Static analysis of dynamic database usage in java systems

L Meurice, C Nagy, A Cleve - … , CAiSE 2016, Ljubljana, Slovenia, June 13 …, 2016 - Springer
Understanding the links between application programs and their database is useful in
various contexts such as migrating information systems towards a new database platform …

On the application of model-driven engineering in data reengineering

FJB Ruiz, JG Molina, OD García - Information Systems, 2017 - Elsevier
Abstract Model-Driven Engineering (MDE) emphasizes the systematic use of models to
improve software productivity and some aspects of the software quality such as …

Where was this SQL query executed? a static concept location approach

C Nagy, L Meurice, A Cleve - 2015 IEEE 22nd International …, 2015 - ieeexplore.ieee.org
Concept location in software engineering is the process of identifying where a specific
concept is implemented in the source code of a software system. It is a very common task …

Managing technical debt in database schemas of critical software

JH Weber, A Cleve, L Meurice… - 2014 Sixth international …, 2014 - ieeexplore.ieee.org
The metaphor of technical debt (TD) has been used to characterize and quantify issues
arising from software evolution and maintenance actions taken to modify the functionality or …

Schema evolution and foreign keys: a study on usage, heartbeat of change and relationship of foreign keys to table activity

P Vassiliadis, MR Kolozoff, M Zerva, AV Zarras - Computing, 2019 - Springer
In this paper, we study the evolution of foreign keys in the context of schema evolution for
relational databases. Specifically, we study the schema histories of a six free, open-source …

[PDF][PDF] Foreign Key Constraint Identification in Relational Databases.

J Motl, P Kordík - ITAT, 2017 - ceur-ws.org
For relational learning, it is important to know the relationships between the tables. In
relational databases, the relationships can be described with foreign key constraints …

Automatically detecting integrity violations in database-centric applications

B Li, D Poshyvanyk, M Grechanik - 2017 IEEE/ACM 25th …, 2017 - ieeexplore.ieee.org
Database-centric applications (DCAs) are widely used by many companies and
organizations to perform various control and analytical tasks using large databases. Real …

Adaptive peer to peer resource discovery in grid computing based on reinforcement learning

MAJ Jamali, Y Sani - 2011 12th ACIS International Conference …, 2011 - ieeexplore.ieee.org
Grid computing provides a distributed computing environment which supports high
performance and data intensive applications by enabling the sharing and selecting various …

Analyzing the evolution of database usage in data-intensive software systems

L Meurice, M Goeminne, T Mens, C Nagy… - … : 10 Years of …, 2016 - books.google.com
The August 2010 IEEE Computer column [1] reported on four important challenges that
developers of evolving data-intensive software systems (DISS) are confronted with. By data …

[PDF][PDF] Defining Referential Integrity Constraints in Graph-oriented Datastores.

T Masson, R Ravet, FJB Ruiz, S Serbout… - …, 2020 - souhaila-serbout.me
Nowadays, the volume of data manipulated by our information systems is growing so rapidly
that they cannot be efficiently managed and exploited only by means of standard relational …