Sciweavers

1575 search results - page 145 / 315
» The provenance of electronic data
Sort
View
NLE
2010
112views more  NLE 2010»
14 years 10 months ago
A non-negative tensor factorization model for selectional preference induction
Distributional similarity methods have proven to be a valuable tool for the induction of semantic similarity. Up till now, most algorithms use two-way cooccurrence data to compute...
Tim Van de Cruys
SIGMETRICS
2010
ACM
144views Hardware» more  SIGMETRICS 2010»
14 years 10 months ago
The sustainability hub: an information management tool for analysis and decision making
Sustainability is becoming an increasingly important driver for which decision makers – consumers, corporate and government – rely on principled, accurate and provenanced metr...
Steve Cayzer, Chris Preist
GCA
2009
14 years 9 months ago
Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation
This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged int...
Po-Wah Yau, Allan Tomlinson
DEBU
2010
134views more  DEBU 2010»
14 years 9 months ago
Causality in Databases
Provenance is often used to validate data, by verifying its origin and explaining its derivation. When searching for "causes" of tuples in the query results or in genera...
Alexandra Meliou, Wolfgang Gatterbauer, Joseph Y. ...
FAC
2010
106views more  FAC 2010»
14 years 9 months ago
Automatic verification of Java programs with dynamic frames
Framing in the presence of data abstraction is a challenging and important problem in the verification of object-oriented programs [LLM07]. The dynamic frames approach is a promisi...
Jan Smans, Bart Jacobs, Frank Piessens, Wolfram Sc...