The main argument of the paper is that database understanding requires sophisticated program understanding techniques, and conversely. Database reverse engineering (DBRE) can be carried out following a generic methodology, one of the phases of which consists in eliciting all the implicit and untranslated data structures and constraints. Evidences of these hidden constructs can be found by analysing how the programs are to use and create the data. Hence the need for program analysis techniques such as searching for clichés, dependency analysis, program slicing and synthetic views. The paper explains how these techniques contribute to DBRE, and describes DB-MAIN, a programmable and extensible CASE environment that supports DBRE through progra...
In this thesis we describe the UQoRE method which supports database reverse engineering by using a ...
Abstract. In the database engineering realm, the merits of transformational ap-proaches, that can pr...
International audienceThis paper describes a method aiming at the extraction of generalization/speci...
The main argument of the paper is that database understanding requires sophisticated program underst...
For many years software engineering has primarily focused on the development of new systems and negl...
AbstractDatabase reverse engineering (DBRE) methods recover conceptual data models from physical dat...
The database forensic investigation plays an important role in the field of computer. The data store...
Corporations face mounting maintenance and re-engineering costs for large legacy systems. Evolving o...
This paper presents techniques for reverse engineering of relational database applications. The targ...
Several processes have been advanced in the literature for reverse engineering of relational databas...
Documentation has traditionally played a key role as an aid in program understanding. However, most ...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
Reverse engineering involves extracting high-level information from existing code. Reverse engineeri...
The first step of most database design methodologies consists in eliciting part of the user requirem...
We present DBridge, a novel static analysis and program transformation tool to optimize database acc...
In this thesis we describe the UQoRE method which supports database reverse engineering by using a ...
Abstract. In the database engineering realm, the merits of transformational ap-proaches, that can pr...
International audienceThis paper describes a method aiming at the extraction of generalization/speci...
The main argument of the paper is that database understanding requires sophisticated program underst...
For many years software engineering has primarily focused on the development of new systems and negl...
AbstractDatabase reverse engineering (DBRE) methods recover conceptual data models from physical dat...
The database forensic investigation plays an important role in the field of computer. The data store...
Corporations face mounting maintenance and re-engineering costs for large legacy systems. Evolving o...
This paper presents techniques for reverse engineering of relational database applications. The targ...
Several processes have been advanced in the literature for reverse engineering of relational databas...
Documentation has traditionally played a key role as an aid in program understanding. However, most ...
A recurring problem in security is reverse engineering binary code to recover high-level language da...
Reverse engineering involves extracting high-level information from existing code. Reverse engineeri...
The first step of most database design methodologies consists in eliciting part of the user requirem...
We present DBridge, a novel static analysis and program transformation tool to optimize database acc...
In this thesis we describe the UQoRE method which supports database reverse engineering by using a ...
Abstract. In the database engineering realm, the merits of transformational ap-proaches, that can pr...
International audienceThis paper describes a method aiming at the extraction of generalization/speci...