• DocumentCode
    2695778
  • Title

    Selection of reverse engineering methods for relational databases

  • Author

    Pedro-de-Jesus, Lurdes ; Sousa, Pedro

  • Author_Institution
    Dep. de Engenharia Inf., Inst. Superior Tecnico, Lisbon, Portugal
  • fYear
    1999
  • fDate
    1999
  • Firstpage
    194
  • Lastpage
    197
  • Abstract
    The problem of choosing a method for the reverse engineering of relational database systems is not trivial. Methods have different input requirements, and each legacy system has its particular characteristics that restrict information availability. In this paper, we propose a classification framework based on the method´s input requirements, namely: attribute semantics, attribute name consistency, data instances, applications source code, candidate keys, 3rd normal form (3NF), inclusion dependencies and human input. We present a short description of seven reverse engineering methods and analyse the applicability of each method to existing database systems, as well as the possibility of applying different methods to different parts of the system
  • Keywords
    relational databases; reverse engineering; 3rd normal form; applications source code; attribute name consistency; attribute semantics; candidate keys; classification framework; data instances; human input; inclusion dependencies; information availability; input requirements; legacy system characteristics; relational databases; reverse engineering method selection; Computer bugs; Data analysis; Data mining; Electrical capacitance tomography; Programming profession; Relational databases; Reverse engineering;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Maintenance and Reengineering, 1999. Proceedings of the Third European Conference on
  • Conference_Location
    Amsterdam
  • Print_ISBN
    0-7695-0090-0
  • Type

    conf

  • DOI
    10.1109/CSMR.1999.756699
  • Filename
    756699