UNIFYING SOFTWARE AND DATA REVERSE ENGINEERING - A Pattern based Approach

Francesca Arcelli, Gianluigi Viscusi, Marco Zanoni

Abstract

At the state of the art, objects oriented applications use data structured in relational databases by exploiting some patterns, like the Domain Model and Data Mapper. These approaches aim to represent data in the OO way, using objects for representing data entities. Furthermore, we point out that the identification of these patterns can show the link between the object model and the conceptual entities, exploiting their associations to the physical data objects. The aim of this paper is to present a unified perspective for the definition of an integrated approach for software and data reverse engineering. The discussion is carried out by means of a sample application and a comparison with results from current tools.

References

  1. Alur, D., Crupi, J., and Malks, D. (2001). Core J2EE Patterns: Best Practices and Design Strategies, 1/e. Prentice Hall.
  2. Arcelli, F., Tosi, C., Zanoni, M., and Maggioni, S. (2008). The marple project - a tool for design pattern detection and software architecture reconstruction. In Proceedings of the WASDeTT Workshop, co-located event with ECOOP 2008 Conference, Cyprus.
  3. Avgeriou, P. and Zdun, U. (2005). Architectural patterns revisited - a pattern language. In Proceedings of the 10th European Conference on Pattern Languages of Programs (EuroPLoP 2005), Irsee, Germany.
  4. Batini, C., Garasi, M. F., and Grosso, R. (2005). Reuse of a repository of conceptual schemas in a large scale project. In Advanced Topics in Database Research. Idea Book.
  5. Davis, K. H. and Aiken, P. H. (2000). Data reverse engineering: A historical survey. Reverse Engineering, Working Conference on, 0:70.
  6. Fowler, M. (2002). Patterns of Enterprise Application Architecture. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA.
  7. J.L. Hainaut, J. Henrard, J. H. D. R. and Englebert, V. (2000). The nature of data reverse engineering. In Data Reverse Engineering Workshop (DRE2000).
  8. Marinescu, C. (2007). Discovering the objectual meaning of foreign key constraints in enterprise applications. In Proceedings of WCRE 2007: 14th Working Conference on Reverse Engineering, pages 100 -109.
  9. Mian, N. A. and Hussain, T. (2008). Database reverse engineering tools. In SEPADS'08: Proceedings of the 7th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems, pages 206- 211. World Scientific and Engineering Academy and Society (WSEAS).
  10. Serge Demeyer, S. D. and Nierstrasz, O. (2008). ObjectOriented Reengineering Patterns. Square Bracket Associates.
Download


Paper Citation


in Harvard Style

Arcelli F., Viscusi G. and Zanoni M. (2010). UNIFYING SOFTWARE AND DATA REVERSE ENGINEERING - A Pattern based Approach . In Proceedings of the 5th International Conference on Software and Data Technologies - Volume 2: ICSOFT, ISBN 978-989-8425-23-2, pages 208-213. DOI: 10.5220/0003010202080213


in Bibtex Style

@conference{icsoft10,
author={Francesca Arcelli and Gianluigi Viscusi and Marco Zanoni},
title={UNIFYING SOFTWARE AND DATA REVERSE ENGINEERING - A Pattern based Approach},
booktitle={Proceedings of the 5th International Conference on Software and Data Technologies - Volume 2: ICSOFT,},
year={2010},
pages={208-213},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003010202080213},
isbn={978-989-8425-23-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 5th International Conference on Software and Data Technologies - Volume 2: ICSOFT,
TI - UNIFYING SOFTWARE AND DATA REVERSE ENGINEERING - A Pattern based Approach
SN - 978-989-8425-23-2
AU - Arcelli F.
AU - Viscusi G.
AU - Zanoni M.
PY - 2010
SP - 208
EP - 213
DO - 10.5220/0003010202080213