Sciweavers

406 search results - page 3 / 82
» PASSing the provenance challenge
Sort
View
DASFAA
2009
IEEE
151views Database» more  DASFAA 2009»
15 years 4 months ago
The Challenge of Assuring Data Trustworthiness
Abstract. With the increased need of data sharing among multiple organizations, such as government organizations, financial corporations, medical hospitals and academic institution...
Elisa Bertino, Chenyun Dai, Murat Kantarcioglu
PODS
2011
ACM
163views Database» more  PODS 2011»
14 years 13 days ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...
CORR
2011
Springer
198views Education» more  CORR 2011»
14 years 4 months ago
Quire: Lightweight Provenance for Smart Phone Operating Systems
Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of ...
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anh...
CONCURRENCY
2008
127views more  CONCURRENCY 2008»
14 years 9 months ago
gLite Job Provenance - a job-centric view
ct Job Provenance (JP) is a Grid service that keeps long-term trace on completed computations for further reference. It is a job-centric service, keeping records about job life cyc...
Ales Krenek, Jirí Sitera, Ludek Matyska, Fr...
NIPS
2007
14 years 11 months ago
Fixing Max-Product: Convergent Message Passing Algorithms for MAP LP-Relaxations
We present a novel message passing algorithm for approximating the MAP problem in graphical models. The algorithm is similar in structure to max-product but unlike max-product it ...
Amir Globerson, Tommi Jaakkola