Sciweavers

813 search results - page 11 / 163
» Pipeline-centric provenance model
Sort
View
VLDB
2007
ACM
108views Database» more  VLDB 2007»
14 years 7 months ago
Update Exchange with Mappings and Provenance
We consider systems for data sharing among heterogeneous peers related by a network of schema mappings. Each peer has a locally controlled and edited database instance, but wants ...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
CIDR
2011
233views Algorithms» more  CIDR 2011»
12 years 11 months ago
Ibis: A Provenance Manager for Multi-Layer Systems
End-to-end data processing environments are often comprised of several independently-developed (sub-)systems, e.g. for engineering, organizational or historical reasons. Unfortuna...
Christopher Olston, Anish Das Sarma
SEMWEB
2009
Springer
14 years 5 days ago
Reasoning With Provenance, Trust and all that other Meta Knowlege in OWL
Abstract—For many tasks, such as the integration of knowledge bases in the semantic web, one must not only handle the knowledge itself, but also characterizations of this knowled...
Simon Schenk, Renata Queiroz Dividino, Steffen Sta...
FAST
2009
13 years 5 months ago
Provenance as Data Mining: Combining File System Metadata with Content Analysis
Provenance describes how an object came to be in its present state. Thus, it describes the evolution of the object over time. Prior work on provenance has focussed on databases an...
Vinay Deolalikar, Hernan Laffitte
SIGMOD
2010
ACM
170views Database» more  SIGMOD 2010»
14 years 14 days ago
Querying data provenance
Many advanced data management operations (e.g., incremental maintenance, trust assessment, debugging schema mappings, keyword search over databases, or query answering in probabil...
Grigoris Karvounarakis, Zachary G. Ives, Val Tanne...