Static analysis of dynamic database usage in java systems
Understanding the links between application programs and their database is useful in
various contexts such as migrating information systems towards a new database platform …
various contexts such as migrating information systems towards a new database platform …
On the application of model-driven engineering in data reengineering
FJB Ruiz, JG Molina, OD García - Information Systems, 2017 - Elsevier
Abstract Model-Driven Engineering (MDE) emphasizes the systematic use of models to
improve software productivity and some aspects of the software quality such as …
improve software productivity and some aspects of the software quality such as …
Where was this SQL query executed? a static concept location approach
Concept location in software engineering is the process of identifying where a specific
concept is implemented in the source code of a software system. It is a very common task …
concept is implemented in the source code of a software system. It is a very common task …
Managing technical debt in database schemas of critical software
The metaphor of technical debt (TD) has been used to characterize and quantify issues
arising from software evolution and maintenance actions taken to modify the functionality or …
arising from software evolution and maintenance actions taken to modify the functionality or …
Schema evolution and foreign keys: a study on usage, heartbeat of change and relationship of foreign keys to table activity
In this paper, we study the evolution of foreign keys in the context of schema evolution for
relational databases. Specifically, we study the schema histories of a six free, open-source …
relational databases. Specifically, we study the schema histories of a six free, open-source …
[PDF][PDF] Foreign Key Constraint Identification in Relational Databases.
For relational learning, it is important to know the relationships between the tables. In
relational databases, the relationships can be described with foreign key constraints …
relational databases, the relationships can be described with foreign key constraints …
Automatically detecting integrity violations in database-centric applications
Database-centric applications (DCAs) are widely used by many companies and
organizations to perform various control and analytical tasks using large databases. Real …
organizations to perform various control and analytical tasks using large databases. Real …
Adaptive peer to peer resource discovery in grid computing based on reinforcement learning
Grid computing provides a distributed computing environment which supports high
performance and data intensive applications by enabling the sharing and selecting various …
performance and data intensive applications by enabling the sharing and selecting various …
Analyzing the evolution of database usage in data-intensive software systems
The August 2010 IEEE Computer column [1] reported on four important challenges that
developers of evolving data-intensive software systems (DISS) are confronted with. By data …
developers of evolving data-intensive software systems (DISS) are confronted with. By data …
[PDF][PDF] Defining Referential Integrity Constraints in Graph-oriented Datastores.
T Masson, R Ravet, FJB Ruiz, S Serbout… - …, 2020 - souhaila-serbout.me
Nowadays, the volume of data manipulated by our information systems is growing so rapidly
that they cannot be efficiently managed and exploited only by means of standard relational …
that they cannot be efficiently managed and exploited only by means of standard relational …