Sciweavers

3639 search results - page 8 / 728
» Provenance as Dependency Analysis
Sort
View
IJIEM
2010
171views more  IJIEM 2010»
14 years 8 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
77
Voted
ER
2010
Springer
104views Database» more  ER 2010»
14 years 8 months ago
Provenance Management in BioSciences
: Data provenance is becoming increasingly important for biosciences with the advent of large-scale collaborative environments such as the iPlant collaborative, where scientists co...
Sudha Ram, Jun Liu
ICDE
2009
IEEE
173views Database» more  ICDE 2009»
15 years 11 months ago
Differencing Provenance in Scientific Workflows
Abstract-- Scientific workflow management systems are increaingly providing the ability to manage and query the provenance of data products. However, the problem of differencing th...
Zhuowei Bao, Sarah Cohen Boulakia, Susan B. Davids...
SIGMOD
2011
ACM
177views Database» more  SIGMOD 2011»
14 years 12 days ago
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems
We demonstrate NetTrails, a declarative platform for maintaining and interactively querying network provenance in a distributed system. Network provenance describes the history an...
Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, An...
DSN
2008
IEEE
14 years 11 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu