In this thesis we describe the UQoRE method which supports database reverse engineering by using a data mining technique. Generally, Reverse Engineering methods work by using information extracted from data dictionaries, database extensions, application programs and expert users. The main differences between all these methods rely on the assumptions made on the a-priori knowledge available about the database (schema and constraints on attributes) as well as the user competence. Most of them are based on the attribute name consistency. This paper presents a method based on user queries. Queries are stored in a “Query Base” and our system mines this new source of knowledge in order to discover hidden links and similarity between data...
Several processes have been advanced in the literature for reverse engineering of relational databas...
The first step of most database design methodologies consists in eliciting part of the user requirem...
The main argument of the paper is that database understanding requires sophisticated program underst...
In this thesis we describe the UQoRE method which supports database reverse engineering by using a d...
AbstractDatabase reverse engineering (DBRE) methods recover conceptual data models from physical dat...
This paper presents techniques for reverse engineering of relational database applications. The targ...
Colloque avec actes et comité de lecture. internationale.International audienceThis paper presents t...
This paper describes the steps of a reverse engineering process for translating a hierarchical data ...
AbstractThis paper presents a solution and a methodology to recover legacy databases of most DBMS us...
For many years software engineering has primarily focused on the development of new systems and negl...
The database forensic investigation plays an important role in the field of computer. The data store...
International audienceThis paper describes a method aiming at the extraction of generalization/speci...
version 1National audienceRelational Data Base Management Systems (RDBMS) are currently the most pop...
Semantic Web systems provide open interfaces for end-users to access data via a powerful high-level ...
International audienceIn recent years, the need to use NoSQL systems to store and exploit big data h...
Several processes have been advanced in the literature for reverse engineering of relational databas...
The first step of most database design methodologies consists in eliciting part of the user requirem...
The main argument of the paper is that database understanding requires sophisticated program underst...
In this thesis we describe the UQoRE method which supports database reverse engineering by using a d...
AbstractDatabase reverse engineering (DBRE) methods recover conceptual data models from physical dat...
This paper presents techniques for reverse engineering of relational database applications. The targ...
Colloque avec actes et comité de lecture. internationale.International audienceThis paper presents t...
This paper describes the steps of a reverse engineering process for translating a hierarchical data ...
AbstractThis paper presents a solution and a methodology to recover legacy databases of most DBMS us...
For many years software engineering has primarily focused on the development of new systems and negl...
The database forensic investigation plays an important role in the field of computer. The data store...
International audienceThis paper describes a method aiming at the extraction of generalization/speci...
version 1National audienceRelational Data Base Management Systems (RDBMS) are currently the most pop...
Semantic Web systems provide open interfaces for end-users to access data via a powerful high-level ...
International audienceIn recent years, the need to use NoSQL systems to store and exploit big data h...
Several processes have been advanced in the literature for reverse engineering of relational databas...
The first step of most database design methodologies consists in eliciting part of the user requirem...
The main argument of the paper is that database understanding requires sophisticated program underst...