ISEC 2025
Thu 20 - Sat 22 February 2025 Kurukshetra , India

Refactoring a legacy monolithic application into microservices involves discovering the current application’s architecture, refactoring it into a microservices architecture, and then restructuring the application based on the new architecture. This process is time-consuming and typically requires expert involvement. In this paper, we propose an approach that recommends candidate microservices from a given monolith, aligning them with business services for the architect. Our approach begins by recovering the architecture of the monolithic application using static analysis, then identifies clusters of cohesive application fragments through unsupervised learning. These clusters are aligned with business services as specified by a domain model. We have implemented our approach as a tool and compared its results with state-of-the-art approaches using a suite of four Java applications. The recommended clusters by our tool are highly cohesive, loosely coupled, and better aligned with domain services.

Sat 22 Feb

Displayed time zone: Chennai, Kolkata, Mumbai, New Delhi change

10:30 - 11:30
Research Papers Session 3: Distributed SystemsResearch Papers at Senate Hall
10:30
12m
Research paper
A Lightweight Hybrid CNN-Fuzzy Logic Approach for Real Time On-Device Document Classification
Research Papers
Shashank Mouli Satapathy Vellore Institute of Technology, Vishal Agrawal , Kartik Kumar Gounder Vellore Institute of Technology, Riddhi Panchal , Amith Kumar Mahale , Akila Victor Vellore Institute of Technology
10:42
12m
Research paper
Domain Aligned Microservices Decomposition
Research Papers
Jay Gandhi TCS Research, Tata Consultancy Services, Raveendra Kumar Medicherla TCS Research, Tata Consultancy Services, Ravindra Naik TCS Research, TRDDC, India
10:54
12m
Research paper
Dominant Hand detection using Base Smartphone sensors
Research Papers
11:06
12m
Research paper
Effective Resource Management through VM Allocation in Cloud Data Center
Research Papers

11:18
12m
Research paper
Worst-Case Response Time Analysis for Periodic Programs with Nested Locks
Research Papers