Sciweavers

49 search results - page 3 / 10
» Provenance Traces
Sort
View
GRID
2007
Springer
13 years 5 months ago
The Requirements of Using Provenance in e-Science Experiments
In e-Science experiments, it is vital to record the experimental process for later use such as in interpreting results, verifying that the correct process took place or tracing whe...
Simon Miles, Paul T. Groth, Miguel Branco, Luc Mor...
CIDR
2011
233views Algorithms» more  CIDR 2011»
12 years 8 months ago
Ibis: A Provenance Manager for Multi-Layer Systems
End-to-end data processing environments are often comprised of several independently-developed (sub-)systems, e.g. for engineering, organizational or historical reasons. Unfortuna...
Christopher Olston, Anish Das Sarma
EDBT
2010
ACM
164views Database» more  EDBT 2010»
13 years 8 months ago
Techniques for efficiently querying scientific workflow provenance graphs
A key advantage of scientific workflow systems over traditional scripting approaches is their ability to automatically record data and process dependencies introduced during workf...
Manish Kumar Anand, Shawn Bowers, Bertram Ludä...
DSN
2008
IEEE
13 years 7 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
DASFAA
2009
IEEE
147views Database» more  DASFAA 2009»
14 years 2 days ago
"Pay-as-You-Go" Processing for Tracing Queries in a P2P Record Exchange System
In recent years, data provenance or lineage tracing which refers to the process of tracing the sources of data, data movement between databases, and annotations written for data ha...
Fengrong Li, Takuya Iida, Yoshiharu Ishikawa