dc.contributor.author |
Papastefanatos, G |
en |
dc.contributor.author |
Vassiliadis, P |
en |
dc.contributor.author |
Simitsis, A |
en |
dc.contributor.author |
Vassiliou, Y |
en |
dc.date.accessioned |
2014-03-01T02:46:49Z |
|
dc.date.available |
2014-03-01T02:46:49Z |
|
dc.date.issued |
2010 |
en |
dc.identifier.issn |
10844627 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/32873 |
|
dc.subject |
Open Source Software |
en |
dc.subject |
Relational Database |
en |
dc.subject |
Schema Evolution |
en |
dc.subject.other |
AS graph |
en |
dc.subject.other |
Database schemas |
en |
dc.subject.other |
Default behavior |
en |
dc.subject.other |
Default values |
en |
dc.subject.other |
Graph theoretic approach |
en |
dc.subject.other |
Like queries |
en |
dc.subject.other |
Metric suites |
en |
dc.subject.other |
Open-source softwares |
en |
dc.subject.other |
Relational Database |
en |
dc.subject.other |
Schema evolution |
en |
dc.subject.other |
Database systems |
en |
dc.title |
HECATAEUS: Regulating schema evolution |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/ICDE.2010.5447778 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/ICDE.2010.5447778 |
en |
heal.identifier.secondary |
5447778 |
en |
heal.publicationDate |
2010 |
en |
heal.abstract |
HECATAEUS is an open-source software tool for enabling impact prediction, what-if analysis, and regulation of relational database schema evolution. We follow a graph theoretic approach and represent database schemas and database constructs, like queries and views, as graphs. Our tool enables the user to create hypothetical evolution events and examine their impact over the overall graph before these are actually enforced on it. It also allows definition of rules for regulating the impact of evolution via (a) default values for all the nodes of the graph and (b) simple annotations for nodes deviating from the default behavior. Finally, HECATAEUS includes a metric suite for evaluating the impact of evolution events and detecting crucial and vulnerable parts of the system. © 2010 IEEE. |
en |
heal.journalName |
Proceedings - International Conference on Data Engineering |
en |
dc.identifier.doi |
10.1109/ICDE.2010.5447778 |
en |
dc.identifier.spage |
1181 |
en |
dc.identifier.epage |
1184 |
en |