{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:33:05Z","timestamp":1763105585517,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/skima.2017.8294120","type":"proceedings-article","created":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T19:18:55Z","timestamp":1519067935000},"page":"1-11","source":"Crossref","is-referenced-by-count":6,"title":["An assessment conceptual framework for the modernization of legacy systems"],"prefix":"10.1109","author":[{"given":"Abir","family":"M'baya","sequence":"first","affiliation":[]},{"given":"Jannik","family":"Laval","sequence":"additional","affiliation":[]},{"given":"Nejib","family":"Moalla","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","article-title":"A tutorial on the performance assessment of stochastic multiobjective optimizers. Technical report 214","author":"knowles","year":"2006","journal-title":"Computer Engineering and Networks Laboratory (TIK) ETH Zurich Switzerland revised version"},{"journal-title":"Software Engineering Modern Approaches","year":"2016","author":"braude","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.21236\/ADA336213"},{"key":"ref11","article-title":"Reverse Engineering for Mainframe Enterprise Applications","author":"van geet","year":"2011","journal-title":"Patterns and Experiences"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2000.883039"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.08.002"},{"key":"ref14","first-page":"296","article-title":"Refactoring Model of Legacy Software in Smart Grid based on Cloned Codes Detection","volume":"10","author":"meng","year":"2013","journal-title":"IJCSI International Journal of Computer Science Issues"},{"key":"ref15","first-page":"345","article-title":"Wrapping Legacy Software for Reuse in a SOA","author":"sneed","year":"2006","journal-title":"Multikonferenz Wirtschaftsinformatik"},{"key":"ref16","first-page":"425","article-title":"Migrating a Large Scale Legacy Applicationto SOA: Challenges and Lessons Learned","author":"khadka","year":"2013","journal-title":"Proceedings of the 20th WCRE"},{"key":"ref17","article-title":"Managing legacy system costs: A case study of a meta-assessment model to identify solutions in a large financial services company","author":"crotty","year":"2016","journal-title":"Applied Computing and Informatics"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.9.1.111-115"},{"key":"ref19","first-page":"9","article-title":"Analyzing the reuse potentialof migrating legacy components to a service-oriented architecture","author":"lewis","year":"2006","journal-title":"CSMR IEEE"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1201\/b17461","author":"fenton","year":"2014","journal-title":"Software Metrics A Rigorous and Practical Approach"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/52.795108"},{"year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/52.363157"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2001.972781"},{"key":"ref29","first-page":"53","article-title":"Legacy system evolution towards service-oriented architecture","author":"almonaies","year":"2010","journal-title":"International Workshop on SOA Migration and Evolution"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.162"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/52.363168"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.1998.665778"},{"key":"ref2","article-title":"Migrating legacy systems: Gateways","author":"brodie","year":"1995","journal-title":"interfaces and the incremental approach Morgan Kaufmann Publishers Inc"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1049\/ip-sen:19990617","article-title":"decision model for legacy systems","volume":"146","author":"bennett","year":"1999","journal-title":"Software IEE Proceedings-"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738510"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v6i1.8367"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332499"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568318"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2980258.2980409"},{"journal-title":"Software Engineering A Practitioner's Approach","year":"2005","author":"pressman","key":"ref23"},{"journal-title":"REMICS Handbook Interim Release","year":"2012","key":"ref26"},{"journal-title":"Multistage Legacy Software Crisis Detection Matrix","year":"2016","author":"mishra","key":"ref25"}],"event":{"name":"2017 11th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","start":{"date-parts":[[2017,12,6]]},"location":"Malabe","end":{"date-parts":[[2017,12,8]]}},"container-title":["2017 11th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8288782\/8294085\/08294120.pdf?arnumber=8294120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T01:18:25Z","timestamp":1570756705000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8294120\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/skima.2017.8294120","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}