Sciweavers

FAST
2009
13 years 2 months ago
Application of Named Graphs Towards Custom Provenance Views
Provenance capture as applied to execution oriented and interactive workflows is designed to record minute detail needed to support a "modify and restart" paradigm as we...
Tara Gibson, Karen Schuchardt, Eric G. Stephan
FAST
2009
13 years 2 months ago
A Framework for Fine-grained Data Integration and Curation, with Provenance, in a Dataspace
Some tasks in a dataspace (a loose collection of heterogeneous data sources) require integration of fine-grained data from diverse sources. This work is often done by end users kn...
David W. Archer, Lois M. L. Delcambre, David Maier
FAST
2009
13 years 2 months ago
Provenance as Data Mining: Combining File System Metadata with Content Analysis
Provenance describes how an object came to be in its present state. Thus, it describes the evolution of the object over time. Prior work on provenance has focussed on databases an...
Vinay Deolalikar, Hernan Laffitte
FAST
2009
13 years 2 months ago
A Formal Model of Provenance in Distributed Systems
We present a formalism for provenance in distributed systems based on the -calculus. Its main feature is that all data products are annotated with metadata representing their prov...
Issam Souilah, Adrian Francalanza, Vladimiro Sasso...
FAST
2009
13 years 2 months ago
Making a Cloud Provenance-Aware
The advent of cloud computing provides a cheap and convenient mechanism for scientists to share data. The utility of such data is obviously enhanced when the provenance of the dat...
Kiran-Kumar Muniswamy-Reddy, Peter Macko, Margo I....
FAST
2009
13 years 2 months ago
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, an...
Ragib Hasan, Radu Sion, Marianne Winslett
FAST
2009
13 years 2 months ago
Towards Semantics for Provenance Security
Provenance records the history of data. Careless use of provenance may violate the security policies of data. Moreover, the provenance itself may be sensitive information, necessi...
Stephen Chong
FAST
2009
13 years 2 months ago
The Case for Browser Provenance
In our increasingly networked world, web browsers are important applications. Originally an interface tool for accessing distributed documents, browsers have become ubiquitous, in...
Daniel W. Margo, Margo I. Seltzer
FAST
2009
13 years 2 months ago
Transparently Gathering Provenance with Provenance Aware Condor
We observed that the Condor batch execution system exposes a lot of information about the jobs that run in the system. This observation led us to explore whether this system infor...
Christine F. Reilly, Jeffrey F. Naughton
WEBI
2010
Springer
13 years 2 months ago
Integrating Provenance Information in Reservoir Engineering
Data management and analysis has become an integral component in the area of reservoir engineering. An important metric that determines the overall effectiveness of data analysis i...
Jing Zhao, Na Chen, Karthik Gomadam, Viktor K. Pra...