Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,395,279 papers from all fields of science
Search
Sign In
Create Free Account
Legacy system
Known as:
Legacy technologies
, Legacy technology
, Legacy
Expand
In computing, a legacy system is an old method, technology, computer system, or application program, "of, relating to, or being a previous or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Backward compatibility
Business logic
Cloud computing
Compositing window manager
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Legacy Application Migration to the Cloud: Practicability and Methodology
Q. Vu
,
Rasool Asal
IEEE Eighth World Congress on Services
2012
Corpus ID: 11747723
Cloud computing technology has become popular of late due to several advantages it has compared to traditional computing models…
Expand
2010
2010
A Model of Cloud Based Application Environment for Software Testing
T. Vengattaraman
,
D. Ponnurangam
,
R. Baskaran
arXiv.org
2010
Corpus ID: 11219135
Cloud computing is an emerging platform of service computing designed for swift and dynamic delivery of assured computing…
Expand
2009
2009
Ontologies and Software Engineering
D. Gašević
,
N. Kaviani
,
Milan Milanovic
Handbook on Ontologies
2009
Corpus ID: 206738126
The chapter analyzes the state of the art in the use of ontologies for various software engineering tasks. The chapter starts…
Expand
2009
2009
Towards hierarchical scheduling in AUTOSAR
M. Åsberg
,
M. Behnam
,
Farhang Nemati
,
Thomas Nolte
IEEE Conference on Emerging Technologies and…
2009
Corpus ID: 1912816
AUTOSAR is a partnership between automotive manufactures and suppliers. It aims at standardizing the automotive software…
Expand
Review
2007
Review
2007
Models for Parallel Computing : Review and Perspectives
C. Kessler
,
J. Keller
2007
Corpus ID: 15463555
As parallelism on different levels becomes ubiquitous in today's computers, it seems worthwhile to provide a review of the wealth…
Expand
Highly Cited
2005
Highly Cited
2005
A cooperative MAC protocol for wireless local area networks
Pei Liu
,
Zhifeng Tao
,
S. Panwar
IEEE International Conference on Communications…
2005
Corpus ID: 887530
In this paper, a novel idea of user cooperation in wireless networks has been exploited to improve the performance of the IEEE…
Expand
Review
2005
Review
2005
Concept Lattices in Software Analysis
G. Snelting
Formal Concept Analysis
2005
Corpus ID: 18305626
About ten years ago, the first serious applications of concept lattices in software analysis were published. Today, a wide range…
Expand
Highly Cited
2004
Highly Cited
2004
Design and Evaluation of an Automated Aspect Mining Tool
D. Shepherd
,
Emily Hill
,
L. Pollock
Software Engineering Research and Practice
2004
Corpus ID: 17402049
Also presented at the 2005 Mid-Atlantic Student Workshop on Programming Languages and Systems (MASPLAS) in April 2005.
Review
2004
Review
2004
Role-based access control system for Web services
Xu Feng
,
Guoyan Lin
,
Huang Hao
,
Xie Li
The Fourth International Conference onComputer…
2004
Corpus ID: 14189262
This paper first briefly reviews the state of the security technology research and access control in the Web services environment…
Expand
2000
2000
Signal and Image Processing
2000
Corpus ID: 17978020
In this chapter, we will summarize some technologies about image processing related to biometrics. Digital image processing will…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE