2008
DOI: 10.1016/j.jss.2007.07.005
|View full text |Cite
|
Sign up to set email alerts
|

Extracting entity-relationship diagram from a table-based legacy database

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(20 citation statements)
references
References 4 publications
0
20
0
Order By: Relevance
“…We apply reverse engineering techniques according to the specific type of data of the RS at hand. In literature, several techniques to extract a conceptual schema from a relational database [36] and from XML documents or forms [25] are described. In regard to unstructured data, the extraction of a conceptual schema is a complex task.…”
Section: In the Case Study The Results Of The Interviews Highlight Tmentioning
confidence: 99%
“…We apply reverse engineering techniques according to the specific type of data of the RS at hand. In literature, several techniques to extract a conceptual schema from a relational database [36] and from XML documents or forms [25] are described. In regard to unstructured data, the extraction of a conceptual schema is a complex task.…”
Section: In the Case Study The Results Of The Interviews Highlight Tmentioning
confidence: 99%
“…Generally, relational databases can be classified into different application areas which can be described by DB names or mined by some reverse engineering approaches [15,16]. In a relational database, a relation (or a table) collected a type of entries (or records) with multiple fields (or columns).…”
Section: Data Schema Of Relational Databasementioning
confidence: 99%
“…Yet they have been proved not to scale properly for big loads of data, which is the most common scenario in DW systems, as pointed out, for example, in (C. Monash, 2008;Golfarelli and Rizzi, 2009). For this reason, this is still a research topic giving rise to new proposals, like (Sismanis, Brown, Haas and Reinwald, 2006;Yao and Hamilton, 2008;Yeh, Li and Chu, 2008). Furthermore, note that these approaches exclusively work over instances and they cannot easily tolerate erroneous data (that may generate fake IDs that do not really hold or overlook real ones).…”
Section: Related Workmentioning
confidence: 99%