Extracting generalization hierarchies from relational databases: A reverse engineering approach

0
105

Authors: Isabelle Comyn-Wattiau, Jacky Akoka, Nadira Lammari

Tags: 2007, conceptual modeling

Relational Data Base Management Systems (RDBMS) are currently the most popular database management systems. The relational model is a simple and powerful model for representing real world applications. However, it lacks the expressiveness of conceptual models. Unlike the latter, the relational model does not offer the generalization abstraction. Therefore, it does not allow the designer to represent directly a large variety of integrity constraints. Moreover, inclusion dependencies formalizing inter-relational constraints cannot directly be represented in the relational model, due to the fact that its basic construct, the relation, is the unique structure. Finally, relational databases do not enable a natural way to represent inheritances. In this paper we describe a reverse engineering method which particularly deals with the elicitation of inheritance links embedded in a relational database, combining heuristic and algorithmic approaches. We provide rules for detecting intersection constraints and inclusion dependencies. Heuristics are proposed for understanding null value semantics. Finally, we present decision rules for detecting existence dependencies and translating them into IS-A hierarchies among entities. An example is used to illustrate our approach.

Read the full paper here: https://pdf.sciencedirectassets.com/271546/1-s2.0-S0169023X07X01927/1-s2.0-S0169023X07000705/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJHMEUCIQDsgg%2Bp50jiHdSF418rNftmb6OJ2ior1JW3l1QBJ%2FiLSAIgD1V4zKcsqXku05V1cx4FG9m%2Ft1dLS%2B6ir%2F%2FnzDlzKooqtAMIZRADGgwwNTkwMDM1NDY4NjUiDCO%2BmRPESgYL1fy80CqRA8fx4QR%2FFQhhdESqP3l3i%2FuCibNf2kV0Qa36C3faKZwvY%2FXa6rqWj3Fe1t3hcukQEwOfJBKkUpUv5FRGnQwn0AR6mkbRsZugTyGdgRK70%2BDx2YXJR8kNDJa1AQh3c3%2BWxhilJPrcNP3vIpw%2BNRJ%2BFgrp4VNl8dGzfzVNZEzXa059HuseJRIKULTqHuDfEBe%2BgAYKkez%2Fc3eQjc6W4bGBryW4gE4dxcLerkcsLam51TnIQysStg02RM2VAUJa1adpCTh6EdK0Qv7LOMC%2FAKv9PmAw5bKtwWZVeVbYXdHjfXyFHZD8xZjDCzFRpIIUlSieLa6C28JuppznAB3D3Adg%2B1afcQtvFnLRB8UB5vWYqY3M4KVovtEopaAqH3PDvZNWfqxowPy%2BPULvsTIlawzUGDRZqyfNFstEb1tfI7U7yNqoJUrQ0icocc9kPMhV%2FHcXRFT943nr2hKIfVjmh7EDSI4IwDOy63y8jdwU%2BU3OSv1asdYR%2F2FMOyMYqv%2F9QE0aKAH7RHg6FSkoaxV3MJRLwaiyMNvmnvsFOusB05Imn7j%2FATJ3ReMeon78n7%2BRu1Zj8LAIBWNe2%2BQUc8VGO9XNvu2TwBP%2BFTF4nwhztmC3exm5FEJlNiGnQSS8ibzjYJ8GquHdOuw3Ijw1c7pUQN5fBhj%2FnGHinq3qg%2FkQ4BZJywJrEaxQJc%2B%2FHpglilyNnPfdtOxDI7FoE9H0tMliWo0hwyTk5PzWrZE4ATOvs5zjXRVX13Z8m8H2pyea42F5SIeKkE8GMBa1e%2BmTQDN5BNZ7C9X0aCYKJzSSGy%2Fyu9lxAVEAaKEGAaATixyuUCoP1AobcDQCfk1uA%2BQWp60bibqt71IloTxsGQ%3D%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200920T202738Z&X-Amz-SignedHeaders=host&X-Amz-Expires=300&X-Amz-Credential=ASIAQ3PHCVTYZL3AHQ5E%2F20200920%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=c9055482fdd0020f5f8f5531da11d3670667414e00afe438d49cf3117c704279&hash=1445693f9a7c84c6739f6949fe469464622f8a9323b23e895b47de8a87bc1b8a&host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&pii=S0169023X07000705&tid=spdf-22d98bd1-0118-4474-89f7-61ac97d9193a&sid=27939d14918fb14e6d7bc0d-c8b7bcc143a4gxrqa&type=client