{"title":"Service Mining from Legacy Database Applications","authors":"Diptikalyan Saha","doi":"10.1109/ICWS.2015.66","DOIUrl":null,"url":null,"abstract":"As software consumption is shifting to mobile platforms, enterprises are looking for efficient ways to reuse their existing legacy systems by exposing their functionalities as services. Mining services from legacy code is therefore an important problem for the enterprises. In this paper we present a technique for mining service candidates from the database applications. Central to our mining technique is the specification and identification of data-access patterns which specify how a program interacts with the databases. In addition to finding service candidates which are internal functions in the source code, we also provide an algorithm to expose the function as a stateless service by generating a wrapper function around the internal function. We demonstrate the effectiveness of our technique on two open source applications and twelve industrial applications.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Web Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWS.2015.66","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
As software consumption is shifting to mobile platforms, enterprises are looking for efficient ways to reuse their existing legacy systems by exposing their functionalities as services. Mining services from legacy code is therefore an important problem for the enterprises. In this paper we present a technique for mining service candidates from the database applications. Central to our mining technique is the specification and identification of data-access patterns which specify how a program interacts with the databases. In addition to finding service candidates which are internal functions in the source code, we also provide an algorithm to expose the function as a stateless service by generating a wrapper function around the internal function. We demonstrate the effectiveness of our technique on two open source applications and twelve industrial applications.