A schema mapping is a specification that describes how data from a source schema is to be mapped to a target schema. Once the data has been transferred from the source to the target, a natural question is whether one can undo the process and recover the initial data, or at least part of it. In fact, it would be desirable to find a reverse schema mapping from target to source that specifies how to bring the exchanged data back. In this paper, we introduce the notion of a recovery of a schema mapping: it is a reverse mapping M ′ for a mapping M that re-covers sound data with respect to M. We further introduce an or-der relation on recoveries. This allows us to choose mappings that recover the maximum amount of sound information. We call such ...
Huge amount of data flows around the Internet every second, but for the data to be useful at its des...
Research has investigated mappings among data sources under two perspectives. On one side, there are...
In this paper, an approach for information systems reverse engineering is proposed and applied. The ...
A schema mapping is a specification that describes how data from a source schema is to be mapped to ...
Abstract The inversion of schema mappings has been iden-tified as one of the fundamental operators f...
We address the challenging and open problem of bringing together two crucial activities in data inte...
A schema mapping is a high-level specification that describes how data from a source schema is to be...
Abstract—We address the challenging and open problem of bringing together two crucial activities in ...
We introduce a theoretical framework for discovering relationships between two database instances ov...
We address the challenging and open problem of bringing together two cru-cial activities in data int...
The inversion of schema mappings has been identified as one of the fundamental operators for the dev...
Schema mapping is becoming pervasive in all data transformation, exchange and integration tasks. It ...
We introduce a theoretical framework for discovering relationships between two database instances ov...
We address the challenging and open problem of bringing together two crucial activities in data inte...
Schema mappings are high-level specifications that describe the relationship between database schema...
Huge amount of data flows around the Internet every second, but for the data to be useful at its des...
Research has investigated mappings among data sources under two perspectives. On one side, there are...
In this paper, an approach for information systems reverse engineering is proposed and applied. The ...
A schema mapping is a specification that describes how data from a source schema is to be mapped to ...
Abstract The inversion of schema mappings has been iden-tified as one of the fundamental operators f...
We address the challenging and open problem of bringing together two crucial activities in data inte...
A schema mapping is a high-level specification that describes how data from a source schema is to be...
Abstract—We address the challenging and open problem of bringing together two crucial activities in ...
We introduce a theoretical framework for discovering relationships between two database instances ov...
We address the challenging and open problem of bringing together two cru-cial activities in data int...
The inversion of schema mappings has been identified as one of the fundamental operators for the dev...
Schema mapping is becoming pervasive in all data transformation, exchange and integration tasks. It ...
We introduce a theoretical framework for discovering relationships between two database instances ov...
We address the challenging and open problem of bringing together two crucial activities in data inte...
Schema mappings are high-level specifications that describe the relationship between database schema...
Huge amount of data flows around the Internet every second, but for the data to be useful at its des...
Research has investigated mappings among data sources under two perspectives. On one side, there are...
In this paper, an approach for information systems reverse engineering is proposed and applied. The ...