MaRMI-RE: Systematic Componentization Process for Reengineering Legacy System Jung-Eun Cha, Chul-Hong Kim, Computational Science and Its Applications –

Slides:



Advertisements
Similar presentations
1 jNIK IT tool for electronic audit papers 17th meeting of the INTOSAI Working Group on IT Audit (WGITA) SAI POLAND (the Supreme Chamber of Control)
Advertisements

Sybase PowerBuilder Applications Modernization. 11 October About the Company Founded in 2002 Unites high-level information technology and organization.
A case of Armenia: Legal framework for E-procurement in Public Procurement Sector Mr Karen Brutyan, PhD, PFM and PP EBRD Consultant, Wolf Theiss 1-2 December.
Ch 3 System Development Environment
© 2005 by Prentice Hall Appendix 2 Automated Tools for Systems Development Modern Systems Analysis and Design Fourth Edition Jeffrey A. Hoffer Joey F.
CMMI – Continuous as well as staged model CMMI capability levels – Incomplete, performed, managed, defined, quantitatively managed, optimized Example.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
Sixth Hour Lecture 10:30 – 11:20 am, September 9 Framework for a Software Management Process – Artifacts of the Process (Part II, Chapter 6 of Royce’ book)
Software Testing and Quality Attributes Software Testing Module ( ) Dr. Samer Hanna.
Introduction To System Analysis and Design
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 2 Software Processes.
Lecture 13 Revision IMS Systems Analysis and Design.
E-Learning Practices at PPU Dr. Mahmoud Hasan AL-Saheb Palestine Polytechnic University Administrative Sciences and Informatics College,
Software Engineering For Beginners. General Information Lecturer, Patricia O’Byrne, office K115A. –
Software Engineering For Beginners. General Information Lecturer, Patricia O’Byrne. – Times: –See noticeboard outside.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 13 Developing and Managing Information Systems.
Objectives Explain the purpose and various phases of the traditional systems development life cycle (SDLC) Explain when to use an adaptive approach to.
Information Skills Training – Physics Selina Lock Information Librarian (Sciences)
Software Safety Risk Evaluation (SSRE) Process SAŠA ŠPILER METHOD ENGINEERING UTRECHT, APRIL 2014.
© 2005 by Prentice Hall Appendix 2 Automated Tools for Systems Development Modern Systems Analysis and Design Fourth Edition Jeffrey A. Hoffer Joey F.
SOFTWARE REVERSE ENGINEERING
Chapter 1 The Systems Development Environment
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Chapter.
Project Proposal: Academic Job Market and Application Tracker Website Project designed by: Cengiz Gunay Client: Cengiz Gunay Audience: PhD candidates and.
CSI315 Web Applications and Technology Overview of Systems Development (342)
Objectives of the Lecture
© 2001 Business & Information Systems 2/e1 Chapter 13 Developing and Managing Information Systems.
Chapter 2: Software Process Omar Meqdadi SE 2730 Lecture 2 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
Assessing the Suitability of UML for Modeling Software Architectures Nenad Medvidovic Computer Science Department University of Southern California Los.
Chapter 1: Introduction Omar Meqdadi SE 2730 Lecture 1 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
 TOTEM ( Testing-Object OrienTed systEms) Test Methodology Darrel K. Farro Master Business Informatics University Utrecht / MBI Class
Software Safety Risk Evaluation Process Yorick Bouma, , Group III.
Modeling the goal argumentation method By A. J. Jansen.
MODA-TEL An IST project on Model Driven Architectures for Telecommunications System Development and Operation.
Enterprise Systems Architectures EGN 5621 Enterprise Systems Collaboration (Professional MSEM) Fall, 2012.
Information Systems Engineering. Lecture Outline Information Systems Architecture Information System Architecture components Information Engineering Phases.
A Strategy and an Eclipse Based Environment for the Migration of Legacy Systems to Multi-tier Web-based Architectures Horia Constantin.
Engineering e-Business Applications for Security DISCUSSANT GERALD TRITES, FCA, CA*IT/CISA.
Lecture 14 Maintaining the System and Managing Software Change SFDV Principles of Information Systems.
Eliciting Gaps in Requirements Change Wouter Westendorp.
Software Testing Definition Software Testing Module ( ) Dr. Samer Odeh Hanna.
Systems Analysis and Design in a Changing World, 6th Edition
Software Engineering Education Framework Sun-Myung Hwang Computer Engineering Dept, Daejeon University, Republic of Korea Abstract. Software.
Software Engineering Lecture # 1.
Copyright 2002 Prentice-Hall, Inc. Chapter 4 Automated Tools for Systems Development 4.1 Modern Systems Analysis and Design.
KUFA UNIVERSITY Department of Computer Science. Fundamentals of Software Engineering Presented By Neamah Hassan Presented By Neamah Hassan.
Purpose of a Literature Review Potential Research Sources Writing a Literature Review.
Ch7: Software Production Process. 1 Waterfall models  Invented in the late 1950s for large air defense systems, popularized in the 1970s  Main characteristics:
Making the System Operational Implementation & Deployment
ANALISA & PERANCANGAN SISTEM Disusun Oleh : Dr. Lily Wulandari Program Pasca Sarjana Magister Sistem Informasi Universitas Gunadarma.
NURHALIMA 1. Identify the trade-offs when using CASE Describe organizational forces for and against adoption of CASE tools Describe the role of CASE tools.
1 A Service-based Approach to Developing Android Mobile Internet Device (MID) Applications Hyun Jung La and Soo Dong Kim Department of Computer Science.
Modeling with Rational Rose Huzefa Kagdi Software Development Laboratory Department of Computer Science Kent State University Kent Ohio, USA.
CS223: Software Engineering Lecture 32: Software Maintenance.
The Records Management Vision The Records Management Vision: Our Journey Towards Solutions for Everyday Life Ronald G. Smith, CRM Records and Information.
1 The Software Engineering Education at CSULA Jiang Guo Jose M. Macias June 4, 2010.
Appendix 2 Automated Tools for Systems Development
TJTS505: Master's Thesis Seminar
Essential Services and Tools for Effective Research
Business System Development
Classical Waterfall Model
Reverse Engineering: A Roadmap
Introduction to Software Testing
For academic research Using Google Scholar For academic research
Making the System Operational Implementation & Deployment
Hawkeye Security – Prophix story
Information Technology Pathway Updates
Introduction to Software Engineering
Research Institute for Future Media Computing
System Reengineering Restructuring or rewriting part or all of a system without changing its functionality Applicable when some (but not all) subsystems.
Presentation transcript:

MaRMI-RE: Systematic Componentization Process for Reengineering Legacy System Jung-Eun Cha, Chul-Hong Kim, Computational Science and Its Applications – ICCSA 2005 Lecture Notes in Computer Science Volume 3482, 2005, pp Presentation by: Rick Kok, , Business Informatics, Universiteit Utrecht

MaRMI-RE  Name: Magic and Robust Methodology Integrated- ReEngineering  Authors:  Jung Eun Cha, from the Software Engineering Department of the Electronics and Telecommunications Research Institute in Daejeon, Korea  Chul-Hong Kim, also from the Software Engineering Department of the Electronics and Telecommunications Research Institute in Daejeon, Korea

Daejon, Korea? © Google Maps

What is MaRMI-RE?  Purpose: ”we provide a componentization process […] for reengineering legacy systems into component systems so that legacy systems can continue to be developed to comply with varying business and technical environments” (Cha & Kim, 2005)  Basically a step-by-step plan for reverse engineering, redesigning and rebuilding a legacy system

What is a legacy system?  “A legacy system is an operational system that has been designed, implemented and installed in a radically different environment than that imposed by the current IT strategy and no longer supports the current business strategy” (Mitleton-Kelly, E., 2004)

Main phases

2. Re-engineering phase 4. Transfer phase 1. Planning phase 3. Componentization phase

Main phases  1. Planning.  Gain understanding of current business and requirements  Make strategy for transformation  Plan transformation  2. Re-engineering.  Information recovery on code level, design level and architectural level  3. Componentization.  Create components based on system functions  Adapt and alter components to new system  Transform and adopt components  Test integration  4. Transfer.  Train users  Install system  Test acceptance  Transfer system

PDD

PDD – Phase 2: Re-engineering phase

PDD – Phase 3: Componentization phase

Related literature  Positioning between other methods  CORUM (Common Object-based Re-engineering Unified Model) is a method that is based on “creating a data model for interoperability between several re-engineering toolsets” (Kazman, Woods & Carriere, 1998)  CORUM II basically is an adaptation of CORUM, but more complete by adding the software architecture concept and some more tools (Kazman, Woods & Carriere, 1998)  MARMI-RE: a method and tools for legacy system modernization (Cho, Cha, & Yang, 2004)  MaRMI-RE: Systematic Componentization Process for Reengineering Legacy System (this paper)

Related literature  Citations  Not widely used in the academic world. According to Google Scholar, cited by three papers  Hwang, K. S., Cui, J. F., & Chae, H. S. (2009, October). An Automated Approach to Componentization of Java Source Code. In Computer and Information Technology, CIT'09. Ninth IEEE International Conference (Vol. 2, pp ). IEEE.  刘芳, 瞿有甜, 周波, & 胡顺扬. (2009). 遗产软件重构技术的研究. 计算机技术与发展 ISTIC, 19(3).  Kok, R. (2013). BUSINESS INFORMATICS UNIVERSITEIT UTRECHT. (me)  Evaluations  One book evaluates the method  Dosch, W., Lee, R. & Wu, C. (2005). MaRMI-RE: a Method and Tools for Legacy System Modernization. Software Engineering Research, Management and Applications. 1st ed. Berlin, Germany: Springer. pp  Applications  According to Cha, J. and Kim, C. (2005), the method has been used twice in case studies. I couldn’t find any evidence that is has been used in other applications.

Example of a Use Case Diagram  Imagine a fictitious webshop. The next actors can be found in this example.  A client. He can place, pay and delete orders.  A salesperson. He has to approve orders of the clients by checking if they are correctly placed.  The financial department. This department accepts the payments of the client.  A shipping clerk, to ships the clients' orders.  The uses cases are:  Delete order  Place order  Pay order  Approve order  Send order

Example of a Use Case Diagram

Questions?