-
1
-
-
72249095091
-
-
Principles of provenance wiki. http://wiki.esi.ac.uk/-Principles of Provenance.
-
Principles of provenance wiki. http://wiki.esi.ac.uk/-Principles of Provenance.
-
-
-
-
2
-
-
72249093878
-
-
Grand challenges in computing, research. Technical report, British Computing Society
-
Grand challenges in computing - research. Technical report, British Computing Society, 2004.
-
(2004)
-
-
-
3
-
-
84869731851
-
-
INFOSEC hard problem list. Technical report, INFOSEC Research Council
-
INFOSEC hard problem list. Technical report, INFOSEC Research Council, 2005. http://www.infosec-research.org/-docs public/20051130-IRC-HPL-FINAL.pdf.
-
(2005)
-
-
-
4
-
-
0036039865
-
Adaptive functional programming
-
ACM Press
-
Umut A. Acar, Guy E. Blelloch, and Robert Harper. Adaptive functional programming. In POPL, pages 247-259. ACM Press, 2002.
-
(2002)
POPL
, pp. 247-259
-
-
Acar, U.A.1
Blelloch, G.E.2
Harper, R.3
-
5
-
-
72249108078
-
-
David E. Bell and Leonard La Padula. Secure computer system: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306, MITRE Corp. MTR-2997, Bedford, MA, 1975.
-
David E. Bell and Leonard La Padula. Secure computer system: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306, MITRE Corp. MTR-2997, Bedford, MA, 1975.
-
-
-
-
6
-
-
84865636781
-
Boomerang: Resourceful lenses for string data
-
ACM
-
Aaron Bohannon, J. Nathan Foster, Benjamin C. Pierce, Alexandre Pilkiewicz, and Alan Schmitt. Boomerang: resourceful lenses for string data. In POPL, pages 407-419. ACM, 2008.
-
(2008)
POPL
, pp. 407-419
-
-
Bohannon, A.1
Nathan Foster, J.2
Pierce, B.C.3
Pilkiewicz, A.4
Schmitt, A.5
-
7
-
-
24344453002
-
Lineage retrieval for scientific data processing: A survey
-
Rajendra Bose and James Frew. Lineage retrieval for scientific data processing: a survey. ACM Comput. Surv., 37(1):1-28, 2005.
-
(2005)
ACM Comput. Surv
, vol.37
, Issue.1
, pp. 1-28
-
-
Bose, R.1
Frew, J.2
-
8
-
-
85091898032
-
Securing provenance
-
Berkeley, CA, USA, USENIX Association
-
Uri Braun, Avraham Shinnar, and Margo Seltzer. Securing provenance. In HOTSEC'08: Proceedings of the 3rd conference on Hot topics in security, pages 1-5, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
HOTSEC'08: Proceedings of the 3rd conference on Hot topics in security
, pp. 1-5
-
-
Braun, U.1
Shinnar, A.2
Seltzer, M.3
-
9
-
-
57849161060
-
On the expressiveness of implicit provenance in query and update languages
-
November
-
Peter Buneman, James Cheney, and Stijn Vansummeren. On the expressiveness of implicit provenance in query and update languages. ACM Transactions on Database Systems, 33(4):28, November 2008.
-
(2008)
ACM Transactions on Database Systems
, vol.33
, Issue.4
, pp. 28
-
-
Buneman, P.1
Cheney, J.2
Vansummeren, S.3
-
10
-
-
79960570447
-
-
Peter Buneman, Sanjeev Khanna, andWang-Chiew Tan. Why and where: A characterization of data provenance. In ICDT, number 1973 in LNCS, pages 316-330. Springer, 2001.
-
Peter Buneman, Sanjeev Khanna, andWang-Chiew Tan. Why and where: A characterization of data provenance. In ICDT, number 1973 in LNCS, pages 316-330. Springer, 2001.
-
-
-
-
11
-
-
0036038747
-
On propagation of deletions and annotations through views
-
Peter Buneman, Sanjeev Khanna, and Wang-Chiew Tan. On propagation of deletions and annotations through views. In PODS, pages 150-158, 2002.
-
(2002)
PODS
, pp. 150-158
-
-
Buneman, P.1
Khanna, S.2
Tan, W.-C.3
-
12
-
-
72249089673
-
-
Susan Carey and Geoffrey Rogow. UAL shares fall as old story surfaces online. Wall Street Journal, September 2008. http://online.wsj.com/article/ SB122088673-738010213.html.
-
Susan Carey and Geoffrey Rogow. UAL shares fall as old story surfaces online. Wall Street Journal, September 2008. http://online.wsj.com/article/ SB122088673-738010213.html.
-
-
-
-
13
-
-
38449097759
-
Provenance as dependency analysis
-
DBPL, of, Springer
-
James Cheney, Amal Ahmed, and Umut A. Acar. Provenance as dependency analysis. In DBPL, volume 4797 of Lecture Notes in Computer Science, pages 138-152. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4797
, pp. 138-152
-
-
Cheney, J.1
Ahmed, A.2
Acar, U.A.3
-
14
-
-
85026994506
-
Towards semantics for provenance security
-
Berkeley, CA, USA, USENIX Association
-
Stephen Chong. Towards semantics for provenance security. In TAPP'09: First workshop on on Theory and practice of provenance, pages 1-5, Berkeley, CA, USA, 2009. USENIX Association.
-
(2009)
TAPP'09: First workshop on on Theory and practice of provenance
, pp. 1-5
-
-
Chong, S.1
-
15
-
-
0000278897
-
Tracing the lineage of view data in a warehousing environment
-
Yingwei Cui, Jennifer Widom, and Janet L. Wiener. Tracing the lineage of view data in a warehousing environment. ACM Trans. Database Syst., 25(2):179-227, 2000.
-
(2000)
ACM Trans. Database Syst
, vol.25
, Issue.2
, pp. 179-227
-
-
Cui, Y.1
Widom, J.2
Wiener, J.L.3
-
19
-
-
0003707584
-
-
Ashish Gupta and Iderpal Singh Mumick, editors, MIT Press, Cambridge, MA, USA
-
Ashish Gupta and Iderpal Singh Mumick, editors. Materialized views: Techniques, Implementations, and Applications. MIT Press, Cambridge, MA, USA, 1999.
-
(1999)
Materialized views: Techniques, Implementations, and Applications
-
-
-
20
-
-
29144510111
-
Causes and explanations: A structural-model approach-part I: Causes
-
J.Y. Halpern and J. Pearl. Causes and explanations: A structural-model approach-part I: Causes. British J. Philos. Sci., 56:843-887, 2005.
-
(2005)
British J. Philos. Sci
, vol.56
, pp. 843-887
-
-
Halpern, J.Y.1
Pearl, J.2
-
21
-
-
18244363330
-
Cyberinfrastructure for e-science
-
T. Hey and A. E. Trefethen. Cyberinfrastructure for e-science. Science, 308(5723):817-821, 2005.
-
(2005)
Science
, vol.308
, Issue.5723
, pp. 817-821
-
-
Hey, T.1
Trefethen, A.E.2
-
22
-
-
84869734533
-
The economy is still at the brink
-
June
-
Sandy B. Lewis and William D. Cohan. The economy is still at the brink. New York Times, June 2007. http://www.nytimes.com/2009/06/07/opinion/- 07cohanWEB.html.
-
(2007)
New York Times
-
-
Lewis, S.B.1
Cohan, W.D.2
-
23
-
-
0035124553
-
When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web
-
Clifford A. Lynch. When documents deceive: trust and provenance as new factors for information retrieval in a tangled web. J. Am. Soc. Inf. Sci. Technol., 52(1):12-17, 2001.
-
(2001)
J. Am. Soc. Inf. Sci. Technol
, vol.52
, Issue.1
, pp. 12-17
-
-
Lynch, C.A.1
-
25
-
-
41149175552
-
Extracting causal graphs from an open provenance data model
-
Simon Miles, Paul T. Groth, Steve Munroe, Sheng Jiang, Thibaut Assandri, and Luc Moreau. Extracting causal graphs from an open provenance data model. Concurrency and Computation: Practice and Experience, 20(5):577-586, 2008.
-
(2008)
Concurrency and Computation: Practice and Experience
, vol.20
, Issue.5
, pp. 577-586
-
-
Miles, S.1
Groth, P.T.2
Munroe, S.3
Jiang, S.4
Assandri, T.5
Moreau, L.6
-
26
-
-
33947317844
-
A scientist's nightmare: Software problem leads to five retractions
-
December
-
Greg Miller. A scientist's nightmare: Software problem leads to five retractions. Science, 314(5807):1856-1857, December 2006.
-
(2006)
Science
, vol.314
, Issue.5807
, pp. 1856-1857
-
-
Miller, G.1
-
27
-
-
85076227002
-
Provenance-aware storage systems
-
USENIX, June
-
Kiran-Kumar Muniswamy-Reddy, David A. Holland, Uri Braun, and Margo Seltzer. Provenance-aware storage systems. In USENIX Annual Technical Conference, pages 43-56. USENIX, June 2006.
-
(2006)
USENIX Annual Technical Conference
, pp. 43-56
-
-
Muniswamy-Reddy, K.-K.1
Holland, D.A.2
Braun, U.3
Seltzer, M.4
-
28
-
-
85006210403
-
Review on computational trust and reputation models
-
Jordi Sabater and Carles Sierra. Review on computational trust and reputation models. Artif. Intell. Rev., 24(1):33-60, 2005.
-
(2005)
Artif. Intell. Rev
, vol.24
, Issue.1
, pp. 33-60
-
-
Sabater, J.1
Sierra, C.2
-
29
-
-
31444456909
-
A survey of data provenance in e-science
-
Yogesh Simmhan, Beth Plale, and Dennis Gannon. A survey of data provenance in e-science. SIGMOD Record, 34(3):31-36, 2005.
-
(2005)
SIGMOD Record
, vol.34
, Issue.3
, pp. 31-36
-
-
Simmhan, Y.1
Plale, B.2
Gannon, D.3
-
30
-
-
0013091874
-
MetaML and multi-stage programming with explicit annotations
-
Walid Taha and Tim Sheard. MetaML and multi-stage programming with explicit annotations. Theoretical Computer Science, 248(1-2):211-242, 2000.
-
(2000)
Theoretical Computer Science
, vol.248
, Issue.1-2
, pp. 211-242
-
-
Taha, W.1
Sheard, T.2
-
31
-
-
33750087260
-
Security issues in a SOA-based provenance system
-
Luc Moreau and Ian T. Foster, editors, IPAW, of, Springer
-
Victor Tan, Paul T. Groth, Simon Miles, Sheng Jiang, Steve Munroe, Sofia Tsasakou, and Luc Moreau. Security issues in a SOA-based provenance system. In Luc Moreau and Ian T. Foster, editors, IPAW, volume 4145 of Lecture Notes in Computer Science, pages 203-211. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4145
, pp. 203-211
-
-
Tan, V.1
Groth, P.T.2
Miles, S.3
Jiang, S.4
Munroe, S.5
Tsasakou, S.6
Moreau, L.7
-
32
-
-
0030165962
-
Reflective programming in the relational algebra
-
Jan Van den Bussche, Dirk Van Gucht, and Gottfried Vossen. Reflective programming in the relational algebra. Journal of Computer and System Sciences, 52(3):537-549, 1996.
-
(1996)
Journal of Computer and System Sciences
, vol.52
, Issue.3
, pp. 537-549
-
-
Van den Bussche, J.1
Van Gucht, D.2
Vossen, G.3
-
34
-
-
84902511024
-
Three decades of data integration - all problems solved?
-
René Jacquart, editor, Kluwer
-
Patrick Ziegler and Klaus R. Dittrich. Three decades of data integration - all problems solved? In René Jacquart, editor, IFIP Congress Topical Sessions, pages 3-12. Kluwer, 2004.
-
(2004)
IFIP Congress Topical Sessions
, pp. 3-12
-
-
Ziegler, P.1
Dittrich, K.R.2
|