Search: in, Schema Evolution, no paper type, 2006

7 results

Results

Wrapper-based evolution of legacy information systems

... problems. For instance, incorporating a new program in a legacy database application can create an integrity mismatch, since the ... different (e.g. standard file model versus OO model). In addition, neither the legacy DBMS (too weak to address integrity issues ...

Publication - huliganka - 04/17/2013 - 12:05 - 0 comments - 1 attachment

Data Reverse Engineering using System Dependency Graphs

... with the use of program understanding methods and tools. In this paper, we focus on the program slicing technique and we show how it can ...

Publication - acleve - 04/17/2013 - 12:05 - 0 comments - 0 attachments

Database application evolution: a transformational approach

... schema evolution, standard information systems currently in use raise challenging evolution problems. This paper examines database ... and describe a CASE tool that can assist developers in their task of system evolution. We illustrate our approach with Biomaze, a ...

Publication - huliganka - 04/17/2013 - 11:38 - 0 comments - 1 attachment

Co-transformations in Database Applications Evolution

... Generative and Transformational Techniques in Software Engineering, Lecture Notes in Computer Science 4143, 2006 URL:  ...

Publication - acleve - 04/17/2013 - 11:38 - 0 comments - 1 attachment

A Coevolution Approach for Database Schemas and Related Ontologies

... of semantical concepts, but only technical schema changes. In this paper we present our mapping of database schemas to ontologies, ...

Publication - cat - 04/17/2013 - 11:05 - 0 comments - 0 attachments

Automating Change Evolution in Model-Driven Engineering

Authors:  Gray, J; Lin, Y; Zhang, J Author:  Gray, J Lin, Y ...

Publication - cat - 04/16/2013 - 08:05 - 0 comments - 0 attachments

On the Controlled Evolution of Process Choreographies

... choreographies. If respective modifications are applied in an uncontrolled manner, inconsistencies or errors might occur in the sequel. In particular, modifications of private processes performed by a ...

Publication - cat - 04/15/2013 - 20:27 - 0 comments - 0 attachments