Analysis and design of persistent layer in object-oriented application program based on ORM

作者: Wei Zhang , Linna Zhao

DOI: 10.1109/ICCSNT.2011.6182297

关键词:

摘要: This thesis focuses on the method of directly constructing relational database schema with use object-oriented analysis results and Object/Relation Mapping tools. Compared to traditional entity relation diagram, this kind is much more suitable for design, it has reduced many intermediate links and. Consequently proves be real-time efficient.

参考文章(9)
Ana Garis, Claudia Albornoz, Daniel Riesco, German Montejano, Narayan Debnath, Development of a tool for code automatic generation of persistent objects computer science and software engineering. ,vol. 5, pp. 85- 92 ,(2005) , 10.3233/JCM-2005-5S107
Scott W. Ambler, Ed Roman, Floyd Marinescu, Mastering Enterprise JavaBeans ,(2001)
Hamdy S. Soliman, Mohammed Omari, A neural networks approach to image data compression soft computing. ,vol. 6, pp. 258- 271 ,(2006) , 10.1016/J.ASOC.2004.12.006
Rod Johnson, Juergen Hoeller, Alef Arendsen, R Thomas, Professional Java Development with the Spring Framework ,(2005)
O.A. Bukhres, J. Chen, W. Du, A.K. Elmagarmid, R. Pezzoli, InterBase: an execution environment for heterogeneous software systems IEEE Computer. ,vol. 26, pp. 57- 69 ,(1993) , 10.1109/2.223544
Amit P. Sheth, James A. Larson, Federated database systems for managing distributed, heterogeneous, and autonomous databases ACM Computing Surveys. ,vol. 22, pp. 183- 236 ,(1990) , 10.1145/96602.96604
Wen-Shiung Chen, Lili Hsieh, Shang-Yuan Yuan, High performance data compression method with pattern matching for biomedical ECG and arterial pulse waveforms. Computer Methods and Programs in Biomedicine. ,vol. 74, pp. 11- 27 ,(2004) , 10.1016/S0169-2607(03)00022-1
Kenneth Messa, Bogdan Czejdo, Visual software development using an object-relationship model acm southeast regional conference. pp. 12- ,(1999) , 10.1145/306363.306380
Elisa Bertino, Elena Ferrari, Vijay Atluri, The specification and enforcement of authorization constraints in workflow management systems ACM Transactions on Information and System Security. ,vol. 2, pp. 65- 104 ,(1999) , 10.1145/300830.300837