Proceedings of the 2001 ACM symposium on Applied computing
A method for the manual extraction of business rules from legacy source code
BT Technology Journal
Extracting Business Rules from Information Systems
BT Technology Journal
Querying Data-Intensive Programs for Data Design
CAiSE '01 Proceedings of the 13th International Conference on Advanced Information Systems Engineering
Documenting Legacy Relational Databases
ER '99 Proceedings of the Workshops on Evolution and Change in Data Management, Reverse Engineering in Information Systems, and the World Wide Web and Conceptual Modeling
Deciding on the Equivalence of a Relational Schema and and Object-Oriented Schema
DEXA '00 Proceedings of the 11th International Conference on Database and Expert Systems Applications
IBM Systems Journal
New Frontiers of Reverse Engineering
FOSE '07 2007 Future of Software Engineering
A methodology for database reengineering to web services
ECMDA-FA'06 Proceedings of the Second European conference on Model Driven Architecture: foundations and Applications
Hi-index | 0.00 |
We continue to be surprised by the variability reverse engineering problems. When we tackle new problems, we often encounter situations we have not seen before. For these different situations, we have to adjust our reverse engineering techniques, level of effort, and expectations. This paper characterizes dimensions of variation for reverse engineering of databases.