Sciweavers

3639 search results - page 5 / 728
» Provenance as Dependency Analysis
Sort
View
PASTE
2010
ACM
15 years 2 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
WEBI
2010
Springer
14 years 7 months ago
Integrating Provenance Information in Reservoir Engineering
Data management and analysis has become an integral component in the area of reservoir engineering. An important metric that determines the overall effectiveness of data analysis i...
Jing Zhao, Na Chen, Karthik Gomadam, Viktor K. Pra...
IPAW
2010
14 years 6 months ago
Towards a Threat Model for Provenance in e-Science
Abstract. Scientists increasingly rely on workflow management systems to perform large-scale computational scientific experiments. These systems often collect provenance informatio...
Luiz M. R. Gadelha Jr., Marta Mattoso, Michael Wil...
EXPERT
2006
107views more  EXPERT 2006»
14 years 9 months ago
Provenance in Agent-Mediated Healthcare Systems
Agent-oriented cooperation techniques and standardized electronic healthcare record exchange protocols can be used to combine information regarding different facets of a therapy re...
Tamás Kifor, László Zsolt Var...
FGCS
2011
123views more  FGCS 2011»
14 years 4 months ago
Mapping attribution metadata to the Open Provenance Model
A description of a data item’s provenance can be provided in different forms, and which form is best depends on the intended use of that description. Because of this, differen...
Simon Miles