Profiling relational data: a survey

Z Abedjan, L Golab, F Naumann - The VLDB Journal, 2015 - Springer
Profiling data to determine metadata about a given dataset is an important and frequent
activity of any IT professional and researcher and is necessary for various use-cases. It …

[HTML][HTML] Understanding database schema evolution: A case study

A Cleve, M Gobert, L Meurice, J Maes… - Science of Computer …, 2015 - Elsevier
Database reverse engineering (DRE) has traditionally been carried out by considering three
main information sources:(1) the database schema,(2) the stored data, and (3) the …

Extracting the extended entity-relationship model from a legacy relational database

R Alhajj - Information systems, 2003 - Elsevier
The maintenance of an existing database depends on the depth of understanding of its
characteristics. Such an understanding is easily lost when the developers disperse. The …

Database reverse engineering

JL Hainaut, J Henrard, D Roland, JM Hick… - … of Research on …, 2009 - igi-global.com
Database reverse engineering consists of recovering the abstract descriptions of files and
databases of legacy information systems. A legacy information system can be defined as a …

Towards the reverse engineering of renormalized relational databases

JM Petit, F Toumani, JF Boulicaut… - Proceedings of the …, 1996 - ieeexplore.ieee.org
The paper describes a method to cope with denormalized relational schemas in a database
reverse engineering process. We propose two main steps to improve the understanding of …

How do developers document database usages in source code?(n)

M Linares-Vásquez, B Li, C Vendome… - 2015 30th IEEE/ACM …, 2015 - ieeexplore.ieee.org
Database-centric applications (DCAs) usually contain a large number of tables, attributes,
and constraints describing the underlying data model. Understanding how database tables …

Database reverse engineering: From requirements to CARE tools

JL Hainaut, V Englebert, J Henrard, JM Hick… - Automated Software …, 1996 - Springer
This paper analyzes the requirements that CASE tools should meet for effective database
reverse engineering (DBRE), and proposes a general architecture for data-centered …

Wrapper-based evolution of legacy information systems

P Thiran, JL Hainaut, GJ Houben… - ACM Transactions on …, 2006 - dl.acm.org
System evolution most often implies the integration of legacy components, such as
databases, with newly developed ones, leading to mixed architectures that suffer from …

Program understanding in databases reverse engineering

J Henrard, V Englebert, JM Hick, D Roland… - Database and Expert …, 1998 - Springer
The main argument of the paper is that database understanding (or reverse engineering)
requires sophisticated program understanding techniques, and conversely. Database …

Dynamic program analysis for database reverse engineering

A Cleve, N Noughi, JL Hainaut - International Summer School on …, 2011 - Springer
The maintenance and evolution of data-intensive systems should ideally rely on a complete
and accurate database documentation. Unfortunately, this documentation is often missing …