{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:54:57Z","timestamp":1766566497654,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,17]]},"DOI":"10.1145\/3756681.3756982","type":"proceedings-article","created":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:30:04Z","timestamp":1766565004000},"page":"294-304","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["LLM Vs Rule-Based - The COBRAIN Tool and An Empirical Study on Extracting Business Rules from COBOL"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-3122-0594","authenticated-orcid":false,"given":"Chiranjeevi","family":"B S","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, Indian Institute of Technology Tirupati, Tirupati, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0818-8178","authenticated-orcid":false,"given":"Sridhar","family":"Chimalakonda","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Indian Institute of Technology Tirupati, Tirupati, India"}]}],"member":"320","published-online":{"date-parts":[[2025,12,24]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"crossref","unstructured":"Ali Mir Sameed Nikhil Manjunath and Sridhar Chimalakonda. \"COBREX: A Tool for Extracting Business Rules from COBOL.\" 2022 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE 2022.","DOI":"10.1109\/ICSME55016.2022.00060"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"crossref","unstructured":"Sammet Jean E. \"The early history of COBOL.\" History of Programming Languages. 1978. 199-243.","DOI":"10.1145\/800025.1198367"},{"key":"e_1_3_3_3_4_2","unstructured":"Morgan Tony. Business rules and information systems: aligning IT with business goals. Addison-Wesley Professional 2002."},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"crossref","unstructured":"Herbst Holger. \"Business rules in systems analysis: a meta-model and repository system.\" Information Systems 21.2 (1996): 147-166.","DOI":"10.1016\/0306-4379(96)00009-9"},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"crossref","unstructured":"Bhattacharyya Abhidip Pavan Kumar Chittimalli and Ravindra Naik. \"An approach to mine business rule intents from domain-specific documents.\" Proceedings of the 10th Innovations in Software Engineering Conference. 2017.","DOI":"10.1145\/3021460.3021470"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"crossref","unstructured":"Hussain Sayed Muqtada Shahid Nazir Bhatti and M. Faizan Ur Rasool. \"Legacy system and ways of its evolution.\" 2017 International Conference on Communication Technologies (ComTech). IEEE 2017.","DOI":"10.1109\/COMTECH.2017.8065750"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"crossref","unstructured":"Cosentino Valerio et al. \"Extracting business rules from COBOL: A model-based tool.\" 2013 20th Working Conference on Reverse Engineering (WCRE). IEEE 2013.","DOI":"10.1109\/WCRE.2013.6671329"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"crossref","unstructured":"Feathers Michael. Working effectively with legacy code. Prentice Hall Professional 2004.","DOI":"10.1007\/978-3-540-27777-4_42"},{"key":"e_1_3_3_3_10_2","unstructured":"Huang Hai et al. \"Business rule extraction from legacy code.\" Proceedings of 20th International Computer Software and Applications Conference: COMPSAC\u201996. IEEE 1996."},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"crossref","unstructured":"Cosentino Valerio et al. \"Extracting business rules from COBOL: A model-based framework.\" 2013 20th Working Conference on Reverse Engineering (WCRE). IEEE 2013.","DOI":"10.1109\/WCRE.2013.6671316"},{"key":"e_1_3_3_3_12_2","unstructured":"Dau Anh TV et al. \"XMainframe: A Large Language Model for Mainframe Modernization.\" arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2408.04660 (2024)."},{"key":"e_1_3_3_3_13_2","unstructured":"Gottesdiener Ellen. \"Business rules show power promise.\" Application Development Trends 4.3 (1997): 36-42."},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"crossref","unstructured":"H. M. Sneed \"Extracting business logic from existing COBOL programs as a basis for redevelopment \" Proceedings 9th International Workshop on Program Comprehension. IWPC 2001 Toronto ON Canada 2001 pp. 167-175 doi: 10.1109\/WPC.2001.921728.","DOI":"10.1109\/WPC.2001.921728"},{"key":"e_1_3_3_3_15_2","unstructured":"Wang Xinyu & Sun Jianling & Yang Xiaohu & He Zhijun & Maddineni S.. (2004). Business rules extraction from large legacy systems. 8. 249- 258. 10.1109\/CSMR.2004.1281426."},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"crossref","unstructured":"Cosentino Valerio & Cabot Jordi & Albert Patrick & Bauquel Philippe & Perronnet Jacques. (2012). A Model Driven Reverse Engineering Framework for Extracting Business Rules Out of a Java Application. 10.1007\/978-3-642-32689-9_3.","DOI":"10.1007\/978-3-642-32689-9_3"},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"crossref","unstructured":"Chaparro Oscar et al. \"Towards the automatic extraction of structural business rules from legacy databases.\" 2012 19th Working conference on reverse engineering. IEEE 2012.","DOI":"10.1109\/WCRE.2012.57"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"crossref","unstructured":"Weiser Mark. \"Program slicing.\" IEEE Transactions on software engineering 4 (1984): 352-357.","DOI":"10.1109\/TSE.1984.5010248"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"crossref","unstructured":"Coyle Frank P. and Cay S. Horstmann. \"Does Cobol Exist?\/Cobol versus Java [Point\/Counterpoint].\" IEEE Software 17.2 (2000): 22-25.","DOI":"10.1109\/52.839205"},{"key":"e_1_3_3_3_20_2","unstructured":"COBOL vs C++ comparison"},{"key":"e_1_3_3_3_21_2","unstructured":"Kizior Ronald J. Donald Carr and Paul Halpern. \"Does COBOL have a future?.\" Proc. Inf. Syst. Educ. Conf. Vol. 17. No. 126. 2000."},{"key":"e_1_3_3_3_22_2","unstructured":"Team Gemini et al. \"Gemini: a family of highly capable multimodal models.\" arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2312.11805 (2023)."},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"crossref","unstructured":"Ahmed Toufique and Premkumar Devanbu. \"Few-shot training LLMs for project-specific code-summarization.\" Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering. 2022.","DOI":"10.1145\/3551349.3559555"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"crossref","unstructured":"Yang Jingfeng et al. \"Harnessing the power of llms in practice: A survey on chatgpt and beyond.\" ACM Transactions on Knowledge Discovery from Data 18.6 (2024): 1-32.","DOI":"10.1145\/3649506"},{"key":"e_1_3_3_3_25_2","unstructured":"Haldar Rajarshi and Julia Hockenmaier. \"Analyzing the performance of large language models on code summarization.\" arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2404.08018 (2024)."},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"crossref","unstructured":"Nam Daye et al. \"Using an llm to help with code understanding.\" Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering. 2024.","DOI":"10.1145\/3597503.3639187"},{"key":"e_1_3_3_3_27_2","unstructured":"Team Gemma et al. \"Gemma: Open models based on gemini research and technology.\" arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2403.08295 (2024)."},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"crossref","unstructured":"Ciborowska Agnieszka Aleksandar Chakarov and Rahul Pandita. \"Contemporary COBOL: Developers\u2019 perspectives on defects and defect location.\" 2021 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE 2021.","DOI":"10.26226\/morressier.613b5418842293c031b5b60d"},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"crossref","unstructured":"Glass Robert L. Iris Vessey and Venkataraman Ramesh. \"Research in software engineering: an analysis of the literature.\" Information and Software technology 44.8 (2002): 491-506.","DOI":"10.1016\/S0950-5849(02)00049-6"},{"key":"e_1_3_3_3_30_2","unstructured":"Xie Danning et al. \"Impact of large language models on generating software specifications.\" arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2306.03324 (2023)."},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"crossref","unstructured":"Zelkowitz Marvin V. and Dolores Wallace. \"Experimental validation in software engineering.\" Information and Software Technology 39.11 (1997): 735-743.","DOI":"10.1016\/S0950-5849(97)00025-6"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"crossref","unstructured":"Denny Paul et al. \"Explaining code with a purpose: An integrated approach for developing code comprehension and prompting skills.\" Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 1. 2024. 283-289.","DOI":"10.1145\/3649217.3653587"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"crossref","unstructured":"Bennett Keith.\u201cLegacy systems: Coping with success.\" IEEE software 12.1 (1995): 19-23.","DOI":"10.1109\/52.363157"},{"key":"e_1_3_3_3_34_2","unstructured":"Ransom Jane I. Somerville and Ian Warren. \u201cA method for assessing legacy systems for evolution.\" Proceedings of the Second Euromicro Conference on Software Maintenance and Reengineering. IEEE 1998."},{"key":"e_1_3_3_3_35_2","unstructured":"Chew Robert et al. \"LLM-assisted content analysis: Using large language models to support deductive coding.\" arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2306.14924 (2023)."},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"crossref","unstructured":"Li Haonan et al. \"Enhancing Static Analysis for Practical Bug Detection: An LLM-Integrated Approach.\" Proceedings of the ACM on Programming Languages 8.OOPSLA1 (2024): 474-499.","DOI":"10.1145\/3649828"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"crossref","unstructured":"Hou Xinyi et al. \"Large language models for software engineering: A systematic literature review.\" ACM Transactions on Software Engineering and Methodology 33.8 (2024): 1-79.","DOI":"10.1145\/3695988"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"crossref","unstructured":"Helmeczi Robert Kraig Mucahit Cevik and Savas Y\u0131ld\u0131r\u0131m. \"Few-shot learning for sentence pair classification and its applications in software engineering.\" arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2306.08058 (2023).","DOI":"10.32920\/26866606"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"crossref","unstructured":"Kitchenham B. Linkman S. & Law D. (1997). DESMET: a methodology for evaluating software engineering methods and tools. Computing & Control Engineering Journal 8(3) 120-126.","DOI":"10.1049\/cce:19970304"},{"key":"e_1_3_3_3_40_2","unstructured":"Touvron Hugo et al. \"Llama: Open and efficient foundation language models.\" arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2302.13971 (2023)."},{"key":"e_1_3_3_3_41_2","unstructured":"Morgan Tony. Business rules and information systems: aligning IT with business goals. Addison-Wesley Professional 2002."},{"key":"e_1_3_3_3_42_2","unstructured":"Jiang Albert Q. et al. \"Mistral 7B.\" arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2310.06825 (2023)."},{"key":"e_1_3_3_3_43_2","unstructured":"Brown Tom B. \"Language models are few-shot learners.\" arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2005.14165 (2020)."},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"crossref","unstructured":"Joiner Jay K. and Wei-Tek Tsai. \"Re-engineering legacy COBOL programs.\" Communications of the ACM 41.5es (1998): 185-197.","DOI":"10.1145\/276404.276410"},{"key":"e_1_3_3_3_45_2","unstructured":"Yang Ke et al. \"If llm is the wizard then code is the wand: A survey on how code empowers large language models to serve as intelligent agents.\" arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2401.00812 (2024)."},{"key":"e_1_3_3_3_46_2","unstructured":"Ali Mir Sameed Nikhil Manjunath and Sridhar Chimalakonda. \"X-cobol: A dataset of cobol repositories.\" arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2306.04892 (2023)."},{"key":"e_1_3_3_3_47_2","unstructured":"Denton Remi et al. \"Whose ground truth? accounting for individual and collective identities underlying dataset annotation.\" arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2112.04554 (2021)."},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"crossref","unstructured":"Krig Scott and Scott Krig. \"Ground truth data content metrics and analysis.\" Computer Vision Metrics: Textbook Edition (2016): 247-271.","DOI":"10.1007\/978-3-319-33762-3_7"},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"crossref","unstructured":"Chiang Chia-Chu and Coskun Bayrak. \"Legacy software modernization.\" 2006 IEEE international conference on systems man and cybernetics. Vol. 2. IEEE 2006.","DOI":"10.1109\/ICSMC.2006.384895"},{"key":"e_1_3_3_3_50_2","unstructured":"Fagbohun Oluwole Rachel M. Harrison and Anton Dereventsov. \"An Empirical Categorization of Prompting Techniques for Large Language Models: A Practitioner\u2019s Guide.\" arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2402.14837 (2024)."},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"crossref","unstructured":"Turner Daniel B. et al. \"Coding for broader impact: leveraging coding skills for stakeholder communication.\" Frontiers in Ecology and the Environment 20.4 (2022): 255-262.","DOI":"10.1002\/fee.2469"},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"crossref","unstructured":"M. Almaliki C. Ncube and R. Ali \u201cThe design of adaptive acquisition of users feedback: An empirical study \u201d 2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS) Marrakech 2014 pp. 1-12 doi: 10.1109\/RCIS.2014.6861076.","DOI":"10.1109\/RCIS.2014.6861076"},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"crossref","unstructured":"Aleem Saiqa Luiz Fernando Capretz Faheem Ahmed and Shuib Basri. \"User Requirements for Software Game Process; An Empirical Investigation.\" arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2110.03764 (2021).","DOI":"10.29327\/1298728.24-2"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"crossref","unstructured":"Hennell Michael A. W. M. McNicol and J. Hawkins. \"The static analysis of Cobol programs.\" ACM SIGSOFT Software Engineering Notes 5.4 (1980): 17-25.","DOI":"10.1145\/1012436.1012441"},{"key":"e_1_3_3_3_55_2","unstructured":"Giacobazzi Roberto Alberto Lovato and Isabella Mastroeni. \"A Static Analyzer for COBOL-85 Programs.\""},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"crossref","unstructured":"Blinowski Grzegorz Anna Ojdowska and Adam Przyby\u0142ek. \"Monolithic vs. microservice architecture: A performance and scalability evaluation.\" IEEE Access 10 (2022): 20357-20374.","DOI":"10.1109\/ACCESS.2022.3152803"},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"crossref","unstructured":"Chattopadhyay Souti Nicholas Nelson Audrey Au Natalia Morales Christopher Sanchez Rahul Pandita and Anita Sarma. \u201cA tale from the trenches: cognitive biases and software development.\u201d In Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering pp. 654-665. 2020.","DOI":"10.1145\/3377811.3380330"},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"crossref","unstructured":"O\u2019Sullivan TA Jefferson CG. A Review of Strategies for Enhancing Clarity and Reader Accessibility of Qualitative Research Results. Am J Pharm Educ. 2020 Jan;84(1):7124. doi: 10.5688\/ajpe7124. PMID: 32292189; PMCID: PMC7055402.","DOI":"10.5688\/ajpe7124"},{"key":"e_1_3_3_3_59_2","unstructured":"Ali Mir Sameed Nikhil Manjunath and Sridhar Chimalakonda. \"X-cobol: A dataset of cobol repositories.\" arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2306.04892 (2023)."},{"key":"e_1_3_3_3_60_2","unstructured":"Abeeha Jaffery \"Legacy System: Definition Challenges Types & Modernization\" Astera 2024. URL: https:\/\/www.astera.com\/type\/blog\/legacy-system\/"},{"key":"e_1_3_3_3_61_2","unstructured":"Warren Ian. The renaissance of legacy systems: method support for software-system evolution. Springer Science & Business Media 2012."},{"key":"e_1_3_3_3_62_2","unstructured":"Michael Martinez \"50 Years of Software\" IEEE Computer Society 2019. URL: https:\/\/www.computer.org\/publications\/tech-news\/trends\/50-years-of-software."},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"crossref","unstructured":"Huang Hai & Tsai Wei-Tek & Bhattacharya Sourav & Chen Xiaoping & Wang Yamin & Sun Jianhua. (1998). Business rule extraction techniques for COBOL programs. Journal of Software Maintenance. 10. 3-35. 10.1002\/(SICI)1096-908X(199801\/02)10:13.0.CO;2-Z.","DOI":"10.1002\/(SICI)1096-908X(199801\/02)10:1<3::AID-SMR161>3.0.CO;2-Z"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"crossref","unstructured":"De Marco Alessandro Valentin Iancu and Ira Asinofsky. \"COBOL to Java and newspapers still get delivered.\" 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE 2018.","DOI":"10.1109\/ICSME.2018.00055"},{"key":"e_1_3_3_3_65_2","unstructured":"Jan Vanthienen and Stijn Goedertier \"How Business Rules Define Business Processes\" Business Rules Journal Vol. 8 No. 3 (Mar. 2007)"},{"key":"e_1_3_3_3_66_2","unstructured":"HG Highlights \"COBOL\" 2024. URL: https:\/\/discovery.hgdata.com\/product\/cobol."},{"key":"e_1_3_3_3_67_2","unstructured":"Joseph McKendrick \"The Post-Y2K Wish List\" Enterprose Systems Journal 2000 p.18."},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"crossref","unstructured":"Fischer Gregor J. Lusiardi and J. Wolff Von Gudenberg. \"Abstract syntax trees-and their role in model driven software development.\" International Conference on Software Engineering Advances (ICSEA 2007). IEEE 2007.","DOI":"10.1109\/ICSEA.2007.12"},{"key":"e_1_3_3_3_69_2","unstructured":"Vengelmann \"How Readable are COBOL Programs Really?\" Cobsolete 2019 https:\/\/www.cobsolete.de\/2019\/05\/29\/how-readable-are-cobol-programs-really\/."},{"key":"e_1_3_3_3_70_2","unstructured":"Tom Taulli \u201cCOBOL Language: Call It A Comeback? \u201d 2020 https:\/\/www.forbes.com\/sites\/tomtaulli\/2020\/07\/13\/cobol-language-call-it-a-comeback\/?sh=3fff9eac7d0f"},{"key":"e_1_3_3_3_71_2","unstructured":"David Cassel \u201cCOBOL is Everywhere. Who will Maintain it?\" 2017 https:\/\/thenewstack.io\/cobol-everywhere-will-maintain\/"}],"event":{"name":"EASE '25: Evaluation and Assessment in Software Engineering","location":"Istanbul Turkiye","acronym":"EASE '25"},"container-title":["Proceedings of the 29th International Conference on Evaluation and Assessment in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3756681.3756982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:42:24Z","timestamp":1766565744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3756681.3756982"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":70,"alternative-id":["10.1145\/3756681.3756982","10.1145\/3756681"],"URL":"https:\/\/doi.org\/10.1145\/3756681.3756982","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-12-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}