메뉴 건너뛰기




Volumn 7680 LNCS, Issue , 2013, Pages 297-321

Dynamic program analysis for database reverse engineering

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84879867708     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-35992-7_8     Document Type: Conference Paper
Times cited : (10)

References (53)
  • 1
    • 0025245266 scopus 로고
    • Reverse engineering and design recovery:A taxonomy
    • Chikofsky, E.J., Cross, J.H.: Reverse engineering and design recovery: A taxonomy. IEEE Software 7(1), 13-17 (1990)
    • (1990) IEEE Software , vol.7 , Issue.1 , pp. 13-17
    • Chikofsky, E.J.1    Cross, J.H.2
  • 3
    • 84924369868 scopus 로고
    • Using queries to improve database reverse engineering
    • Loucopoulos, P. (ed.) Springer, Heidelberg
    • Petit, J.M., Kouloumdjian, J., Boulicaut, J.F., Toumani, F.: Using Queries to Improve Database Reverse Engineering. In: Loucopoulos, P. (ed.) ER 1994. LNCS, vol. 881, pp. 369-386. Springer, Heidelberg (1994)
    • (1994) ER 1994. LNCS , vol.881 , pp. 369-386
    • Petit, J.M.1    Kouloumdjian, J.2    Boulicaut, J.F.3    Toumani, F.4
  • 9
    • 57749199308 scopus 로고    scopus 로고
    • Dynamic analysis of sQL statements for data-intensive applications reverse engineering
    • IEEE Computer Society
    • Cleve, A., Hainaut, J.L.: Dynamic analysis of SQL statements for data-intensive applications reverse engineering. In: Proc. of the 15th Working Conference on Reverse Engineering, pp. 192-196. IEEE Computer Society (2008)
    • (2008) Proc. of the 15th Working Conference on Reverse Engineering , pp. 192-196
    • Cleve, A.1    Hainaut, J.L.2
  • 10
    • 84872283781 scopus 로고    scopus 로고
    • Database semantics recovery through analysis of dynamic sQL statements
    • Cleve, A., Meurisse, J.R., Hainaut, J.L.: Database semantics recovery through analysis of dynamic SQL statements. Journal on Data Semantics 15, 130-157 (2011)
    • (2011) Journal on Data Semantics , vol.15 , pp. 130-157
    • Cleve, A.1    Meurisse, J.R.2    Hainaut, J.L.3
  • 14
    • 0008366509 scopus 로고
    • Relational database reverse engineering:A method based on query analysis
    • Petit, J.M., Toumani, F., Kouloumdjian, J.: Relational database reverse engineering: A method based on query analysis. Int. J. Cooperative Inf. Syst. 4(2-3), 287-316 (1995)
    • (1995) Int. J. Cooperative Inf. Syst , vol.4 , Issue.2-3 , pp. 287-316
    • Petit, J.M.1    Toumani, F.2    Kouloumdjian, J.3
  • 15
    • 84956858187 scopus 로고    scopus 로고
    • Discovery of "interesting" data dependencies from a workload of sql statements
    • Zytkow, J.M., Rauch, J. (eds.) Springer, Heidelberg
    • Lopes, S., Petit, J.M., Toumani, F.: Discovery of "Interesting" Data Dependencies from a Workload of SQL Statements. In: Zytkow, J.M., Rauch, J. (eds.) PKDD 1999. LNCS (LNAI), vol. 1704, pp. 430-435. Springer, Heidelberg (1999)
    • (1999) PKDD 1999. LNCS (LNAI) , vol.1704 , pp. 430-435
    • Lopes, S.1    Petit, J.M.2    Toumani, F.3
  • 16
    • 0036649910 scopus 로고    scopus 로고
    • Exploring into programs for the recovery of data dependencies designed
    • Tan, H.B.K., Ling, T.W., Goh, C.H.: Exploring into programs for the recovery of data dependencies designed. IEEE Trans. Knowl. Data Eng. 14(4), 825-835 (2002)
    • (2002) IEEE Trans. Knowl. Data Eng , vol.14 , Issue.4 , pp. 825-835
    • Tan, H.B.K.1    Ling, T.W.2    Goh, C.H.3
  • 17
    • 0345764968 scopus 로고    scopus 로고
    • Automated elicitation of inclusion dependencies from the source codefor database transactions
    • Tan, H.B.K., Zhao, Y.: Automated elicitation of inclusion dependencies from the source codefor database transactions. Journal of Software Maintenance 15(6), 379-392 (2003)
    • (2003) Journal of Software Maintenance , vol.15 , Issue.6 , pp. 379-392
    • Tan, H.B.K.1    Zhao, Y.2
  • 18
    • 0014797273 scopus 로고
    • A relational model of data for large shared data banks
    • Codd, E.F.: A relational model of data for large shared data banks. Commun. ACM 13(6), 377-387 (1970)
    • (1970) Commun. ACM , vol.13 , Issue.6 , pp. 377-387
    • Codd, E.F.1
  • 20
    • 0031354777 scopus 로고    scopus 로고
    • Software unit test coverage and adequacy
    • Zhu, H., Hall, P.A.V.,May, J.H.R.: Software unit test coverage and adequacy. ACM Comput. Surv. 29, 366-427 (1997)
    • (1997) ACM Comput. Surv , vol.29 , pp. 366-427
    • Zhu, H.1    Hall, P.A.V.2    May, J.H.R.3
  • 22
    • 0021124390 scopus 로고
    • Mapping uninterpreted schemes into entity-relationship diagrams:Two applications to conceptual schema design
    • Casanova, M.A., De Sa, J.E.A.:Mapping uninterpreted schemes into entity-relationship diagrams: two applications to conceptual schema design. IBM J. Res. Dev. 28(1), 82-94 (1984)
    • (1984) IBM J. Res. Dev , vol.28 , Issue.1 , pp. 82-94
    • Casanova, M.A.1    De Sa, J.E.A.2
  • 23
    • 0022189485 scopus 로고
    • A methodology for translating a conventional file system into an entity-relationship model
    • IEEE Computer Society, Washington, DC
    • Davis, K.H., Arora, A.K.: A methodology for translating a conventional file system into an entity-relationship model. In: Proc. of the Fourth International Conference on Entity-Relationship Approach, pp. 148-159. IEEE Computer Society, Washington, DC (1985)
    • (1985) Proc. of the Fourth International Conference on Entity-Relationship Approach , pp. 148-159
    • Davis, K.H.1    Arora, A.K.2
  • 25
  • 30
    • 0032636826 scopus 로고    scopus 로고
    • Acquisition of entity relationship models for maintenance-dealing with data intensive programs in a transformation system
    • Yang, H., Chu,W.C.: Acquisition of entity relationship models for maintenance-dealing with data intensive programs in a transformation system. J. Inf. Sci. Eng. 15(2), 173-198 (1999)
    • (1999) J. Inf. Sci. Eng , vol.15 , Issue.2 , pp. 173-198
    • Yang, H.1    Chu, W.C.2
  • 31
    • 84931830530 scopus 로고    scopus 로고
    • Querying data-intensive programs for data design
    • Dittrich, K.R., Geppert, A., Norrie, M. (eds.) Springer, Heidelberg
    • Shao, J., Liu, X., Fu, G., Embury, S.M., Gray, W.A.: Querying Data-Intensive Programs for Data Design. In: Dittrich, K.R., Geppert, A., Norrie, M. (eds.) CAiSE 2001. LNCS, vol. 2068, pp. 203-218. Springer, Heidelberg (2001)
    • (2001) CAiSE 2001. LNCS , vol.2068 , pp. 203-218
    • Shao, J.1    Liu, X.2    Fu, G.3    Embury, S.M.4    Gray, W.A.5
  • 32
    • 0025471358 scopus 로고
    • Identifying extended entity-relationship object structures in relational schemas
    • Markowitz, V.M.,Makowsky, J.A.: Identifying extended entity-relationship object structures in relational schemas. IEEE Trans. Softw. Eng. 16(8), 777-790 (1990)
    • (1990) IEEE Trans. Softw. Eng , vol.16 , Issue.8 , pp. 777-790
    • Markowitz, V.M.1    Makowsky, J.A.2
  • 33
    • 84901806268 scopus 로고
    • An approach for reverse engineering of relational databases
    • Premerlani, W.J., Blaha, M.R.: An approach for reverse engineering of relational databases. Commun. ACM 37(5), 42-49 (1994)
    • (1994) Commun. ACM , vol.37 , Issue.5 , pp. 42-49
    • Premerlani, W.J.1    Blaha, M.R.2
  • 34
    • 0028397005 scopus 로고
    • Reverse engineering of relational databases:Extraction of an eer model from a relational database
    • Chiang, R.H.L., Barron, T.M., Storey, V.C.: Reverse engineering of relational databases: extraction of an eer model from a relational database. Data Knowl. Eng. 12(2), 107-142 (1994)
    • (1994) Data Knowl. Eng , vol.12 , Issue.2 , pp. 107-142
    • Chiang, R.H.L.1    Barron, T.M.2    Storey, V.C.3
  • 35
    • 0036498516 scopus 로고    scopus 로고
    • Discovering interesting inclusion dependencies:Application to logical database tuning
    • Lopes, S., Petit, J.M., Toumani, F.: Discovering interesting inclusion dependencies: Application to logical database tuning. Inf. Syst. 27(1), 1-19 (2002)
    • (2002) Inf. Syst , vol.27 , Issue.1 , pp. 1-19
    • Lopes, S.1    Petit, J.M.2    Toumani, F.3
  • 36
    • 38749119034 scopus 로고    scopus 로고
    • Mining functional dependencies from data
    • Yao, H., Hamilton, H.J.: Mining functional dependencies from data. Data Min. Knowl. Discov. 16(2), 197-219 (2008)
    • (2008) Data Min. Knowl. Discov , vol.16 , Issue.2 , pp. 197-219
    • Yao, H.1    Hamilton, H.J.2
  • 38
    • 84976856183 scopus 로고
    • A form-based approach for database analysisand design
    • Choobineh, J., Mannino, M.V., Tseng, V.P.: A form-based approach for database analysisand design. Communications of the ACM 35(2), 108-120 (1992)
    • (1992) Communications of the ACM , vol.35 , Issue.2 , pp. 108-120
    • Choobineh, J.1    Mannino, M.V.2    Tseng, V.P.3
  • 39
    • 33845232307 scopus 로고    scopus 로고
    • The user interface is the conceptual model
    • Embley, D.W., Olivé, A., Ram, S. (eds.) Springer, Heidelberg
    • Terwilliger, J.F., Delcambre, L.M.L., Logan, J.: The User Interface Is the Conceptual Model. In: Embley, D.W., Olivé, A., Ram, S. (eds.) ER 2006. LNCS, vol. 4215, pp. 424-436. Springer, Heidelberg (2006)
    • (2006) ER 2006. LNCS , vol.4215 , pp. 424-436
    • Terwilliger, J.F.1    Delcambre, L.M.L.2    Logan, J.3
  • 40
    • 79956299316 scopus 로고    scopus 로고
    • Reverse engineering user interfaces for interactive database conceptual analysis
    • Pernici, B. (ed.) Springer, Heidelberg
    • Ramdoyal, R., Cleve, A., Hainaut, J.-L.: Reverse Engineering User Interfaces for Interactive Database Conceptual Analysis. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol. 6051, pp. 332-347. Springer, Heidelberg (2010)
    • (2010) CAiSE 2010. LNCS , vol.6051 , pp. 332-347
    • Ramdoyal, R.1    Cleve, A.2    Hainaut, J.-L.3
  • 44
    • 37249052689 scopus 로고    scopus 로고
    • Applying static analysis for automated extraction of database interactions in web applications
    • Ngo, M.N., Tan, H.B.K.: Applying static analysis for automated extraction of database interactions in web applications. Inf. Softw. Technol. 50(3), 160-175 (2008)
    • (2008) Inf. Softw. Technol , vol.50 , Issue.3 , pp. 160-175
    • Ngo, M.N.1    Tan, H.B.K.2
  • 46
    • 0242276260 scopus 로고    scopus 로고
    • Efficient and transparent instrumentation of application componentsusing an aspect-oriented approach
    • Brunner, M., Keller, A. (eds.) Springer, Heidelberg
    • Debusmann, M., Geihs, K.: Efficient and Transparent Instrumentation of Application ComponentsUsing an Aspect-Oriented Approach. In: Brunner, M., Keller, A. (eds.) DSOM 2003. LNCS, vol. 2867, pp. 209-220. Springer, Heidelberg (2003)
    • (2003) DSOM 2003. LNCS , vol.2867 , pp. 209-220
    • Debusmann, M.1    Geihs, K.2
  • 48
    • 73449121426 scopus 로고    scopus 로고
    • Domain feature model recovery from multiple applications using data access semantics and formal concept analysis
    • IEEE Computer Society
    • Yang, Y., Peng, X., Zhao, W.: Domain feature model recovery from multiple applications using data access semantics and formal concept analysis. In: Proc. of the 16th International Working Conference on Reverse Engineering (WCRE 2009), pp. 215-224. IEEE Computer Society (2009)
    • (2009) Proc. of the 16th International Working Conference on Reverse Engineering (WCRE 2009) , pp. 215-224
    • Yang, Y.1    Peng, X.2    Zhao, W.3
  • 52
    • 34948906804 scopus 로고    scopus 로고
    • Insider and outsider threat-sensitive sql injection vulnerability analysis in php
    • IEEE Computer Society, Washington, DC
    • Merlo, E., Letarte, D., Antoniol, G.: Insider and outsider threat-sensitive sql injection vulnerability analysis in php. In: Proc.Working Conf. Reverse Engineering (WCRE), pp. 147-156. IEEE Computer Society, Washington, DC (2006)
    • (2006) Proc.Working Conf. Reverse Engineering (WCRE) , pp. 147-156
    • Merlo, E.1    Letarte, D.2    Antoniol, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.