Sciweavers

1494 search results - page 5 / 299
» Efficient provenance storage
Sort
View
BTW
2007
Springer
123views Database» more  BTW 2007»
13 years 12 months ago
Data Provenance: A Categorization of Existing Approaches
: In many application areas like e-science and data-warehousing detailed information about the origin of data is required. This kind of information is often referred to as data pro...
Boris Glavic, Klaus R. Dittrich
SIGMOD
2005
ACM
118views Database» more  SIGMOD 2005»
14 years 6 months ago
A survey of data provenance in e-science
Data management is growing in complexity as largescale applications take advantage of the loosely coupled resources brought together by grid middleware and by abundant storage cap...
Yogesh Simmhan, Beth Plale, Dennis Gannon
EDBT
2010
ACM
123views Database» more  EDBT 2010»
13 years 9 months ago
Lost source provenance
As the use of derived information has grown in recent years, the importance of provenance has been recognized, and there has been a great deal of effort devoted to developing tec...
Jing Zhang, H. V. Jagadish
MOBISYS
2007
ACM
14 years 5 months ago
A time-and-value centric provenance model and architecture for medical event streams
Provenance becomes a critical requirement for healthcare IT infrastructures, especially when pervasive biomedical sensors act as a source of raw medical streams for large-scale, a...
Min Wang, Marion Blount, John Davis, Archan Misra,...
TWC
2008
176views more  TWC 2008»
13 years 5 months ago
Key Management for UMTS MBMS
3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service (MB...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin, Kwang-Chen...