DocumentCode
2695778
Title
Selection of reverse engineering methods for relational databases
Author
Pedro-de-Jesus, Lurdes ; Sousa, Pedro
Author_Institution
Dep. de Engenharia Inf., Inst. Superior Tecnico, Lisbon, Portugal
fYear
1999
fDate
1999
Firstpage
194
Lastpage
197
Abstract
The problem of choosing a method for the reverse engineering of relational database systems is not trivial. Methods have different input requirements, and each legacy system has its particular characteristics that restrict information availability. In this paper, we propose a classification framework based on the method´s input requirements, namely: attribute semantics, attribute name consistency, data instances, applications source code, candidate keys, 3rd normal form (3NF), inclusion dependencies and human input. We present a short description of seven reverse engineering methods and analyse the applicability of each method to existing database systems, as well as the possibility of applying different methods to different parts of the system
Keywords
relational databases; reverse engineering; 3rd normal form; applications source code; attribute name consistency; attribute semantics; candidate keys; classification framework; data instances; human input; inclusion dependencies; information availability; input requirements; legacy system characteristics; relational databases; reverse engineering method selection; Computer bugs; Data analysis; Data mining; Electrical capacitance tomography; Programming profession; Relational databases; Reverse engineering;
fLanguage
English
Publisher
ieee
Conference_Titel
Software Maintenance and Reengineering, 1999. Proceedings of the Third European Conference on
Conference_Location
Amsterdam
Print_ISBN
0-7695-0090-0
Type
conf
DOI
10.1109/CSMR.1999.756699
Filename
756699
Link To Document