A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
The component that can reconciliate these mismatched subsystems is the R/W wrapper, which allows any client program to read, but also to update the legacy data, while controlling the integrity constraints ... In addition, neither the legacy DBMS (too weak to address integrity issues correctly) nor the new program (that relies on data server responsibility) correctly cope with data integrity management. ... Updating data through such a wrapper poses the problem of guaranteeing legacy data consistency by rejecting updates that violate all the constraints, whether they are implicit or explicit. ...doi:10.1145/1178625.1178626 fatcat:dctqi3rg5zdhrafq4lsmi22mpa
International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003.
Absfraa-We discuss the problem of distributed, autonomous and heterogeneous Web data sources wrapper, describe an efficient innovate wrapper generation for access, retrieve these information. ... For demonstration, we develop Distributed Information Management System (DIMS) framework that is an =based, mediator-wrapper architecture information integration system for accessing these web sources. ... We also provide metadata management to facile add new data sources, or update data sources. ...doi:10.1109/itre.2003.1270674 fatcat:uv436brpgjfbxatjkseyxgzske
Handbook of Data Intensive Computing
Semantic Querying of Legacy Relational Databases Semantic Wrapper: Concise Semantic Querying of Legacy Relational Databases Semantic Wrapper: Concise Semantic Querying of Legacy Relational Databases ... Databases Semantic Wrapper: Concise Semantic Querying of Legacy Relational Databases Semantic Wrapper: Concise Semantic Querying of Legacy Relational Databases Semantic Wrapper: Concise ... Appendix 2: Disambiguation of Arbitrary Semantic SQL Updates Let C be a category against which an update operation is performed. ...doi:10.1007/978-1-4614-1415-5_15 fatcat:nv5uxem77vaihguvt2v2ql4g4u
To simplify the task of constructing wrapper/monitor for the information sources in data warehouse systems, we provide a modularized design method to re-use the code. ... By substituting some parts of wrapper modules, we can re-use the wrapper on a dierent information source. For each information source, we also develop a toolkit to generate a corresponding monitor. ... In WHIPS architecture, view managers can maintain different degrees of consistency by dierent algorithms . ...doi:10.1016/s0164-1212(00)00037-6 fatcat:khjxvjimvnhljhvfajx6vs6dbi
Garlic wrappers model legacy data as objects, participate in query planning, and provide standard interfaces for method invocation and query execution. ... To date, we have built wrappers for 10 data sources. ... Wrappers for new data sources can be integrated into existing Garlic databases without disturbing legacy applications, other wrappers, or existing Garlic applications. 4. ...dblp:conf/vldb/RothS97 fatcat:owpzzvtiwfhstf4puikuenvr6u
We resolved the complexity problem by automatically generating a major portion of the application code, specifically, wrappers on database servers and client library modules called transparent access providers ... Main problems are the complexity of system development and maintenance, and the inefficiency of accessing remote data servers for processing region queries. ... ACKNOWLEDGEMENT This work was supported in part by the Brain Korea 21 Program for Information Technology at Seoul National University and the Korean GIS database tool development project carried out through ...doi:10.1002/spe.442 fatcat:rpvwvkk2ebbobmra7dfxf4gjlu
Lecture Notes in Computer Science
This paper describes the e-XML component suite, a modular product for integrating heterogeneous data sources under an XML schema and querying in real-time the integrated information using XQuery, the emerging ... server, and finally through the legacy infrastructure. ... The use of a Repository for XML data transmitted throughout the system speeds up performance by storing copies of XML data in a central location managed through a main memory database. ...doi:10.1007/3-540-45876-x_20 fatcat:5u7au6r5gjhi3ouaksrehi5imu
The first one is the conversion of the database to a new data management paradigm. ... More specifically, it studies the substitution of a modern data management technology for a legacy one. Platform migration raises two major issues. ... Wrapper-based migration architecture: a wrapper allows the data managed by a new DMS to be accessed by the legacy programs. ...doi:10.1007/978-3-540-76440-3_6 dblp:series/springer/HainautCHH08 fatcat:u3m436xhlbgxpbhdf25wkbjxkm
Data-intensive software systems are generally made of a database (sometimes in the form of a set of files) and a collection of application programs in strong interaction with the former. ... The wrapper converts all legacy DMS requests from legacy applications into requests against the new DMS that now manages the data. ... The wrapper converts all legacy DMS requests from legacy applications into requests against the new DMS that now manages the data. ...doi:10.1109/icsm.2010.5609724 dblp:conf/icsm/Cleve10 fatcat:6koz3b7verbffoli553tpd37vy
TENCON 2006 - 2006 IEEE Region 10 Conference
This paper presents an approach to resolve data model heterogeneities in databases and legacy systems through mediation and wrapping techniques. ... The system is well supported by the Mediated Data Model (MDM), a semantically-rich data model which can describe and represent heterogeneous data schematically and semantically. ... In fact, some legacy systems store data to flat files, which are completely different in schematic design from database management systems (DBMSs). ...doi:10.1109/tencon.2006.343819 fatcat:3ymtqldmxnaahilb7uphfcbhg4
models for architecture-based management systems. ... Third, our experience also shows that a meta-data checkpointing capability is best-suited for metadata recovery after failures. We demonstrate the soundness of these findings in several ways. ... This is required to manage the mapping with the Legacy layer through the specific management interfaces provided by the legacy elements. ...doi:10.1145/1368088.1368103 dblp:conf/icse/SicardBP08 fatcat:tmysqai65fcytdxml6xqavivoy
Lecture Notes in Computer Science
Configuration and version management, added to maintenance cost are major players on this decision. However, heavy traffic loads and network latency impose severe pena1ties on users. ... A simpler approach to this case is to rely on the data model underlying the legacy system. In most cases, the data model can be extracted from database metadata information. ... The Reverse Stunt Architecture is a modification on SA to make use of existing data models. In most of the times, the only existing documentation in legacy systems is the database design. ...doi:10.1007/3-540-46102-7_49 fatcat:hzc6zdht5vdchn57uyqgtgetxm
for future growth; and encourages coherent and comprehensive data management and data modeling with organizations. 0-7695- ... uses one standard query language for all XML data queries; thus, optimizes and simplifying query writing; can be implemented in phases; consistent query language regardless of data source; returns all ... XML agent manager The XML Agent Manager is the media through which all data flows in and out of the source and target data stores and databases. ...doi:10.2139/ssrn.666172 fatcat:sl63whmxrbgdxgyzw3n4hohrpa
of data displayed in Fig. 2, it is essential to use a well-developed data manage- ment approach. ... CORSIM gets the in- formation to run a simulation through a formatted text input file consisting of different number codes. ...
The contributions of this article are, (1) to explain how JADE provides autonomic management of a distributed system through an architecture-based approach, (2) to explain how we extended autonomic management ... from traditional self behaviors such as repairing or protecting a managed system to self-self behaviors where JADE also fully manages itself as it manages any other distributed system, (3) to report on ... , and finally to a database system that persistently stores data. ...doi:10.1145/2019591.2019597 fatcat:oavzed7ez5ao5osbvwioqssapa
« Previous Showing results 1 — 15 out of 2,702 results