Skip to main content

Program understanding in databases reverse engineering

  • Conference paper
  • First Online:
Database and Expert Systems Applications (DEXA 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1460))

Included in the following conference series:

Abstract

The main argument of the paper is that database understanding (or reverse engineering) requires sophisticated program understanding techniques, and conversely. Database reverse engineering (DBRE) can be carried out following a generic methodology, one of the phases of which consists in eliciting all the implicit and untranslated data structures and constraints. Evidences of these hidden constructs can be found by analysing how the programs use and update the data. Hence the need for program analysis techniques such as searching for clichés, dependency analysis, program slicing and synthetic views. The paper explains how these techniques contribute to DBRE, and describes DB-MAIN, a programmable and extensible CASE environment that supports DBRE through program understanding techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, M.: Reverse Engineering of Legacy Systems: From Valued-Based to Object-Based Models, PhD thesis, Lausanne, EPFL (1997)

    Google Scholar 

  2. Batini, C., Ceri, S. and Navathe, S.B.: Conceptual Database Design — An Entity-Relationship Approach, Benjamin/Cummings (1992).

    Google Scholar 

  3. Englebert, V., Henrard J., Hick, J.-M., Roland, D. and Hainaut, J.-L.: DB-MAIN: un Atelier d'Ingénierie de Bases de Données, in 11 Journée BD Avancées, Nancy (1995).

    Google Scholar 

  4. Hainaut, J.-L., Chandelon, M., Tonneau, C. and Joris M.: Contribution to a Theory of Database Reverse Engineering, in Proc. of the IEEE Working Conf. on Reverse Engineering, Baltimore, May 1993, IEEE Computer Society Press (1993).

    Google Scholar 

  5. Hainaut, J.-L, Roland, D., Hick J-M., Henrard, J. and Englebert, V.: Database Reverse Engineering: from Requirements to CARE Tools, Journal of Automated Software Engineering, 3(1) (1996).

    Google Scholar 

  6. Horwitz, S., Reps, T. and Binkley, D. Interprocedural Slicing using Dependence Graphs, ACM Trans. on Programming Languages and Systems 12(1), Jan. 1990, 26–60 (1990).

    Article  Google Scholar 

  7. Joris, M., Van Hoe, R., Hainaut, J.-L., Chandelon, M., Tonneau, C. and Bodart, F. et al.: PHENIX: Methods and Tools for Database Reverse Engineering, in Proc 5th Int. Conf. on Sofwazre Engieering and Applications. Toulouse, EC2 Publish (1992).

    Google Scholar 

  8. Petit, J.-M., Kouloumdjian, J., Bouliaut, J.-F. and Toumani, F.: Using Queries to Improve Database Reverse Engineering, in Proc of the 13th Int. Conf. on ER Approach, Manchester. Springer-Verlag (1994).

    Google Scholar 

  9. Rugaber S. Program Comprehension. Technical report, College of Computing, Georgia Institute of Technology (1995).

    Google Scholar 

  10. Weiser, M.: Program Slicing, IEEE TSE, 10, 352–357 (1984).

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Gerald Quirchmayr Erich Schweighofer Trevor J.M. Bench-Capon

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Henrard, J., Englebert, V., Hick, JM., Roland, D., Hainaut, JL. (1998). Program understanding in databases reverse engineering. In: Quirchmayr, G., Schweighofer, E., Bench-Capon, T.J. (eds) Database and Expert Systems Applications. DEXA 1998. Lecture Notes in Computer Science, vol 1460. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0054469

Download citation

  • DOI: https://doi.org/10.1007/BFb0054469

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64950-2

  • Online ISBN: 978-3-540-68060-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics