Profiling relational data: a survey
Profiling data to determine metadata about a given dataset is an important and frequent
activity of any IT professional and researcher and is necessary for various use-cases. It …
activity of any IT professional and researcher and is necessary for various use-cases. It …
[HTML][HTML] Understanding database schema evolution: A case study
Database reverse engineering (DRE) has traditionally been carried out by considering three
main information sources:(1) the database schema,(2) the stored data, and (3) the …
main information sources:(1) the database schema,(2) the stored data, and (3) the …
Extracting the extended entity-relationship model from a legacy relational database
R Alhajj - Information systems, 2003 - Elsevier
The maintenance of an existing database depends on the depth of understanding of its
characteristics. Such an understanding is easily lost when the developers disperse. The …
characteristics. Such an understanding is easily lost when the developers disperse. The …
Database reverse engineering
JL Hainaut, J Henrard, D Roland, JM Hick… - … of Research on …, 2009 - igi-global.com
Database reverse engineering consists of recovering the abstract descriptions of files and
databases of legacy information systems. A legacy information system can be defined as a …
databases of legacy information systems. A legacy information system can be defined as a …
Towards the reverse engineering of renormalized relational databases
The paper describes a method to cope with denormalized relational schemas in a database
reverse engineering process. We propose two main steps to improve the understanding of …
reverse engineering process. We propose two main steps to improve the understanding of …
How do developers document database usages in source code?(n)
Database-centric applications (DCAs) usually contain a large number of tables, attributes,
and constraints describing the underlying data model. Understanding how database tables …
and constraints describing the underlying data model. Understanding how database tables …
Database reverse engineering: From requirements to CARE tools
JL Hainaut, V Englebert, J Henrard, JM Hick… - Automated Software …, 1996 - Springer
This paper analyzes the requirements that CASE tools should meet for effective database
reverse engineering (DBRE), and proposes a general architecture for data-centered …
reverse engineering (DBRE), and proposes a general architecture for data-centered …
Wrapper-based evolution of legacy information systems
System evolution most often implies the integration of legacy components, such as
databases, with newly developed ones, leading to mixed architectures that suffer from …
databases, with newly developed ones, leading to mixed architectures that suffer from …
Program understanding in databases reverse engineering
J Henrard, V Englebert, JM Hick, D Roland… - Database and Expert …, 1998 - Springer
The main argument of the paper is that database understanding (or reverse engineering)
requires sophisticated program understanding techniques, and conversely. Database …
requires sophisticated program understanding techniques, and conversely. Database …
Dynamic program analysis for database reverse engineering
A Cleve, N Noughi, JL Hainaut - International Summer School on …, 2011 - Springer
The maintenance and evolution of data-intensive systems should ideally rely on a complete
and accurate database documentation. Unfortunately, this documentation is often missing …
and accurate database documentation. Unfortunately, this documentation is often missing …