzmán ◽  
Mario Piattini

Legacy information systems can be a serious headache for companies because, on the one hand, these systems cannot be thrown away since they store a lot of valuable business knowledge over time, and on the other hand, they cannot be maintained easily at an acceptable cost. For many years, reengineering has been a solution to this problem because it facilitates the reuse of the software artifacts and knowledge embedded in the system. However, reengineering often fails due to the fact that it carries out non-standardized and ad hoc processes. Currently, software modernization, and particularly ADM (Architecture-Driven Modernization), standardized by the OMG, is proving to be an important solution to that problem, since ADM advocates carrying out reengineering processes taking into account the principles and standards of model-driven development. This chapter provides an overview of ADM and shows how it allows legacy information systems to evolve, making them more agile, preserving the embedded business knowledge, and reducing maintenance costs. Also, this chapter presents the software archeology process using ADM and some ADM success stories.


2006 ◽  
Vol 35 (3) ◽  
Author(s):  
Bronius Paradauskas ◽  
Aurimas Laurikaitis

This article discusses the process of enterprise knowledge extraction from relational database and source code of legacy information systems. Problems of legacy systems and main solutions for them are briefly described here. The uses of data reverse engineering and program understanding techniques to automatically infer as much as possible the schema and semantics of a legacy information system is analyzed. Eight step data reverse engineering algorithm for knowledge extraction from legacy systems is provided. A hypothetical example of knowledge extraction from legacy information system is presented.


Author(s):  
ULRIKE KÖLSCH ◽  
JÜRGEN LASCHEWSKI

There is every indication that an object-oriented view of an information system is a solid foundation for understanding its legacy organization, for relating it to the environment in which it is embedded and for guiding its reengineering. In this paper we present a framework based upon the formal object-oriented specification language TROLL, which provides an object-oriented view of legacy information systems. The aim is to combine existing methods and keep results in a common and suitable description base which provides the appropriate form for deriving object specifications from the legacy IS. We usethe language TROLL not only as description language, but also as a framework to support the maintenance engineers in their reverse engineering tasks by giving hints about what to do next to complete the object specifications. The result of the approach is a formal object-oriented specification of the legacy IS that is suitable both for developing a new IS or for reengineering the legacy system.


2018 ◽  
Vol 7 (4) ◽  
pp. 665-672
Author(s):  
Vasanthi Kaliappan ◽  
Norhayati Mohd Ali

Software development deals with various changes and evolution that cannot be avoided due to the development processes which are vastly incremental and iterative. In Model Driven Engineering, inconsistency between model and its implementation has huge impact on the software development process in terms of added cost, time and effort. The later the inconsistencies are found, it could add more cost to the software project. Thus, this paper aims to describe the development of a tool that could improve the consistency between Unified Modeling Language (UML) design models and its C# implementation using reverse engineering approach. A list of consistency rules is defined to check vertical and horizontal consistencies between structural (class diagram) and behavioral (use case diagram and sequence diagram) UML diagrams against the implemented C# source code. The inconsistencies found between UML diagrams and source code are presented in a textual description and visualized in a tree view structure.


Author(s):  
Jean-Luc Hainaut ◽  
Jean Henrard ◽  
Didier Roland ◽  
Jean-Marc Hick ◽  
Vincent Englebert

Database reverse engineering consists of recovering the abstract descriptions of files and databases of legacy information systems. A legacy information system can be defined as a “data-intensive application, such as [a] business system based on hundreds or thousands of data files (or tables), that significantly resists modifications and changes” (Brodie & Stonebraker, 1995). The objective of database reverse engineering is to recover the logical and conceptual descriptions, or schemas, of the permanent data of a legacy information system, that is, its database, be it implemented as a set of files or through an actual database management system.


Author(s):  
Zhiying Tu ◽  
Gregory Zacharewicz ◽  
David Chen

This chapter aims at proposing an approach to implement a distributed Information System built on top of a federation of existing (reused) software components. This solution is taking as a core consideration the problem of interoperability of data exchanged between enterprises. The idea is to adapt and reuse experiences coming from the development of enterprises legacy Information Systems in order to create a HLA (High Level Architecture) based system of systems. In that perspective, this chapter proposes a new bi-directional development life cycle. MDA (Model Driven Architecture) and HLA FEDEP (Federation Development and Execution Process) are combined and harmonized to implement distributed Information Systems from enterprise models of existing system. Conversely, model reverse engineering techniques are used to help re-implement existing systems, in order to be interoperable without being fully reconstructed. Then, according to HLA 1516 evolved new features, this chapter proposes a solution based on an open source RTI, poRTIco, to implement Web enabled federates.


Sign in / Sign up

Export Citation Format

Share Document