The program dependence graph and its use in optimization
ACM Transactions on Programming Languages and Systems (TOPLAS)
SIGMOD '87 Proceedings of the 1987 ACM SIGMOD international conference on Management of data
Software testing techniques (2nd ed.)
Software testing techniques (2nd ed.)
Program Concept Recognition and Transformation
IEEE Transactions on Software Engineering - Special issue on software maintenance
Integrity control in relational database systems: an overview
Data & Knowledge Engineering
Program understanding and the concept assignment problem
Communications of the ACM
A selective undo mechanism for graphical user interfaces based on command objects
ACM Transactions on Computer-Human Interaction (TOCHI)
The role of experimentation in software engineering: past, current, and future
Proceedings of the 18th international conference on Software engineering
Model checking
A fast algorithm for finding dominators in a flowgraph
ACM Transactions on Programming Languages and Systems (TOPLAS)
Principles of Database Systems
Principles of Database Systems
Software model checking in practice: an industrial case study
Proceedings of the 24th International Conference on Software Engineering
Exploring into Programs for the Recovery of Data Dependencies Designed
IEEE Transactions on Knowledge and Data Engineering
Preliminary guidelines for empirical research in software engineering
IEEE Transactions on Software Engineering
Data-Centered Program Understanding
ICSM '94 Proceedings of the International Conference on Software Maintenance
Omega - an integrated environment for C++ program maintenance
ICSM '96 Proceedings of the 1996 International Conference on Software Maintenance
ASE '00 Proceedings of the 15th IEEE international conference on Automated software engineering
WCRE '99 Proceedings of the Sixth Working Conference on Reverse Engineering
Data Reverse Engineering: A Historical Survey
WCRE '00 Proceedings of the Seventh Working Conference on Reverse Engineering (WCRE'00)
Assisting the Comprehension of Legacy Transactions
WCRE '01 Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE'01)
Identifying Similar Code with Program Dependence Graphs
WCRE '01 Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE'01)
A Graph Pattern Matching Approach to Software Architecture Recovery
ICSM '01 Proceedings of the IEEE International Conference on Software Maintenance (ICSM'01)
Design Recovery of a Two Level System
IWPC '03 Proceedings of the 11th IEEE International Workshop on Program Comprehension
Business Rule Extraction from Legacy Code
COMPSAC '96 Proceedings of the 20th Conference on Computer Software and Applications
Recovering Conceptual Roles of Data in a Program
ICSM '02 Proceedings of the International Conference on Software Maintenance (ICSM'02)
Research Challenges in the Reverse Engineering Community
IWPC '01 Proceedings of the 9th International Workshop on Program Comprehension
Empirical-based recovery and maintenance of input error-correction features
Journal of Software Maintenance and Evolution: Research and Practice
An approach for the maintenance of input validation
Information and Software Technology
Aiding Maintenance of Database Applications Through Extracting Attribute Dependency Graph
Journal of Database Management
Hi-index | 0.00 |
Automated recovery of system features and their designs from program source codes is important in reverse engineering and system comprehension. It also helps in the testing of software. An error that is made by users in an input to an execution of a transaction and discovered only after the completion of the execution is called a posttransaction user-input error (PTUIE) of the transaction. For a transaction in any database application, usually, it is essential to provide transactions for correcting the effect that could result from any PTUIE of the transaction. We discover some probable properties that exist between the control flow graph of a transaction and the control flow graphs of transactions for correcting PTUIE of the former transaction. Through recognizing these properties, this paper presents a novel approach for the automated approximate recovery of provisions and designs for transactions to correct PTUIE of transactions in a database application. The approach recognizes these properties through analyzing the source codes of transactions in the database application statically.