Sciweavers

7607 search results - page 13 / 1522
» Querying data provenance
Sort
View
FAST
2009
13 years 4 months ago
Transparently Gathering Provenance with Provenance Aware Condor
We observed that the Condor batch execution system exposes a lot of information about the jobs that run in the system. This observation led us to explore whether this system infor...
Christine F. Reilly, Jeffrey F. Naughton
CAISE
2006
Springer
13 years 10 months ago
Extending Database Technology: a New Document Data Type
Our research explores a new database extension. Our aim is to see how far it is possible to support collaborative editing and document provenance with database technology, and exte...
Stefania Leone
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 1 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
VLDB
2002
ACM
101views Database» more  VLDB 2002»
14 years 7 months ago
Efficient similarity search for market basket data
Several organizations have developed very large market basket databases for the maintenance of customer transactions. New applications, e.g., Web recommendation systems, present th...
Alexandros Nanopoulos, Yannis Manolopoulos
FAST
2009
13 years 4 months ago
Towards Semantics for Provenance Security
Provenance records the history of data. Careless use of provenance may violate the security policies of data. Moreover, the provenance itself may be sensitive information, necessi...
Stephen Chong