The year 2000 problem posed a difficult problem for many IT shops world wide. The most difficult part of the problem was not the actual changes to ensure compliance, but finding and classifying the data fields that represent dates. This is a problem well suited to design recovery. The paper presents an overview of LS/2000, a system that used design recovery to analyze source code for year 2000 risks and guide a source transformation that was able to automatically remediate over 99% of the year 2000 risks in over three billion lines of production IT source
%0 Conference Paper
%1 Dean2001
%A Dean, T.R.
%A Cordy, J.R.
%A Schneider, K.A.
%A Malton, A.J.
%B Proc. IEEE Int'l Conf. on Software Maintenance
%D 2001
%I IEEE
%K software source maintenance architecture code analysis to_read
%P 622--631
%R 10.1109/ICSM.2001.972779
%T Using design recovery techniques to transform legacy systems
%X The year 2000 problem posed a difficult problem for many IT shops world wide. The most difficult part of the problem was not the actual changes to ensure compliance, but finding and classifying the data fields that represent dates. This is a problem well suited to design recovery. The paper presents an overview of LS/2000, a system that used design recovery to analyze source code for year 2000 risks and guide a source transformation that was able to automatically remediate over 99% of the year 2000 risks in over three billion lines of production IT source
@inproceedings{Dean2001,
abstract = {The year 2000 problem posed a difficult problem for many IT shops world wide. The most difficult part of the problem was not the actual changes to ensure compliance, but finding and classifying the data fields that represent dates. This is a problem well suited to design recovery. The paper presents an overview of LS/2000, a system that used design recovery to analyze source code for year 2000 risks and guide a source transformation that was able to automatically remediate over 99% of the year 2000 risks in over three billion lines of production IT source},
added-at = {2010-01-10T12:27:32.000+0100},
author = {Dean, T.R. and Cordy, J.R. and Schneider, K.A. and Malton, A.J.},
biburl = {https://www.bibsonomy.org/bibtex/2b13b6d47cee04a0314b935cc85b9578e/sjbutler},
booktitle = {Proc. IEEE Int'l Conf. on Software Maintenance},
doi = {10.1109/ICSM.2001.972779},
interhash = {447d439b5b90cd7c95fa708f38424e43},
intrahash = {b13b6d47cee04a0314b935cc85b9578e},
keywords = {software source maintenance architecture code analysis to_read},
pages = {622--631},
publisher = {IEEE},
timestamp = {2010-01-10T12:27:33.000+0100},
title = {Using design recovery techniques to transform legacy systems},
year = 2001
}