Combining a flexible data model and phase schema translation in data model reverse engineering

Author(s):  
K.H. Davis
Author(s):  
Mariano Ceccato ◽  
Thomas Roy Dean ◽  
Paolo Tonella ◽  
Davide Marchignoli

1998 ◽  
Vol 2 (3) ◽  
pp. 93-104
Author(s):  
Joseph H. Callaghan ◽  
Thomas W. Lauer ◽  
Eileen Peacock

The growing emphasis on information for the development of products, services, and managing activities has increased the need for the integration of data which has been collected and used for various IS applications. Problems arise from the integration of information from such a variety of sources. One approach to this problem is reverse engineer these systems. Reverse engineering derives a data model from existing sys-tems with the aim of redesigning it. The paper describes a data modeling approach that takes data from general journal and an archetypal specialized journal and translates it into an entity-relationship diagram. The article also discusses areas for future research.


2001 ◽  
Vol 39 (4) ◽  
pp. 667-687 ◽  
Author(s):  
Vicente Borja ◽  
Jennifer A. Harding ◽  
Rober T Bell

2013 ◽  
Vol 712-715 ◽  
pp. 2619-2624
Author(s):  
Xue Mei Liu ◽  
Yong Po Liu ◽  
Shuang Mei Liu ◽  
Liang Yuan Su

As the test system grows in size and the testers change, the management and maintenance of the huge test systems have become more and more difficult. Therefore the reverse engineering based on TTCN-3 test systems can help testers grasp the system design from higher levels, and can test the consistence between test design and test implementation, which is of great significance and important value for test system maintenance, expansion and evaluation. This thesis presents the reverse model recovery for the legacy code developed by TTCN-3. It can also help tester and maintainers to verify the test implement. Then the test system meta-model is designed. This thesis also introduced the technologies of the discovery of invocation model and data model based on the reverse model discovery system framework. Finally, the algorithms of extracting invocation model and partitioning data model are described.


2009 ◽  
Vol 5 (4) ◽  
pp. 495-517 ◽  
Author(s):  
Sidi Mohamed Benslimane ◽  
Mimoun Malki ◽  
Djelloul Bouchiha

PurposeWeb applications are subject to continuous changes and rapid evolution triggered by increasing competition, especially in commercial domains such as electronic commerce. Unfortunately, usually they are implemented without producing any useful documentation for subsequent maintenance and evolution. Thereof, the maintenance of such systems becomes a challenging problem as the complexity of the web application grows. Reverse engineering has been heralded as one of the most promising technologies to support effective web application maintenance. This paper aims to present a reverse engineering approach that helps understanding existing undocumented web applications to be maintained or evolved.Design/methodology/approachThe proposed approach provides reverse engineering rules to generate a conceptual schema from a given domain ontology by using a set of transformation rules. The reverse engineering process consists of four phases: extracting useful information; identifying a set of ontological constructs representing the concepts of interest; enriching the identified set by additional constructs; and finally deriving a conceptual schema.FindingsThe advantage of using ontology for conceptual data modeling is the reusability of domain knowledge. As a result, the conceptual data model will be made faster, easier and with fewer errors than creating it in usual way. Designers can use the extracted conceptual schema to gain a better understanding of web applications and to assist in their maintenance.Originality/valueThe strong point of this approach is that it relies on a very rich semantic reference that is domain ontology. However, it is not possible to make a straightforward transformation of all elements from a domain ontology into a conceptual data model because ontology is semantically richer than data conceptual models.


2008 ◽  
Vol 45 ◽  
pp. 161-176 ◽  
Author(s):  
Eduardo D. Sontag

This paper discusses a theoretical method for the “reverse engineering” of networks based solely on steady-state (and quasi-steady-state) data.


2008 ◽  
Author(s):  
Pedro J. M. Passos ◽  
Duarte Araujo ◽  
Keith Davids ◽  
Ana Diniz ◽  
Luis Gouveia ◽  
...  

2019 ◽  
Vol 13 (1-2) ◽  
pp. 95-115
Author(s):  
Brandon Plewe

Historical place databases can be an invaluable tool for capturing the rich meaning of past places. However, this richness presents obstacles to success: the daunting need to simultaneously represent complex information such as temporal change, uncertainty, relationships, and thorough sourcing has been an obstacle to historical GIS in the past. The Qualified Assertion Model developed in this paper can represent a variety of historical complexities using a single, simple, flexible data model based on a) documenting assertions of the past world rather than claiming to know the exact truth, and b) qualifying the scope, provenance, quality, and syntactics of those assertions. This model was successfully implemented in a production-strength historical gazetteer of religious congregations, demonstrating its effectiveness and some challenges.


Sign in / Sign up

Export Citation Format

Share Document