Sciweavers

117 search results - page 2 / 24
» Data Provenance: A Categorization of Existing Approaches
Sort
View
ICAI
2009
13 years 4 months ago
Data Mining in Incomplete Numerical and Categorical Data Sets: A Neuro Fuzzy Approach
- There are many applications dealing with incomplete data sets that take different approaches to making imputations for missing values. Most tackle the problem for numerical input...
Pilar Rey del Castillo, Jesus Cardenosa
ICDT
2001
ACM
124views Database» more  ICDT 2001»
13 years 10 months ago
Why and Where: A Characterization of Data Provenance
Withthe proliferation of database views and curated databases, the issue of data provenance where a piece of data came from and the process by which it arrived in the database is b...
Peter Buneman, Sanjeev Khanna, Wang Chiew Tan
DSN
2008
IEEE
13 years 8 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
SSDBM
2010
IEEE
166views Database» more  SSDBM 2010»
13 years 10 months ago
Bridging Workflow and Data Provenance Using Strong Links
Abstract. As scientists continue to migrate their work to computational methods, it is important to track not only the steps involved in the computation but also the data consumed ...
David Koop, Emanuele Santos, Bela Bauer, Matthias ...
EDBT
2009
ACM
135views Database» more  EDBT 2009»
13 years 11 months ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso