2014
DOI: 10.1002/smr.1656
|View full text |Cite
|
Sign up to set email alerts
|

Pattern detection for conceptual schema recovery in data-intensive systems

Abstract: In this paper, an approach for information systems reverse engineering is proposed and applied. The aim is to support a unified perspective to the reverse engineering process of both data and software. At the state of the art, indeed, many methods, techniques, and tools for software reverse engineering have been proposed to support program comprehension, software maintenance, and software evolution. Other approaches and tools have been proposed for data reverse engineering, with the aim, for example, to provid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0
2

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 32 publications
(64 reference statements)
0
11
0
2
Order By: Relevance
“…None of these attempts investigates the concept of patterns on architectural level. Another concept of using design patterns in data-intensive systems offers [8]. Though, they aim in detecting design patterns for reverse engineering purposes and not safety or security challenges.…”
Section: Background and Related Workmentioning
confidence: 99%
“…None of these attempts investigates the concept of patterns on architectural level. Another concept of using design patterns in data-intensive systems offers [8]. Though, they aim in detecting design patterns for reverse engineering purposes and not safety or security challenges.…”
Section: Background and Related Workmentioning
confidence: 99%
“…policymakers can then indicate the potential missing or new entities to be considered in (new) policies. Thus, we propose adopting conceptual model features applied for reverse engineering (Zanoni, Perin, Fontana, & Viscusi, ) at the policy level. In this case, the aim is to identify discrepancies between database schemas and current policies and to correlate the information extracted from the database schema with the usage of valuable information for constituencies.…”
Section: Related Workmentioning
confidence: 99%
“…The most important of these risks is the unauthorized or accidental deletion of the data [2]. There are file recovery and carving software for recovering deleted files from the storage devices [3]. When the user wants to open a file, the operating system first loads the file into RAM before opening it.…”
Section: Introductionmentioning
confidence: 99%