skip to main content
article
Free Access

DoD legacy systems: reverse engineering data requirements

Published:01 May 1994Publication History
First page image

References

  1. 1 Aiken. P. Data Reverse Engineering. Mcgraw-Hill newyork. To be published.Google ScholarGoogle Scholar
  2. 2 Basili, V.R. atd Mili:s, H.I.). Understanding a n d documentilig progratn s. tEEE 7?'arts, Sq/?w. E~go SE-8, 3 (May t982), 27(I-283, Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 Chikoiski, E and Cross I{, J.H, Re. verse engineering and design recoverv: A taxonomy, IEEE S4iu.,. 7 t (Jan 1001, 13.- 17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 DoD Directive 8020,i-M intertional Process Improvement tbr Implemenring the .l.nfbrmation Malmgemc.nt Program of the Department of Defense, Aug, 1992 (Draft),Google ScholarGoogle Scholar
  5. 5 DoD Directive 8320. I-M Data Sta dadim.tio.t. Aug, 1992 (l)rali).Google ScholarGoogle Scholar
  6. 6 Fairley, R,E. Sqfiwa' Engineering" Co.- cept, Mcgraw-Hill, New York, I985.Google ScholarGoogle Scholar
  7. 7 Finkelstein, C, information engineering Slralegic systems Development Addisom-Wesley, Reading, Mass,. 1993, Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 G0ause. D.C and Weinberg, G.M. Exsign Dorset House, New York, 1989,Google ScholarGoogle Scholar
  9. 9 Nolan. R. Managin.g the crisis in data processing. Ha-n,ard Bus. Rev,, (I979).Google ScholarGoogle Scholar
  10. 10 Sharon, D. A reverse engirmering and reengineering tool classification (.fan, 1993).Google ScholarGoogle Scholar
  11. 11 Staiti, C. and Pin.ella, P, DoD's Strassmanil: The politics of d ownsizing. Dalamation. (Oct. 15, 1992), 107- 110.Google ScholarGoogle Scholar

Index Terms

  1. DoD legacy systems: reverse engineering data requirements

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 37, Issue 5
          May 1994
          98 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/175290
          Issue’s Table of Contents

          Copyright © 1994 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 May 1994

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader