2008
DOI: 10.1016/j.jss.2007.06.006
|View full text |Cite
|
Sign up to set email alerts
|

A wrapping approach for migrating legacy system interactive functionalities to Service Oriented Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
59
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
8
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 80 publications
(61 citation statements)
references
References 10 publications
1
59
0
Order By: Relevance
“…The process includes three tasks as follows. [ 76,77], semiautomaticlly [ 78,79], or fully-automatically [ 80] techniques that service developers can use to wrapp individual functionalities in legacy source codes such as Web Services. Table 11 shows the possible relation values of Implement Necessary Wrappers task.…”
Section: Enhaced Processkind: Develop Servicesmentioning
confidence: 99%
“…The process includes three tasks as follows. [ 76,77], semiautomaticlly [ 78,79], or fully-automatically [ 80] techniques that service developers can use to wrapp individual functionalities in legacy source codes such as Web Services. Table 11 shows the possible relation values of Implement Necessary Wrappers task.…”
Section: Enhaced Processkind: Develop Servicesmentioning
confidence: 99%
“…Legacy software assets can be preserved by means of wrapping technology. A black-box, wrapper-based migration process, making the interactive functionality of legacy systems accessible as web services, is described in [14]. In [15], different from black-box wrapping method, a reengineering approach is proposed which applies an improved agglomerative hierarchical clustering algorithm to restructure legacy code and to facilitate legacy code extraction for web service construction.…”
Section: Related Workmentioning
confidence: 99%
“…(2) The modernization facet indicates the guidance process for using a modernization technique among many existing ones (Baghdadi & Al-Bulushi, 2013;Canfora et al, 2008;Comella-Dorda et al, 2000;Rahgozar & Oroumchian, 2003;Lewis et al, 2008). This guidance would first locate the business functions locked within www.ccsenet.org/cis Computer and Information Science Vol.…”
Section: The Sba Process Guidedmentioning
confidence: 99%