Juan Chen, Zhiyong Feng, et al.
ICWS 2015
As software consumption is shifting to mobile platforms, enterprises are looking for efficient ways to reuse their existing legacy systems by exposing their functionalities as services. Mining services from legacy code is therefore an important problem for the enterprises. In this paper we present a technique for mining service candidates from the database applications. Central to our mining technique is the specification and identification of data-access patterns which specify how a program interacts with the databases. In addition to finding service candidates which are internal functions in the source code, we also provide an algorithm to expose the function as a stateless service by generating a wrapper function around the internal function. We demonstrate the effectiveness of our technique on two open source applications and twelve industrial applications.
Juan Chen, Zhiyong Feng, et al.
ICWS 2015
Jaydeep Sen, Greg Stager, et al.
SIGMOD 2019
Avraham Leff, James T. Rayfield
ICWS 2015
Diptikalyan Saha, Pankaj Dhoolia, et al.
ESEC/FSE 2013