DocumentCode :
2035921
Title :
Using design recovery techniques to transform legacy systems
Author :
Dean, Thomas R. ; Cordy, James R. ; Schneider, Kevin A. ; Malton, Andrew J.
Author_Institution :
Dept. of Electr. & Comput. Eng., Queen´´s Univ., Kingston, Ont., Canada
fYear :
2001
fDate :
2001
Firstpage :
622
Lastpage :
631
Abstract :
The year 2000 problem posed a difficult problem for many IT shops world wide. The most difficult part of the problem was not the actual changes to ensure compliance, but finding and classifying the data fields that represent dates. This is a problem well suited to design recovery. The paper presents an overview of LS/2000, a system that used design recovery to analyze source code for year 2000 risks and guide a source transformation that was able to automatically remediate over 99% of the year 2000 risks in over three billion lines of production IT source
Keywords :
risk management; software architecture; software maintenance; software tools; system recovery; IT shops; LS/2000; compliance; data fields; dates; design recovery; design recovery techniques; legacy system transformation; production IT source; source code analysis; source transformation; year 2000 problem; year 2000 risks; Computer science; Councils; Data engineering; Data structures; Databases; Design engineering; Humans; Information science;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Maintenance, 2001. Proceedings. IEEE International Conference on
Conference_Location :
Florence
ISSN :
1063-6773
Print_ISBN :
0-7695-1189-9
Type :
conf
DOI :
10.1109/ICSM.2001.972779
Filename :
972779
Link To Document :
بازگشت