Understanding Cryptic Schemata in Large Extract-transform-load Systems

Understanding Cryptic Schemata in Large Extract-transform-load Systems PDF Author: Alexander Albrecht
Publisher: Universitätsverlag Potsdam
ISBN: 3869562013
Category : Computers
Languages : en
Pages : 28

Get Book Here

Book Description
Extract-Transform-Load (ETL) tools are used for the creation, maintenance, and evolution of data warehouses, data marts, and operational data stores. ETL workflows populate those systems with data from various data sources by specifying and executing a DAG of transformations. Over time, hundreds of individual workflows evolve as new sources and new requirements are integrated into the system. The maintenance and evolution of large-scale ETL systems requires much time and manual effort. A key problem is to understand the meaning of unfamiliar attribute labels in source and target databases and ETL transformations. Hard-to-understand attribute labels lead to frustration and time spent to develop and understand ETL workflows. We present a schema decryption technique to support ETL developers in understanding cryptic schemata of sources, targets, and ETL transformations. For a given ETL system, our recommender-like approach leverages the large number of mapped attribute labels in existing ETL workflows to produce good and meaningful decryptions. In this way we are able to decrypt attribute labels consisting of a number of unfamiliar few-letter abbreviations, such as UNP_PEN_INT, which we can decrypt to UNPAID_PENALTY_INTEREST. We evaluate our schema decryption approach on three real-world repositories of ETL workflows and show that our approach is able to suggest high-quality decryptions for cryptic attribute labels in a given schema.

Understanding Cryptic Schemata in Large Extract-transform-load Systems

Understanding Cryptic Schemata in Large Extract-transform-load Systems PDF Author: Alexander Albrecht
Publisher: Universitätsverlag Potsdam
ISBN: 3869562013
Category : Computers
Languages : en
Pages : 28

Get Book Here

Book Description
Extract-Transform-Load (ETL) tools are used for the creation, maintenance, and evolution of data warehouses, data marts, and operational data stores. ETL workflows populate those systems with data from various data sources by specifying and executing a DAG of transformations. Over time, hundreds of individual workflows evolve as new sources and new requirements are integrated into the system. The maintenance and evolution of large-scale ETL systems requires much time and manual effort. A key problem is to understand the meaning of unfamiliar attribute labels in source and target databases and ETL transformations. Hard-to-understand attribute labels lead to frustration and time spent to develop and understand ETL workflows. We present a schema decryption technique to support ETL developers in understanding cryptic schemata of sources, targets, and ETL transformations. For a given ETL system, our recommender-like approach leverages the large number of mapped attribute labels in existing ETL workflows to produce good and meaningful decryptions. In this way we are able to decrypt attribute labels consisting of a number of unfamiliar few-letter abbreviations, such as UNP_PEN_INT, which we can decrypt to UNPAID_PENALTY_INTEREST. We evaluate our schema decryption approach on three real-world repositories of ETL workflows and show that our approach is able to suggest high-quality decryptions for cryptic attribute labels in a given schema.

Conceptual Modeling

Conceptual Modeling PDF Author: Paolo Atzeni
Publisher: Springer
ISBN: 3642340024
Category : Computers
Languages : en
Pages : 608

Get Book Here

Book Description
This book constitutes the refereed proceedings of the 31st International Conference on Conceptual Modeling, ER 2012, held in Florence, Italy, in October 2012. The 24 regular papers presented together with 13 short papers, 6 poster papers and 3 keynotes were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on understandability and cognitive approaches; conceptual modeling for datawarehousing and business intelligence; extraction, discovery and clustering; search and documents; data and process modeling; ontology based approaches; variability and evolution; adaptation, preferences and query refinement; queries, matching and topic search; and conceptual modeling in action.

Modeling and enacting complex data dependencies in business processes

Modeling and enacting complex data dependencies in business processes PDF Author: Meyer, Andreas
Publisher: Universitätsverlag Potsdam
ISBN: 3869562455
Category : Computers
Languages : en
Pages : 52

Get Book Here

Book Description
Enacting business processes in process engines requires the coverage of control flow, resource assignments, and process data. While the first two aspects are well supported in current process engines, data dependencies need to be added and maintained manually by a process engineer. Thus, this task is error-prone and time-consuming. In this report, we address the problem of modeling processes with complex data dependencies, e.g., m:n relationships, and their automatic enactment from process models. First, we extend BPMN data objects with few annotations to allow data dependency handling as well as data instance differentiation. Second, we introduce a pattern-based approach to derive SQL queries from process models utilizing the above mentioned extensions. Therewith, we allow automatic enactment of data-aware BPMN process models. We implemented our approach for the Activiti process engine to show applicability.

Cyber-physical Systems with Dynamic Structure

Cyber-physical Systems with Dynamic Structure PDF Author: Basil Becker
Publisher: Universitätsverlag Potsdam
ISBN: 386956217X
Category : Computers
Languages : en
Pages : 40

Get Book Here

Book Description
Cyber-physical systems achieve sophisticated system behavior exploring the tight interconnection of physical coupling present in classical engineering systems and information technology based coupling. A particular challenging case are systems where these cyber-physical systems are formed ad hoc according to the specific local topology, the available networking capabilities, and the goals and constraints of the subsystems captured by the information processing part. In this paper we present a formalism that permits to model the sketched class of cyber-physical systems. The ad hoc formation of tightly coupled subsystems of arbitrary size are specified using a UML-based graph transformation system approach. Differential equations are employed to define the resulting tightly coupled behavior. Together, both form hybrid graph transformation systems where the graph transformation rules define the discrete steps where the topology or modes may change, while the differential equations capture the continuous behavior in between such discrete changes. In addition, we demonstrate that automated analysis techniques known for timed graph transformation systems for inductive invariants can be extended to also cover the hybrid case for an expressive case of hybrid models where the formed tightly coupled subsystems are restricted to smaller local networks.

Proceedings of the 6th Ph.D. Retreat of the HPI Research School on Service-oriented Systems Engineering

Proceedings of the 6th Ph.D. Retreat of the HPI Research School on Service-oriented Systems Engineering PDF Author: Meinel, Christoph
Publisher: Universitätsverlag Potsdam
ISBN: 3869562560
Category :
Languages : en
Pages : 248

Get Book Here

Book Description


Model-driven engineering of adaptation engines for self-adaptive software

Model-driven engineering of adaptation engines for self-adaptive software PDF Author: Thomas Vogel
Publisher: Universitätsverlag Potsdam
ISBN: 3869562277
Category : Computers
Languages : en
Pages : 74

Get Book Here

Book Description
The development of self-adaptive software requires the engineering of an adaptation engine that controls and adapts the underlying adaptable software by means of feedback loops. The adaptation engine often describes the adaptation by using runtime models representing relevant aspects of the adaptable software and particular activities such as analysis and planning that operate on these runtime models. To systematically address the interplay between runtime models and adaptation activities in adaptation engines, runtime megamodels have been proposed for self-adaptive software. A runtime megamodel is a specific runtime model whose elements are runtime models and adaptation activities. Thus, a megamodel captures the interplay between multiple models and between models and activities as well as the activation of the activities. In this article, we go one step further and present a modeling language for ExecUtable RuntimE MegAmodels (EUREMA) that considerably eases the development of adaptation engines by following a model-driven engineering approach. We provide a domain-specific modeling language and a runtime interpreter for adaptation engines, in particular for feedback loops. Megamodels are kept explicit and alive at runtime and by interpreting them, they are directly executed to run feedback loops. Additionally, they can be dynamically adjusted to adapt feedback loops. Thus, EUREMA supports development by making feedback loops, their runtime models, and adaptation activities explicit at a higher level of abstraction. Moreover, it enables complex solutions where multiple feedback loops interact or even operate on top of each other. Finally, it leverages the co-existence of self-adaptation and off-line adaptation for evolution.

HPI Future SOC Lab : proceedings 2011

HPI Future SOC Lab : proceedings 2011 PDF Author: Meinel, Christoph
Publisher: Universitätsverlag Potsdam
ISBN: 3869562307
Category : Computers
Languages : en
Pages : 92

Get Book Here

Book Description
Together with industrial partners Hasso-Plattner-Institut (HPI) is currently establishing a “HPI Future SOC Lab,” which will provide a complete infrastructure for research on on-demand systems. The lab utilizes the latest, multi/many-core hardware and its practical implementation and testing as well as further development. The necessary components for such a highly ambitious project are provided by renowned companies: Fujitsu and Hewlett Packard provide their latest 4 and 8-way servers with 1-2 TB RAM, SAP will make available its latest Business byDesign (ByD) system in its most complete version. EMC² provides high performance storage systems and VMware offers virtualization solutions. The lab will operate on the basis of real data from large enterprises. The HPI Future SOC Lab, which will be open for use by interested researchers also from other universities, will provide an opportunity to study real-life complex systems and follow new ideas all the way to their practical implementation and testing. This technical report presents results of research projects executed in 2011. Selected projects have presented their results on June 15th and October 26th 2011 at the Future SOC Lab Day events.

Covering Or Complete?

Covering Or Complete? PDF Author: Jana Bauckmann
Publisher: Universitätsverlag Potsdam
ISBN: 3869562129
Category : Computers
Languages : en
Pages : 40

Get Book Here

Book Description
Data dependencies, or integrity constraints, are used to improve the quality of a database schema, to optimize queries, and to ensure consistency in a database. In the last years conditional dependencies have been introduced to analyze and improve data quality. In short, a conditional dependency is a dependency with a limited scope defined by conditions over one or more attributes. Only the matching part of the instance must adhere to the dependency. In this paper we focus on conditional inclusion dependencies (CINDs). We generalize the definition of CINDs, distinguishing covering and completeness conditions. We present a new use case for such CINDs showing their value for solving complex data quality tasks. Further, we define quality measures for conditions inspired by precision and recall. We propose efficient algorithms that identify covering and completeness conditions conforming to given quality thresholds. Our algorithms choose not only the condition values but also the condition attributes automatically. Finally, we show that our approach efficiently provides meaningful and helpful results for our use case.

Enriching Raw Events to Enable Process Intelligence

Enriching Raw Events to Enable Process Intelligence PDF Author: Nico Herzberg
Publisher: Universitätsverlag Potsdam
ISBN: 3869562412
Category : Computers
Languages : en
Pages : 42

Get Book Here

Book Description


Explorative authoring of Active Web content in a mobile environment

Explorative authoring of Active Web content in a mobile environment PDF Author: Calmez, Conrad
Publisher: Universitätsverlag Potsdam
ISBN: 3869562323
Category : Computers
Languages : en
Pages : 148

Get Book Here

Book Description
Developing rich Web applications can be a complex job - especially when it comes to mobile device support. Web-based environments such as Lively Webwerkstatt can help developers implement such applications by making the development process more direct and interactive. Further the process of developing software is collaborative which creates the need that the development environment offers collaboration facilities. This report describes extensions of the webbased development environment Lively Webwerkstatt such that it can be used in a mobile environment. The extensions are collaboration mechanisms, user interface adaptations but as well event processing and performance measuring on mobile devices.