-
1
-
-
0032681509
-
A core calculus of dependency
-
ACM Press
-
Abadi, M., Banerjee, A., Heintze, N. and Riecke, J. G. (1999) A core calculus of dependency. In: POPL '99: Proceedings 26th ACM Symposium on Principles of Programming Languages, ACM Press 147-160.
-
(1999)
POPL '99: Proceedings 26th ACM Symposium on Principles of Programming Languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
2
-
-
0029694540
-
Analysis and caching of dependencies
-
Abadi, M., Lampson, B. and Lévy, J.-J. (1996) Analysis and caching of dependencies. In: Proceedings of the first ACM SIGPLAN International Conference on Functional Programming: ICFP, ACM Press 83-91. (Pubitemid 126669211)
-
(1996)
SIGPLAN Notices (ACM Special Interest Group on Programming Languages)
, vol.31
, Issue.6
, pp. 83-91
-
-
Abadi, M.1
Lampson, B.2
Levy, J.-J.3
-
7
-
-
84925001453
-
ULDBs: Databases with uncertainty and lineage
-
VLDB
-
Benjelloun, O., Sarma, A.D., Halevy, A. Y. and Widom, J. (2006) ULDBs: Databases with uncertainty and lineage. In: Proceedings of VLDB'2006, VLDB 953-964.
-
(2006)
Proceedings of VLDB'2006
, pp. 953-964
-
-
Benjelloun, O.1
Sarma, A.D.2
Halevy, A.Y.3
Widom, J.4
-
8
-
-
33745308791
-
An annotation management system for relational databases
-
DOI 10.1007/s00778-005-0156-6
-
Bhagwat, D., Chiticariu, L., Tan, W.-C. and Vijayvargiya, G. (2005) An annotation management system for relational databases. VLDB Journal 14 (4) 373-396. (Pubitemid 43938945)
-
(2005)
VLDB Journal
, vol.14
, Issue.4
, pp. 373-396
-
-
Bhagwat, D.1
Chiticariu, L.2
Tan, W.-C.3
Vijayvargiya, G.4
-
10
-
-
24344453002
-
Lineage retrieval for scientific data processing: A survey
-
DOI 10.1145/1057977.1057978
-
Bose, R. and Frew, J. (2005) Lineage retrieval for scientific data processing: a survey. ACM Comput. Surv. 37 (1) 1-28. (Pubitemid 41246320)
-
(2005)
ACM Computing Surveys
, vol.37
, Issue.1
, pp. 1-28
-
-
Bose, R.1
Frew, J.2
-
11
-
-
33846076805
-
Provenance management in curated databases
-
DOI 10.1145/1142473.1142534, SIGMOD 2006 - Proceedings of the ACM SIGMOD International Conference on Management of Data
-
Buneman, P., Chapman, A. and Cheney, J. (2006) Provenance management in curated databases. In: SIGMOD 2006, ACM Press 539-550. (Pubitemid 46946538)
-
(2006)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 539-550
-
-
Buneman, P.1
Chapman, A.2
Cheney, J.3
-
12
-
-
49549098771
-
Curated databases. Invited paper
-
Buneman, P., Cheney, J., Tan, W.-C. and Vansummeren, S. (2008a) Curated databases. Invited paper in: Proceedings of the 2008 Symposium on Principles of Database Systems (PODS 2008) 1-12.
-
(2008)
Proceedings of the 2008 Symposium on Principles of Database Systems (PODS)
, pp. 1-12
-
-
Buneman, P.1
Cheney, J.2
Tan, W.-C.3
Vansummeren, S.4
-
13
-
-
57849161060
-
On the expressiveness of implicit provenance in query and update languages
-
Buneman, P., Cheney, J. and Vansummeren, S. (2008b) On the expressiveness of implicit provenance in query and update languages. ACM Transactions on Database Systems 33 (4) 28.
-
(2008)
ACM Transactions on Database Systems
, vol.33
, Issue.4
, pp. 28
-
-
Buneman, P.1
Cheney, J.2
Vansummeren, S.3
-
14
-
-
79960570447
-
Why and Where: A Characterization of Data Provenance
-
Buneman, P., Khanna, S. and Tan, W. (2001) Why and where: A characterization of data provenance. In: Proceedings ICDT 2001. Springer-Verlag Lecture Notes in Computer Science 1973 316-330. (Pubitemid 33213333)
-
(2001)
Lecture Notes in Computer Science
, Issue.1973
, pp. 316-330
-
-
Buneman, P.1
Khanna, S.2
Tan, W.-C.3
-
16
-
-
84976862557
-
Comprehension syntax
-
Buneman, P., Libkin, L., Suciu, D., Tannen, V. and Wong, L. (1994) Comprehension syntax. SIGMOD Record 23 (1) 87-96.
-
(1994)
SIGMOD Record
, vol.23
, Issue.1
, pp. 87-96
-
-
Buneman, P.1
Libkin, L.2
Suciu, D.3
Tannen, V.4
Wong, L.5
-
17
-
-
0029376142
-
Principles of programming with complex objects and collection types
-
Buneman, P., Naqvi, S.A., Tannen, V. and Wong, L. (1995) Principles of programming with complex objects and collection types. Theor. Comp. Sci. 149 (1) 3-48.
-
(1995)
Theor. Comp. Sci.
, vol.149
, Issue.1
, pp. 3-48
-
-
Buneman, P.1
Naqvi, S.A.2
Tannen, V.3
Wong, L.4
-
19
-
-
38449097759
-
Provenance as dependency analysis
-
Arenas, M. and Schwartzbach, M.I. (eds.) Proceedings of the 11th International Symposium on Database Programming Languages (DBPL 2007) Springer-Verlag
-
Cheney, J., Ahmed, A. and Acar, U.A. (2007) Provenance as dependency analysis. In: Arenas, M. and Schwartzbach, M.I. (eds.) Proceedings of the 11th International Symposium on Database Programming Languages (DBPL 2007). Springer-Verlag Lecture Notes in Computer Science 4797 139-153.
-
(2007)
Lecture Notes in Computer Science
, vol.4797
, pp. 139-153
-
-
Cheney, J.1
Ahmed, A.2
Acar, U.A.3
-
20
-
-
77951896306
-
Provenance in databases: Why, how, and where
-
Cheney, J., Chiticariu, L. and Tan, W.C. (2009) Provenance in databases: Why, how, and where. Foundations and Trends in Databases 1 (4) 379-474.
-
(2009)
Foundations and Trends in Databases
, vol.1
, Issue.4
, pp. 379-474
-
-
Cheney, J.1
Chiticariu, L.2
Tan, W.C.3
-
22
-
-
0000278897
-
Tracing the lineage of view data in a warehousing environment
-
Cui, Y., Widom, J. and Wiener, J.L. (2000) Tracing the lineage of view data in a warehousing environment. ACM Trans. Database Syst. 25 (2) 179-227.
-
(2000)
ACM Trans. Database Syst.
, vol.25
, Issue.2
, pp. 179-227
-
-
Cui, Y.1
Widom, J.2
Wiener, J.L.3
-
23
-
-
0032295096
-
Dynamic dependence in term rewriting systems and its application to program slicing
-
PII S0950584998000871
-
Field, J. and Tip, F. (1998) Dynamic dependence in term rewriting systems and its application to program slicing. Information and Software Technology 40 (11-12) 609-636. (Pubitemid 128411135)
-
(1998)
Information and Software Technology
, vol.40
, Issue.11-12
, pp. 609-636
-
-
Field, J.1
Tip, F.2
-
24
-
-
80055080989
-
-
Proceedings of the 2006 International Provenance and Annotation Workshop (IPAW 2006), Springer-Verlag
-
Foster, I. and Moreau, L. (eds.) (2006) Proceedings of the 2006 International Provenance and Annotation Workshop (IPAW 2006). Springer-Verlag Lecture Notes in Computer Science 4145.
-
(2006)
Lecture Notes in Computer Science
, pp. 4145
-
-
Foster, I.1
Moreau, L.2
-
26
-
-
33749646942
-
MONDRIAN: Annotating and querying databases through colors and blocks
-
DOI 10.1109/ICDE.2006.102, 1617450, Proceedings of the 22nd International Conference on Data Engineering, ICDE '06
-
Geerts, F., Kementsietsidis, A. and Milano, D. (2006) Mondrian: Annotating and querying databases through colors and blocks. In: Proceedings of the 22nd International Conference on Data Engineering: ICDE 2006, IEEE Computer Society 82. (Pubitemid 44539874)
-
(2006)
Proceedings - International Conference on Data Engineering
, vol.2006
, pp. 82
-
-
Geerts, F.1
Kementsietsidis, A.2
Milano, D.3
-
27
-
-
35448944434
-
Provenance semirings
-
DOI 10.1145/1265530.1265535, Proceedings of the Twenty-sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2007
-
Green, T.J., Karvounarakis, G. and Tannen, V. (2007) Provenance semirings. In: Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (PODS '07), ACM Press 31-40. (Pubitemid 47620878)
-
(2007)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 31-40
-
-
Green, T.J.1
Karvounarakis, G.2
Tannen, V.3
-
28
-
-
34547441851
-
A formal model of dataflow repositories
-
Data Integration in the Life Sciences - 4th International Workshop, DILS 2007, Proceedings
-
Hidders, J., Kwasnikowska, N., Sroka, J., Tyszkiewicz, J. and den Bussche, J.V. (2007) A formal model of dataflow repositories. In: Boulakia, S. C. and Tannen, V. (eds.) Data Integration in the Life Sciences, Proceedings 4th International Workshop, DILS 2007. Springer-Verlag Lecture Notes in Computer Science 4544 105-121. (Pubitemid 47165122)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4544 LNBI
, pp. 105-121
-
-
Hidders, J.1
Kwasnikowska, N.2
Sroka, J.3
Tyszkiewicz, J.4
Van Den Bussche, J.5
-
30
-
-
3042561549
-
Authenticity and integrity in the digital environment: An exploratory analysis of the central role of trust
-
CLIR Report pub92, CLIR
-
Lynch, C. (2000) Authenticity and integrity in the digital environment: An exploratory analysis of the central role of trust. In: Authenticity in the Digital Environment, CLIR Report pub92, CLIR.
-
(2000)
Authenticity in the Digital Environment
-
-
Lynch, C.1
-
32
-
-
85076227002
-
Provenance-aware storage systems
-
USENIX Association
-
Muniswamy-Reddy, K.-K., Holland, D.A., Braun, U. and Seltzer, M. (2006) Provenance-aware storage systems. In: Annual Tech 06: 2006 USENIX Annual Technical Conference, USENIX Association 43-56.
-
(2006)
Annual Tech 06: 2006 USENIX Annual Technical Conference
, pp. 43-56
-
-
Muniswamy-Reddy, K.-K.1
Holland, D.A.2
Braun, U.3
Seltzer, M.4
-
37
-
-
54349124334
-
Securing information flow via dynamic capture of dependencies
-
Shroff, P., Smith, S.F. and Thober, M. (2008) Securing information flow via dynamic capture of dependencies. J. Comput. Secur. 16 (5) 637-688.
-
(2008)
J. Comput. Secur.
, vol.16
, Issue.5
, pp. 637-688
-
-
Shroff, P.1
Smith, S.F.2
Thober, M.3
-
38
-
-
31444456909
-
A survey of data provenance in e-science
-
DOI 10.1145/1084805.1084812
-
Simmhan, Y., Plale, B. and Gannon, D. (2005) A survey of data provenance in e-science. SIGMOD Record 34 (3) 31-36. (Pubitemid 43152529)
-
(2005)
SIGMOD Record
, vol.34
, Issue.3
, pp. 31-36
-
-
Simmhan, Y.L.1
Plale, B.2
Gannon, D.3
-
39
-
-
50249112702
-
Fable: A language for enforcing user-defined security policies
-
Swamy, N., Corcoran, B.J. and Hicks, M. (2008) Fable: A language for enforcing user-defined security policies. In: IEEE Symposium on Security and Privacy, IEEE Computer Society 369-383.
-
(2008)
IEEE Symposium on Security and Privacy, IEEE Computer Society
, pp. 369-383
-
-
Swamy, N.1
Corcoran, B.J.2
Hicks, M.3
-
40
-
-
70350442615
-
A theory of typed coercions and its applications
-
Hutton, G. and Tolmach, A. P. (eds.) ACM Press
-
Swamy, N., Hicks, M.W. and Bierman, G.M. (2009) A theory of typed coercions and its applications. In: Hutton, G. and Tolmach, A. P. (eds.) Proceedings 14th ACM SIGPLAN International Conference on Functional Programming (ICFP 2009), ACM Press 329-340.
-
(2009)
Proceedings 14th ACM SIGPLAN International Conference on Functional Programming (ICFP 2009)
, pp. 329-340
-
-
Swamy, N.1
Hicks, M.W.2
Bierman, G.M.3
-
41
-
-
0030370740
-
A sound type system for secure flow analysis
-
Volpano, D., Irvine, C. and Smith, G. (1996) A sound type system for secure flow analysis. J. Comput. Secur. 4 (2-3) 167-187.
-
(1996)
J. Comput. Secur.
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
-
45
-
-
0030171941
-
Normal forms and conservative extension properties for query languages over collection types
-
DOI 10.1006/jcss.1996.0037
-
Wong, L. (1996) Normal forms and conservative extension properties for query languages over collection types. Journal of Computer and System Sciences 52 (3) 495-505. (Pubitemid 126359773)
-
(1996)
Journal of Computer and System Sciences
, vol.52
, Issue.3
, pp. 495-505
-
-
Wong, L.1
|