共 50 条
- [1] An approach to deriving global authorizations in federated database systems [J]. DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 58 - 75
- [2] Deriving Event Logs from Legacy Software Systems [J]. PROCESS MINING WORKSHOPS, ICPM 2022, 2023, 468 : 409 - 421
- [3] Introducing business process into legacy information systems [J]. BUSINESS PROCESS MANAGEMENT, PROCEEDINGS, 2005, 3649 : 452 - 457
- [4] The influence of legacy information systems on business process change strategies [J]. ASSOCIATION FOR INFORMATION SYSTEMS PROCEEDINGS OF THE AMERICAS CONFERENCE ON INFORMATION SYSTEMS, 1998, : 527 - 529
- [5] From legacy systems towards modern health information systems [J]. MEDINFO '98 - 9TH WORLD CONGRESS ON MEDICAL INFORMATICS, PTS 1 AND 2, 1998, 52 : 931 - 934
- [6] Deriving Normalized Systems Elements from Business Process Models [J]. 2009 FOURTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ADVANCES (ICSEA 2009), 2009, : 27 - 32
- [7] A multi-perspective framework for the analysis of legacy information systems [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING, 1997, 1250 : 117 - 130
- [8] Deriving an object model from legacy FORTRAN code [J]. INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 1996, : 3 - 12
- [10] Process mining through dynamic analysis for modernising legacy systems [J]. IET SOFTWARE, 2011, 5 (03) : 304 - 319