-
1
-
-
0025245266
-
Reverse engineering and design recovery:A taxonomy
-
Chikofsky, E.J., Cross, J.H.: Reverse engineering and design recovery: A taxonomy. IEEE Software 7(1), 13-17 (1990)
-
(1990)
IEEE Software
, vol.7
, Issue.1
, pp. 13-17
-
-
Chikofsky, E.J.1
Cross, J.H.2
-
2
-
-
0029232101
-
Observed idiosyncracies of relational database designs
-
IEEE Computer Society, Washington, DC
-
Blaha, M.R., Premerlani, W.J.: Observed idiosyncracies of relational database designs. In: Proc. of the Second Working Conference on Reverse Engineering (WCRE 1995), p. 116. IEEE Computer Society, Washington, DC (1995)
-
(1995)
Proc. of the Second Working Conference on Reverse Engineering (WCRE 1995)
, pp. 116
-
-
Blaha, M.R.1
Premerlani, W.J.2
-
3
-
-
84924369868
-
Using queries to improve database reverse engineering
-
Loucopoulos, P. (ed.) Springer, Heidelberg
-
Petit, J.M., Kouloumdjian, J., Boulicaut, J.F., Toumani, F.: Using Queries to Improve Database Reverse Engineering. In: Loucopoulos, P. (ed.) ER 1994. LNCS, vol. 881, pp. 369-386. Springer, Heidelberg (1994)
-
(1994)
ER 1994. LNCS
, vol.881
, pp. 369-386
-
-
Petit, J.M.1
Kouloumdjian, J.2
Boulicaut, J.F.3
Toumani, F.4
-
5
-
-
0034775431
-
Assisting the comprehension of legacy transactions
-
IEEE Computer Society, Washington, DC
-
Embury, S.M., Shao, J.: Assisting the comprehension of legacy transactions. In: Proc. of the 8th Working Conference on Reverse Engineering (WCRE 2001), p. 345. IEEE Computer Society, Washington, DC (2001)
-
(2001)
Proc. of the 8th Working Conference on Reverse Engineering (WCRE 2001)
, pp. 345
-
-
Embury, S.M.1
Shao, J.2
-
6
-
-
18044390853
-
Program slicing in the presence of a database state
-
IEEE Computer Society, Washington, DC
-
Willmor, D., Embury, S.M., Shao, J.: Program slicing in the presence of a database state. In: ICSM 2004: Proceedings of the 20th IEEE International Conference on Software Maintenance, pp. 448-452. IEEE Computer Society, Washington, DC (2004)
-
(2004)
ICSM 2004: Proceedings of the 20th IEEE International Conference on Software Maintenance
, pp. 448-452
-
-
Willmor, D.1
Embury, S.M.2
Shao, J.3
-
7
-
-
34948835684
-
Data reverse engineering using system dependency graphs
-
IEEE Computer Society, Washington, DC
-
Cleve, A., Henrard, J., Hainaut, J.L.: Data reverse engineering using system dependency graphs. In: Proc. of the 13th Working Conference on Reverse Engineering (WCRE 2006), pp. 157-166. IEEE Computer Society, Washington, DC (2006)
-
(2006)
Proc. of the 13th Working Conference on Reverse Engineering (WCRE 2006)
, pp. 157-166
-
-
Cleve, A.1
Henrard, J.2
Hainaut, J.L.3
-
9
-
-
57749199308
-
Dynamic analysis of sQL statements for data-intensive applications reverse engineering
-
IEEE Computer Society
-
Cleve, A., Hainaut, J.L.: Dynamic analysis of SQL statements for data-intensive applications reverse engineering. In: Proc. of the 15th Working Conference on Reverse Engineering, pp. 192-196. IEEE Computer Society (2008)
-
(2008)
Proc. of the 15th Working Conference on Reverse Engineering
, pp. 192-196
-
-
Cleve, A.1
Hainaut, J.L.2
-
10
-
-
84872283781
-
Database semantics recovery through analysis of dynamic sQL statements
-
Cleve, A., Meurisse, J.R., Hainaut, J.L.: Database semantics recovery through analysis of dynamic SQL statements. Journal on Data Semantics 15, 130-157 (2011)
-
(2011)
Journal on Data Semantics
, vol.15
, pp. 130-157
-
-
Cleve, A.1
Meurisse, J.R.2
Hainaut, J.L.3
-
13
-
-
82955230066
-
An overview of aspectj
-
Lee, S.H. (ed.) Springer, Heidelberg
-
Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An Overview of AspectJ. In: Lee, S.H. (ed.) ECOOP 2001. LNCS, vol. 2072, pp. 327-353. Springer, Heidelberg (2001)
-
(2001)
ECOOP 2001. LNCS
, vol.2072
, pp. 327-353
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
Griswold, W.G.6
-
14
-
-
0008366509
-
Relational database reverse engineering:A method based on query analysis
-
Petit, J.M., Toumani, F., Kouloumdjian, J.: Relational database reverse engineering: A method based on query analysis. Int. J. Cooperative Inf. Syst. 4(2-3), 287-316 (1995)
-
(1995)
Int. J. Cooperative Inf. Syst
, vol.4
, Issue.2-3
, pp. 287-316
-
-
Petit, J.M.1
Toumani, F.2
Kouloumdjian, J.3
-
15
-
-
84956858187
-
Discovery of "interesting" data dependencies from a workload of sql statements
-
Zytkow, J.M., Rauch, J. (eds.) Springer, Heidelberg
-
Lopes, S., Petit, J.M., Toumani, F.: Discovery of "Interesting" Data Dependencies from a Workload of SQL Statements. In: Zytkow, J.M., Rauch, J. (eds.) PKDD 1999. LNCS (LNAI), vol. 1704, pp. 430-435. Springer, Heidelberg (1999)
-
(1999)
PKDD 1999. LNCS (LNAI)
, vol.1704
, pp. 430-435
-
-
Lopes, S.1
Petit, J.M.2
Toumani, F.3
-
16
-
-
0036649910
-
Exploring into programs for the recovery of data dependencies designed
-
Tan, H.B.K., Ling, T.W., Goh, C.H.: Exploring into programs for the recovery of data dependencies designed. IEEE Trans. Knowl. Data Eng. 14(4), 825-835 (2002)
-
(2002)
IEEE Trans. Knowl. Data Eng
, vol.14
, Issue.4
, pp. 825-835
-
-
Tan, H.B.K.1
Ling, T.W.2
Goh, C.H.3
-
17
-
-
0345764968
-
Automated elicitation of inclusion dependencies from the source codefor database transactions
-
Tan, H.B.K., Zhao, Y.: Automated elicitation of inclusion dependencies from the source codefor database transactions. Journal of Software Maintenance 15(6), 379-392 (2003)
-
(2003)
Journal of Software Maintenance
, vol.15
, Issue.6
, pp. 379-392
-
-
Tan, H.B.K.1
Zhao, Y.2
-
18
-
-
0014797273
-
A relational model of data for large shared data banks
-
Codd, E.F.: A relational model of data for large shared data banks. Commun. ACM 13(6), 377-387 (1970)
-
(1970)
Commun. ACM
, vol.13
, Issue.6
, pp. 377-387
-
-
Codd, E.F.1
-
20
-
-
0031354777
-
Software unit test coverage and adequacy
-
Zhu, H., Hall, P.A.V.,May, J.H.R.: Software unit test coverage and adequacy. ACM Comput. Surv. 29, 366-427 (1997)
-
(1997)
ACM Comput. Surv
, vol.29
, pp. 366-427
-
-
Zhu, H.1
Hall, P.A.V.2
May, J.H.R.3
-
21
-
-
1542286887
-
A family of test adequacy criteria for database-driven applications
-
ACM, New York
-
Kapfhammer, G.M., Soffa, M.L.: A family of test adequacy criteria for database-driven applications. In: Proc. of the 9th European Software Engineering Conference Held Jointly with 11th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC/FSE-11, pp. 98-107 ACM, New York (2003)
-
(2003)
Proc. of the 9th European Software Engineering Conference Held Jointly with 11th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC/FSE-11
, pp. 98-107
-
-
Kapfhammer, G.M.1
Soffa, M.L.2
-
22
-
-
0021124390
-
Mapping uninterpreted schemes into entity-relationship diagrams:Two applications to conceptual schema design
-
Casanova, M.A., De Sa, J.E.A.:Mapping uninterpreted schemes into entity-relationship diagrams: two applications to conceptual schema design. IBM J. Res. Dev. 28(1), 82-94 (1984)
-
(1984)
IBM J. Res. Dev
, vol.28
, Issue.1
, pp. 82-94
-
-
Casanova, M.A.1
De Sa, J.E.A.2
-
23
-
-
0022189485
-
A methodology for translating a conventional file system into an entity-relationship model
-
IEEE Computer Society, Washington, DC
-
Davis, K.H., Arora, A.K.: A methodology for translating a conventional file system into an entity-relationship model. In: Proc. of the Fourth International Conference on Entity-Relationship Approach, pp. 148-159. IEEE Computer Society, Washington, DC (1985)
-
(1985)
Proc. of the Fourth International Conference on Entity-Relationship Approach
, pp. 148-159
-
-
Davis, K.H.1
Arora, A.K.2
-
25
-
-
0028194753
-
A method for transforming relational schemas into conceptual schemas
-
IEEE Computer Society, Washington, DC
-
Johannesson, P.: A method for transforming relational schemas into conceptual schemas. In: Proc. of the Tenth International Conference on Data Engineering (ICDE 2004), pp. 190-201. IEEE Computer Society, Washington, DC (1994)
-
(1994)
Proc. of the Tenth International Conference on Data Engineering (ICDE 2004)
, pp. 190-201
-
-
Johannesson, P.1
-
26
-
-
0030169147
-
Database reverse engineering:From requirements to care tools
-
Hainaut, J.L., Englebert, V., Henrard, J., Hick, J.M., Roland, D.: Database reverse engineering: From requirements to care tools. Automated Software Engineering 3, 9-45 (1996)
-
(1996)
Automated Software Engineering
, vol.3
, pp. 9-45
-
-
Hainaut, J.L.1
Englebert, V.2
Henrard, J.3
Hick, J.M.4
Roland, D.5
-
27
-
-
0034500543
-
Data reverse engineering:A historical survey
-
IEEE Computer Society, Washington, DC
-
Davis, K.H., Aiken, P.H.: Data reverse engineering: A historical survey. In: Proc. of the SeventhWorking Conference on Reverse Engineering (WCRE 2000), p. 70. IEEE Computer Society, Washington, DC (2000)
-
(2000)
Proc. of the SeventhWorking Conference on Reverse Engineering (WCRE 2000)
, pp. 70
-
-
Davis, K.H.1
Aiken, P.H.2
-
28
-
-
85027520641
-
Contribution to a theory of database reverse engineering
-
IEEE Computer Society Press, Baltimore
-
Hainaut, J.L., Chandelon, M., Tonneau, C., Joris, M.: Contribution to a theory of database reverse engineering. In: Proc. of the IEEEWorking Conf. on Reverse Engineering, pp. 161-170. IEEE Computer Society Press, Baltimore (1993)
-
(1993)
Proc. of the IEEEWorking Conf. on Reverse Engineering
, pp. 161-170
-
-
Hainaut, J.L.1
Chandelon, M.2
Tonneau, C.3
Joris, M.4
-
29
-
-
0010535379
-
-
Loucopoulos, P. (ed.) Springer, HeidelbergER 1994. LNCS
-
Signore, O., Loffredo, M., Gregori, M., Cima, M.: Reconstruction of ER Schema from Database Applications: A Cognitive Approach. In: Loucopoulos, P. (ed.) ER 1994. LNCS, vol. 881, pp. 387-402. Springer, Heidelberg (1994)
-
(1994)
Reconstruction of eR schema from database applications:A cognitive approach
, vol.881
, pp. 387-402
-
-
Signore, O.1
Loffredo, M.2
Gregori, M.3
Cima, M.4
-
30
-
-
0032636826
-
Acquisition of entity relationship models for maintenance-dealing with data intensive programs in a transformation system
-
Yang, H., Chu,W.C.: Acquisition of entity relationship models for maintenance-dealing with data intensive programs in a transformation system. J. Inf. Sci. Eng. 15(2), 173-198 (1999)
-
(1999)
J. Inf. Sci. Eng
, vol.15
, Issue.2
, pp. 173-198
-
-
Yang, H.1
Chu, W.C.2
-
31
-
-
84931830530
-
Querying data-intensive programs for data design
-
Dittrich, K.R., Geppert, A., Norrie, M. (eds.) Springer, Heidelberg
-
Shao, J., Liu, X., Fu, G., Embury, S.M., Gray, W.A.: Querying Data-Intensive Programs for Data Design. In: Dittrich, K.R., Geppert, A., Norrie, M. (eds.) CAiSE 2001. LNCS, vol. 2068, pp. 203-218. Springer, Heidelberg (2001)
-
(2001)
CAiSE 2001. LNCS
, vol.2068
, pp. 203-218
-
-
Shao, J.1
Liu, X.2
Fu, G.3
Embury, S.M.4
Gray, W.A.5
-
32
-
-
0025471358
-
Identifying extended entity-relationship object structures in relational schemas
-
Markowitz, V.M.,Makowsky, J.A.: Identifying extended entity-relationship object structures in relational schemas. IEEE Trans. Softw. Eng. 16(8), 777-790 (1990)
-
(1990)
IEEE Trans. Softw. Eng
, vol.16
, Issue.8
, pp. 777-790
-
-
Markowitz, V.M.1
Makowsky, J.A.2
-
33
-
-
84901806268
-
An approach for reverse engineering of relational databases
-
Premerlani, W.J., Blaha, M.R.: An approach for reverse engineering of relational databases. Commun. ACM 37(5), 42-49 (1994)
-
(1994)
Commun. ACM
, vol.37
, Issue.5
, pp. 42-49
-
-
Premerlani, W.J.1
Blaha, M.R.2
-
34
-
-
0028397005
-
Reverse engineering of relational databases:Extraction of an eer model from a relational database
-
Chiang, R.H.L., Barron, T.M., Storey, V.C.: Reverse engineering of relational databases: extraction of an eer model from a relational database. Data Knowl. Eng. 12(2), 107-142 (1994)
-
(1994)
Data Knowl. Eng
, vol.12
, Issue.2
, pp. 107-142
-
-
Chiang, R.H.L.1
Barron, T.M.2
Storey, V.C.3
-
35
-
-
0036498516
-
Discovering interesting inclusion dependencies:Application to logical database tuning
-
Lopes, S., Petit, J.M., Toumani, F.: Discovering interesting inclusion dependencies: Application to logical database tuning. Inf. Syst. 27(1), 1-19 (2002)
-
(2002)
Inf. Syst
, vol.27
, Issue.1
, pp. 1-19
-
-
Lopes, S.1
Petit, J.M.2
Toumani, F.3
-
36
-
-
38749119034
-
Mining functional dependencies from data
-
Yao, H., Hamilton, H.J.: Mining functional dependencies from data. Data Min. Knowl. Discov. 16(2), 197-219 (2008)
-
(2008)
Data Min. Knowl. Discov
, vol.16
, Issue.2
, pp. 197-219
-
-
Yao, H.1
Hamilton, H.J.2
-
38
-
-
84976856183
-
A form-based approach for database analysisand design
-
Choobineh, J., Mannino, M.V., Tseng, V.P.: A form-based approach for database analysisand design. Communications of the ACM 35(2), 108-120 (1992)
-
(1992)
Communications of the ACM
, vol.35
, Issue.2
, pp. 108-120
-
-
Choobineh, J.1
Mannino, M.V.2
Tseng, V.P.3
-
39
-
-
33845232307
-
The user interface is the conceptual model
-
Embley, D.W., Olivé, A., Ram, S. (eds.) Springer, Heidelberg
-
Terwilliger, J.F., Delcambre, L.M.L., Logan, J.: The User Interface Is the Conceptual Model. In: Embley, D.W., Olivé, A., Ram, S. (eds.) ER 2006. LNCS, vol. 4215, pp. 424-436. Springer, Heidelberg (2006)
-
(2006)
ER 2006. LNCS
, vol.4215
, pp. 424-436
-
-
Terwilliger, J.F.1
Delcambre, L.M.L.2
Logan, J.3
-
40
-
-
79956299316
-
Reverse engineering user interfaces for interactive database conceptual analysis
-
Pernici, B. (ed.) Springer, Heidelberg
-
Ramdoyal, R., Cleve, A., Hainaut, J.-L.: Reverse Engineering User Interfaces for Interactive Database Conceptual Analysis. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol. 6051, pp. 332-347. Springer, Heidelberg (2010)
-
(2010)
CAiSE 2010. LNCS
, vol.6051
, pp. 332-347
-
-
Ramdoyal, R.1
Cleve, A.2
Hainaut, J.-L.3
-
41
-
-
0034515939
-
Recovering class diagrams from dataintensive legacy systems
-
IEEE Computer Society
-
Di Lucca, G.A., Fasolino, A.R., de Carlini, U.: Recovering class diagrams from dataintensive legacy systems. In: Proc. of the 16th IEEE International Conference on Software Maintenance (ICSM 2000), p. 52. IEEE Computer Society (2000)
-
(2000)
Proc. of the 16th IEEE International Conference on Software Maintenance (ICSM 2000)
, pp. 52
-
-
Di Lucca, G.A.1
Fasolino, A.R.2
De Carlini, U.3
-
43
-
-
47749089298
-
Quality assessment for embedded sql
-
IEEE Computer Society
-
van den Brink, H., van der Leek, R., Visser, J.: Quality assessment for embedded sql. In: Proc. of the 7th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007), pp. 163-170. IEEE Computer Society (2007)
-
(2007)
Proc. of the 7th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)
, pp. 163-170
-
-
Van Den Brink, H.1
Van Der Leek, R.2
Visser, J.3
-
44
-
-
37249052689
-
Applying static analysis for automated extraction of database interactions in web applications
-
Ngo, M.N., Tan, H.B.K.: Applying static analysis for automated extraction of database interactions in web applications. Inf. Softw. Technol. 50(3), 160-175 (2008)
-
(2008)
Inf. Softw. Technol
, vol.50
, Issue.3
, pp. 160-175
-
-
Ngo, M.N.1
Tan, H.B.K.2
-
45
-
-
73449109470
-
A systematic surveyof program comprehension through dynamic analysis
-
Cornelissen, B., Zaidman, A., van Deursen, A., Moonen, L., Koschke, R.: A systematic surveyof program comprehension through dynamic analysis. IEEE Trans. Software Eng. 35(5), 684-702 (2009)
-
(2009)
IEEE Trans. Software Eng
, vol.35
, Issue.5
, pp. 684-702
-
-
Cornelissen, B.1
Zaidman, A.2
Van Deursen, A.3
Moonen, L.4
Koschke, R.5
-
46
-
-
0242276260
-
Efficient and transparent instrumentation of application componentsusing an aspect-oriented approach
-
Brunner, M., Keller, A. (eds.) Springer, Heidelberg
-
Debusmann, M., Geihs, K.: Efficient and Transparent Instrumentation of Application ComponentsUsing an Aspect-Oriented Approach. In: Brunner, M., Keller, A. (eds.) DSOM 2003. LNCS, vol. 2867, pp. 209-220. Springer, Heidelberg (2003)
-
(2003)
DSOM 2003. LNCS
, vol.2867
, pp. 209-220
-
-
Debusmann, M.1
Geihs, K.2
-
48
-
-
73449121426
-
Domain feature model recovery from multiple applications using data access semantics and formal concept analysis
-
IEEE Computer Society
-
Yang, Y., Peng, X., Zhao, W.: Domain feature model recovery from multiple applications using data access semantics and formal concept analysis. In: Proc. of the 16th International Working Conference on Reverse Engineering (WCRE 2009), pp. 215-224. IEEE Computer Society (2009)
-
(2009)
Proc. of the 16th International Working Conference on Reverse Engineering (WCRE 2009)
, pp. 215-224
-
-
Yang, Y.1
Peng, X.2
Zhao, W.3
-
49
-
-
78650343238
-
WAFA:Fine-grained dynamic analysis of web applications
-
IEEE Computer Society
-
Alalfi, M., Cordy, J., Dean, T.: WAFA: Fine-grained dynamic analysis of web applications. In: Proc. of the 11th International Symposium on Web Systems Evolution (WSE 2009), pp. 41-50. IEEE Computer Society (2009)
-
(2009)
Proc. of the 11th International Symposium on Web Systems Evolution (WSE 2009)
, pp. 41-50
-
-
Alalfi, M.1
Cordy, J.2
Dean, T.3
-
50
-
-
84866000567
-
The role of implicit schema constructs in data quality
-
Cleve, A., Lemaitre, J., Hainaut, J.L., Mouchet, C., Henrard, J.: The role of implicit schema constructs in data quality. In: Proc. of the 6th InternationalWorkshop on Quality in Databases (QDB 2008), pp. 33-40 (2008)
-
(2008)
Proc. of the 6th InternationalWorkshop on Quality in Databases (QDB 2008)
, pp. 33-40
-
-
Cleve, A.1
Lemaitre, J.2
Hainaut, J.L.3
Mouchet, C.4
Henrard, J.5
-
52
-
-
34948906804
-
Insider and outsider threat-sensitive sql injection vulnerability analysis in php
-
IEEE Computer Society, Washington, DC
-
Merlo, E., Letarte, D., Antoniol, G.: Insider and outsider threat-sensitive sql injection vulnerability analysis in php. In: Proc.Working Conf. Reverse Engineering (WCRE), pp. 147-156. IEEE Computer Society, Washington, DC (2006)
-
(2006)
Proc.Working Conf. Reverse Engineering (WCRE)
, pp. 147-156
-
-
Merlo, E.1
Letarte, D.2
Antoniol, G.3
|