Please use this identifier to cite or link to this item: https://doi.org/10.1109/HICSS.1997.663162
DC FieldValue
dc.titleRecovery of functional dependencies from data-intensive business programs
dc.contributor.authorTan, Hee Beng Kuan
dc.contributor.authorLing, Tok Wang
dc.date.accessioned2014-10-27T06:05:35Z
dc.date.available2014-10-27T06:05:35Z
dc.date.issued1997
dc.identifier.citationTan, Hee Beng Kuan,Ling, Tok Wang (1997). Recovery of functional dependencies from data-intensive business programs. Proceedings of the Hawaii International Conference on System Sciences 5 : 81-88. ScholarBank@NUS Repository. <a href="https://doi.org/10.1109/HICSS.1997.663162" target="_blank">https://doi.org/10.1109/HICSS.1997.663162</a>
dc.identifier.isbn0818677430
dc.identifier.issn10603425
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/99586
dc.description.abstractData integrity constraints usually form a major component in a data-intensive business system. To successfully reengineer a data-intensive business system, its data integrity constraints must be understood. Functional dependencies constitute an important type of data integrity constraints. Due to the nature of system development, a significant amount of functional dependencies is usually omitted during the initial system development stage and only discovered during the system maintenance stage. Usually, these dependencies are enforced in the programs which update the databases, and are not shown elsewhere including the databases. Existing approaches for the discovery of functional dependencies from databases cannot find such functional dependencies. We develop a theory for inferring functional dependencies in a database from the programs which update the database. With the use of the theory, a comprehensive approach for the recovery of functional dependencies from both database schemas and programs is consequently proposed. The proposed approach can recover those functional dependencies which cannot be found by the existing approaches. The functional dependencies recovered from the proposed approach are proven.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/HICSS.1997.663162
dc.sourceScopus
dc.typeConference Paper
dc.contributor.departmentINFORMATION SYSTEMS & COMPUTER SCIENCE
dc.description.doi10.1109/HICSS.1997.663162
dc.description.sourcetitleProceedings of the Hawaii International Conference on System Sciences
dc.description.volume5
dc.description.page81-88
dc.description.codenPHISD
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.