A framework for the design and evaluation of reverse engineering methods for relational databases

0
103

Authors: Roger H. L. Chiang, Terence M. Barron, Veda C. Storey

Tags: 1997, conceptual modeling

It is often difficult to obtain a good conceptual understanding of a legacy database, especially when there is a lack of documentation. Database reverse engineering attempts to provide solutions for this problem. It is the part of system maintenance work that produces a sufficient understanding of a legacy database and its application domain to allow appropriate changes to be made. However, research on database reverse engineering has largely ignored design and evaluation issues of their methods (i.e., foundations and processes). This research proposes a framework for the design and evaluation of reverse engineering methods of relational databases. This framework consists of eight criteria: 1) the situation chosen as the basis for reverse engineering, 2) the conceptual model chosen to represent the reverse engineering results, 3) the prerequisites of the database to be reverse engineered, 4) the thoroughness of domain semantics acquisition, 5) rules and heuristics employed by the reverse engineering process, 6) performance efficiency of the reverse engineering process, 7) completeness and robustness and 8) validation. These criteria are important to be considered in designing reverse engineering methods, so that they can perform reverse engineering for a broad range of legacy databases at a high level of automation and provide a conceptual schema that is semantically rich and correct.

Read the full paper here: https://pdf.sciencedirectassets.com/271546/1-s2.0-S0169023X00X00195/1-s2.0-S0169023X96000225/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjEBcaCXVzLWVhc3QtMSJHMEUCIQDVQn32LWNqaanjhMZLX3VM2Dvlo%2Bg8bEoMeXQeNUacCQIgOkhoUwx9j%2FlLBATE3%2BnVrwRwIe7LeXm08Yex7m%2FbLqgqtAMIMBADGgwwNTkwMDM1NDY4NjUiDK%2BO61X02G0vZFZfHCqRA6AL9JCIAprdzUASo%2B8yWHJWeQfLhN9WhJKTuFM0%2F9V2z%2BCy74gJ%2BS%2FIrqiS%2BPqhEF2EjGqRRMScroI%2FfI4muJsxlluECjAKIrcOhSIJNC0%2FuCNDTKbsJXesgBSCtkm6lkdV7gPU3%2BebnDT3K1TcMRrd19ar4Z6%2B5wYkec9tn8WRCpsOVHS4%2F%2BmcJLBwyFq9%2BCBvmRmiM9cKXs3zx3Oo4Z%2BfoA2WpHsxxRn1f9zGXMbGcujQ%2FhGcjY8m%2F%2BSZDimzFFS62vcS8DVcy2lEFoIp03g1Ah8HJ0RiVSciNBxA%2BL%2F1E6R8jER1bC9QEoUd9%2BrA9ApTo1vAhwKIDMYzkQgjzfYC1LB3dKaZLLDbiPbAB%2FCwsaXAFVV7IC%2BvQEN0N3tpHazTUXm0b5liwabTbMRV%2BH7KS4gN0fdDRebAxPOE5zlYQl3XcQSk7Xd6aUEJLuIRDpCnrJaksczcfbWOdE5bR%2FHSuXqnih8J09g654kbVw7djqxaykb9TlF4HlxNiLXg33w1EO3sydUdbvlV7xvwhdhNMNWOk%2FsFOusBeH%2F2YPtrLMHhj6kcBUYzoVUH%2FaYtyZU1MDHwP86U%2BCY2T9KsOF3XribUlYqvXO5JCbItsz1mvEBsdHI7BAvwDP2Xwc7pWNmIsK8lBoSvme%2BFA%2B3LVCyvzasOsMdVZbFwbRR092S9qRz392QzNHdyIv1UErxkSn9Qw%2FHUATd79sWHMLe74vGqkKPNTi0fdcox2hWOgZ1N6SX6WX2QrOgmLFRIyyMxHN68%2B1oIIMfFwst5EeKP9ydVotoFnxqyr7tcYAH5321U7NhAz5soGLs3s%2F7RHwI7Bzg8DIErxmtdUacW8s9jCMgieslpwg%3D%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200918T161609Z&X-Amz-SignedHeaders=host&X-Amz-Expires=300&X-Amz-Credential=ASIAQ3PHCVTYTRIXDH4Q%2F20200918%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=012aecf39031e3bf525d6ff21b4d52fa4c80c4a52b9fe330d1ec59b2d9d6e2bc&hash=041c09b1c4dc6249f12d686fc2f55cf81a501de2a2648faf698a0d9c37189255&host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&pii=S0169023X96000225&tid=spdf-0dc0ebf9-2e4b-419f-b220-8ab327b29a96&sid=ce3e6b217906524963386c21db5fa5ebfaccgxrqa&type=client