Understanding Cryptic Schemata in Large Extract-transform-load Systems

Understanding Cryptic Schemata in Large Extract-transform-load Systems
Author :
Publisher : Universitätsverlag Potsdam
Total Pages : 28
Release :
ISBN-10 : 9783869562018
ISBN-13 : 3869562013
Rating : 4/5 (18 Downloads)

Book Synopsis Understanding Cryptic Schemata in Large Extract-transform-load Systems by : Alexander Albrecht

Download or read book Understanding Cryptic Schemata in Large Extract-transform-load Systems written by Alexander Albrecht and published by Universitätsverlag Potsdam. This book was released on 2013 with total page 28 pages. Available in PDF, EPUB and Kindle. Book excerpt: Extract-Transform-Load (ETL) tools are used for the creation, maintenance, and evolution of data warehouses, data marts, and operational data stores. ETL workflows populate those systems with data from various data sources by specifying and executing a DAG of transformations. Over time, hundreds of individual workflows evolve as new sources and new requirements are integrated into the system. The maintenance and evolution of large-scale ETL systems requires much time and manual effort. A key problem is to understand the meaning of unfamiliar attribute labels in source and target databases and ETL transformations. Hard-to-understand attribute labels lead to frustration and time spent to develop and understand ETL workflows. We present a schema decryption technique to support ETL developers in understanding cryptic schemata of sources, targets, and ETL transformations. For a given ETL system, our recommender-like approach leverages the large number of mapped attribute labels in existing ETL workflows to produce good and meaningful decryptions. In this way we are able to decrypt attribute labels consisting of a number of unfamiliar few-letter abbreviations, such as UNP_PEN_INT, which we can decrypt to UNPAID_PENALTY_INTEREST. We evaluate our schema decryption approach on three real-world repositories of ETL workflows and show that our approach is able to suggest high-quality decryptions for cryptic attribute labels in a given schema.


Understanding Cryptic Schemata in Large Extract-transform-load Systems Related Books

Understanding Cryptic Schemata in Large Extract-transform-load Systems
Language: en
Pages: 28
Authors: Alexander Albrecht
Categories: Computers
Type: BOOK - Published: 2013 - Publisher: Universitätsverlag Potsdam

DOWNLOAD EBOOK

Extract-Transform-Load (ETL) tools are used for the creation, maintenance, and evolution of data warehouses, data marts, and operational data stores. ETL workfl
Conceptual Modeling
Language: en
Pages: 608
Authors: Paolo Atzeni
Categories: Computers
Type: BOOK - Published: 2012-10-14 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 31st International Conference on Conceptual Modeling, ER 2012, held in Florence, Italy, in October 2012. T
Modeling and enacting complex data dependencies in business processes
Language: en
Pages: 52
Authors: Meyer, Andreas
Categories: Computers
Type: BOOK - Published: 2013 - Publisher: Universitätsverlag Potsdam

DOWNLOAD EBOOK

Enacting business processes in process engines requires the coverage of control flow, resource assignments, and process data. While the first two aspects are we
Model-driven engineering of adaptation engines for self-adaptive software
Language: en
Pages: 74
Authors: Thomas Vogel
Categories: Computers
Type: BOOK - Published: 2013 - Publisher: Universitätsverlag Potsdam

DOWNLOAD EBOOK

The development of self-adaptive software requires the engineering of an adaptation engine that controls and adapts the underlying adaptable software by means o
Covering Or Complete?
Language: en
Pages: 40
Authors: Jana Bauckmann
Categories: Computers
Type: BOOK - Published: 2012 - Publisher: Universitätsverlag Potsdam

DOWNLOAD EBOOK

Data dependencies, or integrity constraints, are used to improve the quality of a database schema, to optimize queries, and to ensure consistency in a database.