-
1
-
-
85094864802
-
-
LAIKA
-
LAIKA. http://laika.sourceforge.net/.
-
-
-
-
2
-
-
85094841564
-
-
NIST Schematron
-
NIST Schematron. http://xreg2.nist.gov/ cda- validation/archives.html/.
-
-
-
-
4
-
-
85094865450
-
-
Schematron
-
Schematron. http://www.schematron.com.
-
-
-
-
5
-
-
85094815388
-
-
Schematron
-
Schematron. http://en.wikipedia.org/wiki/ Schematron.
-
-
-
-
6
-
-
85094840063
-
-
Tupelo
-
Tupelo. http://tupeloproject.ncsa.uiuc.edu/.
-
-
-
-
7
-
-
50249184837
-
Plus: Synthesizing privacy, lineage, uncertainty and security
-
BLAUSTEIN, B. T., SELIGMAN, L., MORSE, M., ALLEN, M. D., AND ROSENTHAL, A. Plus: Synthesizing privacy, lineage, uncertainty and security. In ICDE Workshops (2008), pp. 242-245.
-
(2008)
ICDE Workshops
, pp. 242-245
-
-
BLAUSTEIN, B. T.1
SELIGMAN, L.2
MORSE, M.3
ALLEN, M. D.4
ROSENTHAL, A.5
-
8
-
-
57149142858
-
Project histories: Managing data provenance across collection-oriented scientific workflow runs
-
BOWERS, S., MCPHILLIPS, T., WU, M., AND LUDSCHER, B. Project histories: Managing data provenance across collection-oriented scientific workflow runs. In DILS (2007), pp. 27-29.
-
(2007)
DILS
, pp. 27-29
-
-
BOWERS, S.1
MCPHILLIPS, T.2
WU, M.3
LUDSCHER, B.4
-
9
-
-
78650051495
-
-
BRAUN, U., HOLLAND, D. A., MUNISWAMY-REDDY, K.K., AND SELTZER, M. Coping with cycles in provenance. http://www.eecs.harvard.edu/~syrah/pass/pubs/cycles.pdf, 2006.
-
(2006)
Coping with cycles in provenance
-
-
BRAUN, U.1
HOLLAND, D. A.2
MUNISWAMY-REDDY, K.K.3
SELTZER, M.4
-
10
-
-
41149161699
-
Addressing the provenance challenge using zoom
-
COHEN-BOULAKIA, S., BITON, O., COHEN, S., AND DAVIDSON, S. Addressing the provenance challenge using zoom. Concurr. Comput.: Pract. Exper. 20, 5 (2008), 497-506.
-
(2008)
Concurr. Comput.: Pract. Exper
, vol.20
, Issue.5
, pp. 497-506
-
-
COHEN-BOULAKIA, S.1
BITON, O.2
COHEN, S.3
DAVIDSON, S.4
-
11
-
-
33846077413
-
Michigan Molecular Interactions (MiMI): Putting the jigsaw puzzle together
-
ET AL. (Jan)
-
JAYAPANDIAN, M., CHAPMAN, A., ET AL. Michigan Molecular Interactions (MiMI): Putting the jigsaw puzzle together. Nucleic Acid Research (Jan 2007), D566-D571.
-
(2007)
Nucleic Acid Research
, pp. D566-D571
-
-
JAYAPANDIAN, M.1
CHAPMAN, A.2
-
12
-
-
1142291594
-
Mapping data in peer-to-peer systems: semantics and algorithmic issues
-
(New York, NY, USA), ACM
-
KEMENTSIETSIDIS, A., ARENAS, M., AND MILLER, R. J. Mapping data in peer-to-peer systems: semantics and algorithmic issues. In SIGMOD'03: Proceedings of the 2003 ACM SIGMOD international conference on Management of data (New York, NY, USA, 2003), ACM, pp. 325-336.
-
(2003)
SIGMOD'03: Proceedings of the 2003 ACM SIGMOD international conference on Management of data
, pp. 325-336
-
-
KEMENTSIETSIDIS, A.1
ARENAS, M.2
MILLER, R. J.3
-
14
-
-
50649104772
-
-
December
-
MOREAU, L., FREIRE, J., FUTRELLE, J., MCGRATH, R., MYERS, J., AND PAULSON, P. The open provenance model, December 2007.
-
(2007)
The open provenance model
-
-
MOREAU, L.1
FREIRE, J.2
FUTRELLE, J.3
MCGRATH, R.4
MYERS, J.5
PAULSON, P.6
-
16
-
-
85076227002
-
Provenance-aware storage systems
-
(June)
-
MUNISWAMY-REDDY, K.-K., HOLLAND, D. A., BRAUN, U., AND SELTZER, M. Provenance-aware storage systems. In Proceedingsofthe2006USENIXAnnualTechnicalConference(June 2006).
-
(2006)
Proceedingsofthe2006USENIXAnnualTechnicalConference
-
-
MUNISWAMY-REDDY, K.-K.1
HOLLAND, D. A.2
BRAUN, U.3
SELTZER, M.4
-
18
-
-
85094844405
-
-
The First Provenance Challenge
-
The First Provenance Challenge. http://twiki.ipaw.info/bin/view/Challenge/ FirstProvenanceChallenge.
-
-
-
-
19
-
-
85094825513
-
-
The Second Provenance Challenge
-
The Second Provenance Challenge. http://twiki.ipaw.info/bin/view/Challenge/ SecondProvenanceChallenge.
-
-
-
-
20
-
-
85094865061
-
-
The Third Provenance Challenge
-
The Third Provenance Challenge. http://twiki.ipaw.info/bin/view/Challenge/ ThirdProvenanceChallenge.
-
-
-
-
21
-
-
41149134435
-
Tackling the Provenance Challenge one layer at a time
-
(April)
-
SCHEIDEGGER, C., KOOP, D., SANTOS, E., VO, H., CALLAHAN, S., FREIRE, J., AND SILVA, C. Tackling the Provenance Challenge one layer at a time. Concurrency and Computation: Practice and Experience 20 (April 2008), 473-483.
-
(2008)
Concurrency and Computation: Practice and Experience
, vol.20
, pp. 473-483
-
-
SCHEIDEGGER, C.1
KOOP, D.2
SANTOS, E.3
VO, H.4
CALLAHAN, S.5
FREIRE, J.6
SILVA, C.7
-
22
-
-
77954719060
-
The role of schema matching in large enterprises
-
SMITH, K., MORSE, M., MORK, P., LI, M., ROSENTHAL, A., ALLEN, D., AND SELIGMAN, L. The role of schema matching in large enterprises. In CIDR (2009).
-
(2009)
CIDR
-
-
SMITH, K.1
MORSE, M.2
MORK, P.3
LI, M.4
ROSENTHAL, A.5
ALLEN, D.6
SELIGMAN, L.7
|