72 papers:
- VLDB-2015-DeutchGM #datalog #query #source code #using
- Selective Provenance for Datalog Programs Using Top-K Queries (DD, AG, YM), pp. 1394–1405.
- VLDB-2015-MullerG #abstract interpretation #sql
- Provenance for SQL through Abstract Interpretation: Value-less, but Worthwhile (TM, TG), pp. 1872–1883.
- VLDB-2015-WylotCG #query #web
- A Demonstration of TripleProv: Tracking and Querying Provenance over Web Data (MW, PCM, PTG), pp. 1992–2003.
- ICALP-v2-2015-AmarilliBS
- Provenance Circuits for Trees and Treelike Instances (AA, PB, PS), pp. 56–68.
- GaM-2015-Moreau #graph
- Aggregation by Provenance Types: A Technique for Summarising Provenance Graphs (LM), pp. 129–144.
- CHI-2015-BachourWFHRM #game studies #human-computer #online #people #standard
- Provenance for the People: An HCI Perspective on the W3C PROV Standard through an Online Game (KB, RW, MF, TDH, TR, LM), pp. 2437–2446.
- SAC-2015-ThionLB #data access #data flow #relational
- Tuple-based access control: a provenance-based information flow control for relational data (RT, FL, MBGT), pp. 2165–2170.
- CGO-2015-LuciaC #concurrent #source code
- Data provenance tracking for concurrent programs (BL, LC), pp. 146–156.
- VLDB-2014-DeutchMT #analysis #framework #process
- A Provenance Framework for Data-Dependent Process Analysis (DD, YM, VT), pp. 457–468.
- FASE-2014-MoreauHM #algorithm #api #design #online #testing #validation
- An Online Validator for Provenance: Algorithmic Design, Testing, and API (LM, TDH, DTM), pp. 291–305.
- CSCW-2014-SheppardWT #monitoring #quality #volunteer
- Capturing quality: retaining provenance for curated volunteer monitoring data (SAS, AW, LGT), pp. 1234–1245.
- ICEIS-v2-2014-SouzaVS #ontology
- Domain Ontology for Time Series Provenance (LdS, MSMGV, MSS), pp. 217–224.
- ICEIS-v3-2014-ShamdasaniBMBMBMGE #industrial #named
- CRISTAL-iSE — Provenance Applied in Industry (JS, AB, RM, CB, FM, PB, SM, OG, PE), pp. 453–458.
- ICPR-2014-QureshiHA #probability #using
- A Probabilistic Model for the Optimal Configuration of Retinal Junctions Using Theoretically Proven Features (TAQ, AH, BAD), pp. 3304–3309.
- SAC-2014-CruzBZCC #case study #metadata #workflow
- Collecting cloud provenance metadata with Matriohska: a case study with genomic workflows (SMSdC, LMMB, JZ, RMC, MLMC), pp. 351–356.
- ICDAR-2013-IdikaPV #detection
- Achieving Linguistic Provenance via Plagiarism Detection (NCI, HP, MV), pp. 648–652.
- SIGMOD-2013-RoyCFRZ #information management #refinement #taxonomy
- Provenance-based dictionary refinement in information extraction (SR, LC, VF, FR, HZ), pp. 457–468.
- SAS-2013-MajumdarMW #message passing #source code #verification
- Static Provenance Verification for Message Passing Programs (RM, RM, ZW), pp. 366–387.
- CIKM-2013-MackoMS #clustering #graph
- Local clustering in provenance graphs (PM, DWM, MIS), pp. 835–840.
- KDD-2013-GundechaRFL #social #social media
- A tool for collecting provenance data in social media (PG, SR, ZF, HL), pp. 1462–1465.
- SAC-2013-CruzCMZ #monitoring
- Monitoring SOA-based applications with business provenance (SMSdC, RMC, LMBM, JZ), pp. 1927–1932.
- SIGMOD-2012-XueYC
- Temporal provenance discovery in micro-blog message streams (abstract only) (ZX, JY, BC), p. 864.
- VLDB-2013-ZhouMRLHILS12 #distributed
- Distributed Time-aware Provenance (WZ, SM, YR, YL, AH, ZGI, BTL, MS), pp. 49–60.
- CIKM-2012-BaoKWZS #performance #query #relational
- Efficient provenance storage for relational queries (ZB, HK, LW, XZ, SWS), pp. 1352–1361.
- CIKM-2012-XieFTCMLL #approach #hybrid #performance
- A hybrid approach for efficient provenance storage (YX, DF, ZT, LC, KKMR, YL, DDEL), pp. 1752–1756.
- SEKE-2012-AlvesGBMA #named #using
- SciprovMiner: Provenance Capture Using the OPM Model (TOMA, WG, RMMB, MAM, WA), pp. 491–494.
- SAC-2012-MalaverriML #approach #quality
- A provenance approach to assess the quality of geospatial data (JGM, CBM, RCL), pp. 2043–2044.
- ICSE-2012-Schwarz #development
- Hot clones: Combining search-driven development, clone management, and code provenance (NS), pp. 1628–1629.
- PODS-2011-AmsterdamerDMT #on the
- On provenance minimization (YA, DD, TM, VT), pp. 141–152.
- PODS-2011-AmsterdamerDT #query
- Provenance for aggregate queries (YA, DD, VT), pp. 153–164.
- PODS-2011-DavidsonKMPR #privacy
- Provenance views for module privacy (SBD, SK, TM, DP, SR), pp. 175–186.
- SIGMOD-2011-ZhouFSTHILS #declarative #distributed #framework #maintenance #named #query
- NetTrails: a declarative platform for maintaining and querying provenance in distributed systems (WZ, QF, SS, TT, AH, ZGI, BTL, MS), pp. 1323–1326.
- VLDB-2011-ParkIW #named #pipes and filters #workflow
- RAMP: A System for Capturing and Tracing Provenance in MapReduce Workflows (HP, RI, JW), pp. 1351–1354.
- VLDB-2012-AmsterdamerDDMST11 #workflow
- Putting Lipstick on Pig: Enabling Database-style Workflow Provenance (YA, SBD, DD, TM, JS, VT), pp. 346–357.
- MSR-2011-DaviesGGH
- Software bertillonage: finding the provenance of an entity (JD, DMG, MWG, AH), pp. 183–192.
- CIKM-2011-IkedaSW #workflow
- Provenance-based refresh in data-oriented workflows (RI, SS, JW), pp. 1659–1668.
- KDD-2011-ChakiCG #learning
- Supervised learning for provenance-similarity of binaries (SC, CC, AG), pp. 15–23.
- SAC-2011-TariqBGMTAZ #correlation #identification
- Identifying the provenance of correlated anomalies (DT, BB, AG, SM, RT, AA, FZ), pp. 224–229.
- SOSP-2011-ZhouFNHLS #network
- Secure network provenance (WZ, QF, AN, AH, BTL, MS), pp. 295–310.
- ISSTA-2011-RosenblumMZ
- Recovering the toolchain provenance of binary code (NER, BPM, XZ), pp. 100–110.
- HT-2010-KnutovBP #adaptation #hypermedia
- Provenance meets adaptive hypermedia (EK, PDB, MP), pp. 93–98.
- SIGMOD-2010-BaoDKR #using #workflow
- An optimal labeling scheme for workflow provenance using skeleton labels (ZB, SBD, SK, SR), pp. 711–722.
- SIGMOD-2010-KarvounarakisIT #query
- Querying data provenance (GK, ZGI, VT), pp. 951–962.
- SIGMOD-2010-ZhouSTLLM #maintenance #network #performance #query
- Efficient querying and maintenance of network provenance at internet-scale (WZ, MS, TT, XL, BTL, YM), pp. 615–626.
- VLDB-2010-GlavicAMH #behaviour #comprehension #named
- TRAMP: Understanding the Behavior of Schema Mappings through Provenance (BG, GA, RJM, LMH), pp. 1314–1325.
- PASTE-2010-RosenblumMZ #compilation
- Extracting compiler provenance from program binaries (NER, BPM, XZ), pp. 21–28.
- CHI-2010-JensenLWCSD #case study
- The life and times of files and information: a study of desktop provenance (CJ, HL, EW, JC, MS, TGD), pp. 767–776.
- CIKM-2010-MwebazeMBV #framework #towards
- Towards a provenance framework for sub-image processing for astronomical data (JM, JM, DB, EV), pp. 1277–1280.
- CIKM-2010-TomazelaHCC #integration #named #process
- Print: a provenance model to support integration processes (BT, CSH, RRC, CDdAC), pp. 1349–1352.
- HPDC-2010-GehaniKM #distributed #performance #query
- Efficient querying of distributed provenance stores (AG, MK, TM), pp. 613–621.
- SIGMOD-2009-GlavicA
- The perm provenance management system in action (BG, GA), pp. 1055–1058.
- SIGMOD-2009-SunLDC #analysis #detection #workflow
- Detecting and resolving unsound workflow views for correct provenance analysis (PS, ZL, SBD, YC), pp. 549–562.
- VLDB-2009-BaoBDG #difference #named #workflow
- PDiffView: Viewing the Difference in Provenance of Workflow Results (ZB, SCB, SBD, PG), pp. 1638–1641.
- VLDB-2009-SunLNDC #analysis #detection #named #workflow
- WOLVES: Achieving Correct Provenance Analysis by Detecting and Resolving Unsound Workflow Views (PS, ZL, SN, SBD, YC), pp. 1614–1617.
- CIKM-2009-KementsietsidisW #evaluation #query #question #what
- Provenance query evaluation: what’s so special about it? (AK, MW), pp. 681–690.
- PODS-2008-FosterGT #query #xml
- Annotated XML: queries and provenance (JNF, TJG, VT), pp. 271–280.
- SIGMOD-2008-ChapmanJR #performance
- Efficient provenance storage (AC, HVJ, PR), pp. 993–1006.
- SIGMOD-2008-DavidsonF #challenge #workflow
- Provenance and scientific workflows: challenges and opportunities (SBD, JF), pp. 1345–1350.
- VLDB-2008-HuangCDN #on the #query
- On the provenance of non-answers to queries over extracted data (JH, TC, AD, JFN), pp. 736–747.
- ESOP-2008-CirilloJPR #distributed #named #trust
- Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects (Extended Abstract) (AC, RJ, CP, JR), pp. 208–223.
- FSE-2008-OsterweilCEPWBH #dataset #experience #process #using #workflow
- Experience in using a process language to define scientific workflow and generate dataset provenance (LJO, LAC, AME, RMP, AEW, ERB, JLH), pp. 319–329.
- PODS-2007-GreenKT
- Provenance semirings (TJG, GK, VT), pp. 31–40.
- SIGMOD-2007-BunemanT #database
- Provenance in databases (PB, WCT), pp. 1171–1173.
- VLDB-2007-BitonBD #query #workflow
- Zoom*UserViews: Querying Relevant Provenance in Workflow Systems (OB, SCB, SBD), pp. 1366–1369.
- VLDB-2007-GreenKIT
- Update Exchange with Mappings and Provenance (TJG, GK, ZGI, VT), pp. 675–686.
- DATE-2006-Morin-AlloryB #monitoring #specification
- Proven correct monitors from PSL specifications (KMA, DB), pp. 1246–1251.
- SIGMOD-2006-BunemanCC #database
- Provenance management in curated databases (PB, AC, JC), pp. 539–550.
- SIGMOD-2005-ChiticariuTV #database #named #relational
- DBNotes: a post-it system for relational databases based on provenance (LC, WCT, GV), pp. 942–944.
- CEFP-2005-TejfelHK #source code
- Temporal Properties of Clean Programs Proven in Sparkle-T (MT, ZH, TK), pp. 168–190.
- HPDC-2005-GrothMFWZM #empirical #using
- Recording and using provenance in a protein compressibility experiment (PTG, SM, WF, SCW, KPZ, LM), pp. 201–208.
- ICEIS-v2-2004-Hillbrand
- Building Proven Causal Model Bases for Strategic Decision Support (CH), pp. 178–183.
- DAC-1976-PattersonP #automation
- A proven operational CAD system for P.W.B. design-based on a mini-computer and featuring fully automatic placement and routing (GLP, BHP), pp. 259–264.