SEED - A DBMS for Software Engineering Applications Based on the Entity-Relationship Approach

نویسندگان

  • Martin Glinz
  • Jochen Ludewig
چکیده

SEED is a database system which supports the data engineering needs of a software engineering environment. It provides information structures that are not incorporated in conventional database systems, but are typical in the software engineering process. This paper describes two principal features of SEED: how to deal with vague and incomplete information without giving up consistency checking, and the management of database versions and variants. A prototype of SEED is used as the database for an existing specification and design tool.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The EPOSDB Software Engineering Database

The EPOSDB is a general ER-based DBMS with a particular focus on use in software engineering or other areas with a need for managing complex and evolving data structures. It uses an extended Entity-Relationship data model, and provides versioning of all data through its novel Change Oriented Versioning (COV). COV intends to make version selection simpler for the user, as well as giving a unifor...

متن کامل

SEED - A Database System for Software Engineering Environments

8rown Boverl Research Center CH-540S Baden, Switzerland A data model for software engineering databases Is presented . On the basis of an entity-relationship-approach, the model provides special features for complex objects, consistency, vague or Incomplete Infol"'111ation, val"iants, and versions. A pl"'Ototype of II database system based on this model Is being Implemented.

متن کامل

Providing a Model for Assessment Internal Control Quality Based on the Characteristics of the Entity, the Characteristics of Auditor and Their Expected Goals in the Firm's Listed in Teh-ran Stock Exchange

According to the domestic studies conducted on in the field of internal controls, the gap of providing models for identifying weak internal controls is felt completely. The present study is aimed at providing a model for assessing the quality of internal controls based on the characteristics of the economic unit, the characteristics of auditor as well as their expected goals in the Firm's liste...

متن کامل

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

A Novel Charging Plan for PEVs Aggregator Based on Combined Market and Network Driven Approach

With the large-scale production of plug-in electric vehicles (PEVs), a new entity, the PEV fleet aggregator manages charging and discharging processes of the vehicles. The main objective of an individual aggregator in interaction with electricity markets is maximizing its profit. In this paper, the performance of this aggregator in day-ahead and real-time electricity markets, considering (a) cu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1986