M. Blaha

ORCID: 0009-0009-1236-4585
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Database Systems and Queries
  • Service-Oriented Architecture and Web Services
  • Software Engineering Research
  • Model-Driven Software Engineering Techniques
  • Manufacturing Process and Optimization
  • Semantic Web and Ontologies
  • Advanced Malware Detection Techniques
  • Mosquito-borne diseases and control
  • Data Management and Algorithms
  • Software Testing and Debugging Techniques
  • Software System Performance and Reliability
  • Big Data and Business Intelligence
  • Malaria Research and Control
  • Distributed and Parallel Computing Systems
  • Data Quality and Management
  • Advanced Software Engineering Methodologies
  • Viral Infections and Vectors
  • Distributed systems and fault tolerance
  • Software Engineering Techniques and Practices
  • Software Engineering and Design Patterns
  • Product Development and Customization
  • Web Application Security Vulnerabilities
  • Engineering and Information Technology
  • Modular Robots and Swarm Intelligence
  • Advanced Data Storage Technologies

Fondazione Edmund Mach
2023-2024

University of Trento
2023

EMT Associates (United States)
1999-2002

General Electric (United States)
1989-2002

Johnson Controls (United States)
2002

Washington University in St. Louis
1985

Invasive Aedes mosquitoes are major vectors of arboviral diseases such as dengue, Zika, and chikungunya, posing an increasing threat to global public health. Their recent geographic expansion calls for predictive models simulate population dynamics transmission risk. Temperature is a key driver in these models, influencing traits that affect vector competence. While data on temperature–dependent abundant aegypti Ae. albopictus, they remain scattered, inconsistent, difficult synthesise. For...

10.32942/x2jd0q preprint EN 2025-04-08

Several processes have been advanced in the literature for reverse engineering of relational databases. The inputs to these are tables and available contextual information. output is a model underlying logical intent, apart from implementation artifacts. Most existing database inadequate; they assume too high quality input authors skilled designers overly optimistic about state-of-the-art, as practiced. This paper catalogs odd aspects designs that we encountered over past several years. Many...

10.1109/wcre.1995.514700 article EN 2002-11-19

Abstract Modelling approaches play a crucial role in supporting local public health agencies by estimating and forecasting vector abundance seasonality. However, the reliability of these models is contingent on availability standardized, high-quality data. Addressing this need, our study focuses collecting harmonizing egg count observations mosquito Aedes albopictus , obtained through ovitraps monitoring surveillance efforts across Albania, France, Italy, Switzerland from 2010 to 2022. We...

10.1038/s41597-024-03482-y article EN cc-by Scientific Data 2024-06-15

A process for reverse engineering of relational databases is proposed. Object-oriented models provide a natural language facilitating the re-engineering process. An object-oriented model can describe existing software, reverse-engineered semantic intent, and forward-engineered new system. The Object Modeling Technique (OMT) notation modeling data adopted. Graphical OMT are intuitive rigorous basis specifying software. more robust than advanced in literature Guidelines coping with design...

10.1109/wcre.1993.287769 article EN Proceedings - Working Conference on Reverse Engineering 2002-12-30

It may seem hard to choose between two software products, but studying their databases can reveal a clear winner and save you years of grief. The most productive way reverse engineer database is build model that conveys the software's scope intent. For clean database, you'll likely want prepare model; for flawed poorly documented it be best stop after style quality structure. At OMT Associates, we generally construct models-usually expressed as Unified Modeling Language (UML) object models....

10.1109/6294.774939 article EN IT Professional 1999-01-01

This approach combines OMTool, an object-model editor, with the Schemer compiler. converts object model into SQL code, which can then be used to generate relational tables. The frees application experts from details of database structure during early development and lets them customize tables a particular RDBMS.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">&gt;</ETX>

10.1109/52.281715 article EN IEEE Software 1994-05-01

The process of software development is gradually achieving more rigor. Proficient developers now construct indirectly through the abstraction models. Models allow a developer to focus on essential aspects an application and defer details. Transformations extend power models, as can substitute refinement optimization models for tedious manipulation code. We catalog object modeling transformations that we have encountered in our work.

10.1109/wcre.1996.558881 article EN 2002-12-23

This paper presents a compilation of results from the reverse engineering 35 databases. All work was performed by same engineer (the author) over past nine years. Since quantity data is large, it has been split between two papers.

10.1109/wcre.2001.957817 article EN 2002-11-13

We articulate the notion of reverse engineering vendor databases and argue that this is a compelling technology organizations should be routinely practicing. take perspective large organization consumer software (and not vendor). frequently engineer in our consulting practice has been enthusiastically received by industry.

10.1109/wcre.1998.723188 article EN 2002-11-27

One continues to be surprised by the variability of reverse engineering problems. When one tackles new problems, often encounters situations not seen before. For these different situations, has adjust techniques, level effort, and expectations. The paper characterizes dimensions variation for databases.

10.1109/wcre.1997.624588 article EN 2002-11-23

Fred Brooks long ago observed that there is no silver bullet to improve software quality. However, are copper bullets-lesser steps quality over time. One of these the notion engineering, practice thinking carefully before immersing yourself in minutia coding. We offer a summary his experience indicating database reverse engineering offers improvement strategy, could benefit entire community.

10.1109/mc.2004.1266291 article EN Computer 2004-02-01

For pt.1 see ibid., p.136-46 (2001). The paper continues the compilation of results from reverse engineering 35 databases. It presents a series standard observations and their variation across reports additional experimental data database engineering. yields insight into state practice for design. is clear that current lacking there are opportunities improvement. community has much work ahead in teaching developers to design databases better. In meantime, engineers can help by calling...

10.1109/wcre.2001.957818 article EN 2002-11-13

A novel system which combines elements of database management, object-oriented technology and artificial intelligence is described. This addresses certain bill-of-material (BOM) configuration generation problems should not be confused with the more typical BOM recursive traversal problems. The automatically extracts design rules from existing designs. then, in turn, applies to generate new It shown that there are special requirements applications make a difficult process.< <ETX...

10.1109/icde.1990.113474 article EN 2002-12-04

Modelling approaches play a crucial role in supporting local public health agencies by estimating and forecasting vector abundance seasonality. However, the reliability of these models is contingent on availability standardized, high-quality data. Addressing this need, our study focuses collecting harmonizing egg count observations Aedes albopictus, obtained through ovitraps monitoring surveillance efforts across Albania, France, Italy, Switzerland from 2010 to 2022. We processed raw obtain...

10.32942/x2s60t preprint EN cc-by 2023-12-22

Data has become our lifeblood, and data warehouses are playing an increasingly prominent role in support of day-to-day business decisions. In this issue, we examine management systems their underlying technologies depth.

10.1109/mc.2001.970555 article EN Computer 2001-12-01

A repository is a database that holds information about models, implementation artifacts, and their mappings. This paper concerns the use of for applications. necessary prerequisite to leverage full potential reverse engineering. Fundamentally we need document correspondence reverse-engineered models original schema. In principle, could such with series transformations. However, transformation theory still evolving model-to-schema mappings provide more primitive basis which transformations...

10.1109/wcre.1998.723186 article EN 2002-11-27

This paper presents an industrial example of database reverse engineering. The has been abridged so that it fits within a paper. Also some the field names have disguised as courtesy to source company. Nevertheless, is real and illustrates kinds mistakes poor design are often found in practice.

10.1109/wcre.1999.806960 article EN 2003-01-20

The authors describe an approach to data modeling that uses object-oriented methods define a pattern for building flexible and maintainable database applications. An equipment example describes application of this in industry. We use the popular Unified. Modeling Language (UML) notation (a comprehensive suite models intended represent software applications fully) illustrate some mechanics pattern's implementation.

10.1109/mc.2002.999773 article EN Computer 2002-05-01

10.1016/0020-0255(89)90036-4 article EN Information Sciences 1989-06-01

We report on an experience in teaching database reverse engineering. found a graduated sequence of case studies to be effective. Our evidence is anecdotal, but we believe the observations will helpful for improving techniques.

10.1109/wcre.2000.891455 article EN 2002-11-07

The author considers the benefits of reverse engineering a database. This recognizes what is good and bad in design understands how these characteristics affect product its use. He discusses implementation recovery, identity conflicts ambiguous assignments.

10.1109/6294.774949 article EN IT Professional 1999-01-01

10.1016/0098-1354(85)80019-3 article EN Computers & Chemical Engineering 1985-01-01

10.1016/0098-1354(89)85049-5 article EN Computers & Chemical Engineering 1989-07-01

Presents letters sent to the editor regarding previous articles from this publication or other relevant topics of discussion.

10.1109/mc.2004.1297289 article EN Computer 2004-04-01
Coming Soon ...