• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Shi Xuelin, Zhang Zhaoqing, and Wu Chenggang. Mapping Cobol Data to Java Type System with Functional Equivalence[J]. Journal of Computer Research and Development, 2006, 43(2): 336-342.
Citation: Shi Xuelin, Zhang Zhaoqing, and Wu Chenggang. Mapping Cobol Data to Java Type System with Functional Equivalence[J]. Journal of Computer Research and Development, 2006, 43(2): 336-342.

Mapping Cobol Data to Java Type System with Functional Equivalence

More Information
  • Published Date: February 14, 2006
  • Migrating the Cobol code to a new platform such as Java is an effective method to alleviate the burden of maintenance of the Cobol code. How to migrate Cobol data to the new platform is one of the basic problems to be solved. Most research work directly casts Cobol data to primitive data type such as int or float in modern programming language. However, this simple data mapping method doesn't keep the Cobol semantic and thus makes the translated code run inconsistently with the original Cobol code. In this paper, a pure Java encapsulating method is presented using the data modeling technology to map the Cobol data to Java type system with functional equivalence. Based on this method, a Cobol2Java translator is implemented. The translator is also applied to a real business system of about 4 million lines of Cobol code. Test results show that this tool could translate the Cobol system to Java successfully and without any human interaction.
  • Related Articles

    [1]Zhang Xiaoli, Chen Gang, Ma Yingying, Hu Ping. Ionia: A Typed Learning Framework and Code Generation Tool Based on Coq[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440672
    [2]Niu Gen, Zhang Fuxin. Code Cache Optimization Schemes Based on Fine-Grained State Label[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202330856
    [3]Ding Xue’er, Niu Jun, Zhang Kaile, Mao Xinyi. Code Search Method Based on the Reachability Analysis of Petri Nets[J]. Journal of Computer Research and Development, 2022, 59(1): 236-250. DOI: 10.7544/issn1000-1239.20200586
    [4]Yang Yaolin, He Hongjie, Chen Fan, Yuan Changqi. Reversible Data Hiding of Image Encryption Based on Prediction Error Adaptive Coding[J]. Journal of Computer Research and Development, 2021, 58(6): 1340-1350. DOI: 10.7544/issn1000-1239.2021.20200172
    [5]Geng Pu, Zhu Yuefei. A Code Encrypt Technique Based on Branch Condition Obfuscation[J]. Journal of Computer Research and Development, 2019, 56(10): 2183-2192. DOI: 10.7544/issn1000-1239.2019.20190368
    [6]Wang Ye, Li Qingbao, Zeng Guangyu, Chen Zhifeng. A Code Reuse Attack Protection Technique Based on Code Anti-Leakage[J]. Journal of Computer Research and Development, 2016, 53(10): 2277-2287. DOI: 10.7544/issn1000-1239.2016.20160423
    [7]LinZeqi, ZhaoJunfeng, XieBing. A Graph Database Based Method for Parsing and Searching Code Structure[J]. Journal of Computer Research and Development, 2016, 53(3): 531-540. DOI: 10.7544/issn1000-1239.2016.20148325
    [8]Chen Zhe, Wang Zhi, Wang Xiaochu, Jia Chunfu. Using Code Mobility to Obfuscate Control Flow in Binary Codes[J]. Journal of Computer Research and Development, 2015, 52(8): 1902-1909. DOI: 10.7544/issn1000-1239.2015.20140607
    [9]Su Jindian, Yu Shanshan. Bialgebraic Structures for Abstract Data Types and Their Computations[J]. Journal of Computer Research and Development, 2012, 49(8): 1787-1803.
    [10]Gao Jun, Yang Dongqing, Wang Tengjiao, and Tang Shiwei. Incremental Maintenance of Continuous Query Evaluator over XML Data Stream[J]. Journal of Computer Research and Development, 2005, 42(5): 771-776.

Catalog

    Article views (1193) PDF downloads (673) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return