Projects per year
Database reverse engineering (DRE) has traditionally been carried out by considering three main information sources: (1) the database schema, (2) the stored data, and (3) the application programs. Not all of these information sources are always available, or of sufficient quality to inform the DRE process. For example, getting access to real-world data is often extremely problematic for information systems that maintain private data. In recent years, the analysis of the evolution history of software programs have gained an increasing role in reverse engineering in general, but comparatively little such research has been carried out in the context of database reverse engineering. The goal of this paper is to contribute to narrowing this gap and exploring the use of the database evolution history as an additional information source to aid database schema reverse engineering. We present a tool-supported method for analyzing the evolution history of legacy databases, and we report on a large-scale case study of reverse engineering a complex information system and curate it as a benchmark for future research efforts within the community.
- Database understanding
- Schema evolution
- Software repository mining
FingerprintDive into the research topics of 'Understanding database schema evolution: A case study'. Together they form a unique fingerprint.
- 2 Finished
Analyse empirique de la co-évolution et l'interaction sociale dans les systèmes logiciels orientés données
Cleve, A. & Mens, T.
1/07/13 → 30/06/17
Analyzing, Understanding and Supporting the Evolution of Dynamic and Heterogeneous Data-Intensive Software SystemsAuthor: Meurice, L., 22 Jun 2017
Student thesis: Doc types › Doctor of SciencesFile