Many information systems are data-intensive, and most of them rely on trustworthy data management systems for data storage, such as Relational Database Management Systems (RDBMS). RDBMSs are used to store information in a structured manner and to define several types of constraints on the data, to keep basic consistencies. There are several scenarios in which passing the responsibility of consistency checking completely onto the RDBMS is inconvenient, or simply not possible. In such cases, the alternative is to perform those consistency checks at the business logic level of the system. From a point of view of testing data-intensive applications, one of the most relevant aspects is to ensure correctness of the business logic. In this article...
While random property-based testing is often an effective way for quickly finding bugs and in-creasi...
An important aim of a database system is to guarantee database consistency, which means that the dat...
Abstract. A hitherto unquestioned assumption made by all methods for integrity checking has been tha...
Many information systems are data-intensive, and most of them rely on trustworthy data management sy...
Many software systems are data-intensive and use a data management systems for data storage, such as...
AbstractMany software systems are data-intensive and use a data management systems for data storage,...
Correct implementation of data constraints, such as referential integrity constraints and business r...
Correct implementation of data constraints, such as refer-ential integrity constraints and business ...
Correct implementation of data constraints, such as referential integrity constraints and business r...
Database applications retrieve data from database for processing and store data to database for futu...
Web applications are complex, heterogeneous and dynamic. To ensure their correct functional behaviou...
Most of modern applications use database to store data and retrieve them when necessary. This resear...
The performance bottlenecks in modern data-intensive applications have induced database implementors...
Testing is the primary method to validate that a software implementation meets its specification. In...
Database applications retrieve data from database, process the data and then store them for future p...
While random property-based testing is often an effective way for quickly finding bugs and in-creasi...
An important aim of a database system is to guarantee database consistency, which means that the dat...
Abstract. A hitherto unquestioned assumption made by all methods for integrity checking has been tha...
Many information systems are data-intensive, and most of them rely on trustworthy data management sy...
Many software systems are data-intensive and use a data management systems for data storage, such as...
AbstractMany software systems are data-intensive and use a data management systems for data storage,...
Correct implementation of data constraints, such as referential integrity constraints and business r...
Correct implementation of data constraints, such as refer-ential integrity constraints and business ...
Correct implementation of data constraints, such as referential integrity constraints and business r...
Database applications retrieve data from database for processing and store data to database for futu...
Web applications are complex, heterogeneous and dynamic. To ensure their correct functional behaviou...
Most of modern applications use database to store data and retrieve them when necessary. This resear...
The performance bottlenecks in modern data-intensive applications have induced database implementors...
Testing is the primary method to validate that a software implementation meets its specification. In...
Database applications retrieve data from database, process the data and then store them for future p...
While random property-based testing is often an effective way for quickly finding bugs and in-creasi...
An important aim of a database system is to guarantee database consistency, which means that the dat...
Abstract. A hitherto unquestioned assumption made by all methods for integrity checking has been tha...