References
- Abdeltawab M. Ahmed Hendawi b, Ali Hamed El Bastawissy, Shaker H. Ali El-Sappagh, “A proposed model for data warehouse ETL processes”, 2011.
- Dr.Kamal Kakish, Dr.Theresa A. Kraft, “ETL Evolution for Real-Time DataWarehousing”, 2012.
- DrSonali Vyas, “Analyzing Performance of Virtual and Non-Virtual Database”, 2015.
- DrV S Dhaka, Sonali Vyas, “The Use and Industrial Importance of Virtual Databases”, 2014.
- DrVS Dhaka, Sonali Vyas, “Analysis of Server Performance with Different Techniques of Virtual Databases”, 2014.
- Krzysztof Dembczynski, “Data Integration and ETL Process”, 2015.
- M. Lenzerini. Data integration: A theoretical perspective. In PODS, pages 233–246, 2002.
- Miroslav Dzakovic, “Industrial Application of Automated Regression Testing in Test-Driven ETL Development”, 2016
- N. Nataraj, Dr.R.V. Nataraj, “Analysis of ETL Process in Data Warehouse”, 2014.
- Nuno Gomes, Orlando Belo, “Modelling an Opportunistic ETL Agent Based System Using YAWL”, 2016
- Panos Vassiliadis, Alkis Simitsis, “EXTRACTION, TRANSFORMATION, AND LOADING” W. Labio, J. L. Wiener, H. Garcia-Molina and V. Gorelik. Efficient resumption of interrupted warehouse loads. In Proceedings of ACM SIGMOD, pages 46–57 ACM. 2000.
- Philip Woodall, Torben Jess, Mark Harrison, “A Framework for Detecting Unnecessary Industrial Data in ETL Processes”, 2014.
- R. Fagin, P. G. Kolaitis, and L. Popa. Data exchange: getting to the core. ACM Trans. Database Syst., 30(1):174–210, 2015 doi: 10.1145/1061318.1061323
- Satkaur, Anuj Mehta, “A Review Paper on scope of ETL in retail domain”, 2013.
- Shaker H. Ali El-Sappagh a,*, Abdeltawab M. Ahmed Hendawi b, “A proposed model for data warehouse ETL processes”, 2011.
- TPC. TPC-DS (Decision Support) specification, draft version 52, February 2007.
- W. Inmon. Building the Data Warehouse. John Wiley & Sons, 2nd edition, 1996.
- https://docs.oracle.com/cd/B19306_01/server.102/b14223/et-tover.html
- http://datawarehouse4u.info/ETL-process.html
- Iovane, Gerardo, and Enver Sangineto. “LICoS: Landmark-based Identikit Composition and Suspect Retrieval.” Journal of Discrete Mathematical Sciences and Cryptography 11.1 (2008): 83–98. doi: 10.1080/09720529.2008.10698168
- http://www.sciencedirect.com/science/article/pii/S131915781100019X.
- http://www.srmuniv.ac.in/sites/default/files/files/ETL.pdf.