Sciweavers

7607 search results - page 32 / 1522
» Querying data provenance
Sort
View
SIGSOFT
2008
ACM
14 years 8 months ago
Experience in using a process language to define scientific workflow and generate dataset provenance
This paper describes our experiences in exploring the applicability of software engineering approaches to scientific data management problems. Specifically, this paper describes h...
Leon J. Osterweil, Lori A. Clarke, Aaron M. Elliso...
DSN
2008
IEEE
13 years 9 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
IJIEM
2010
171views more  IJIEM 2010»
13 years 5 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
BMCBI
2008
121views more  BMCBI 2008»
13 years 7 months ago
OntoDas - a tool for facilitating the construction of complex queries to the Gene Ontology
Background: Ontologies such as the Gene Ontology can enable the construction of complex queries over biological information in a conceptual way, however existing systems to do thi...
Kieran O'Neill, Alexander García Castro, An...
ICDE
2012
IEEE
202views Database» more  ICDE 2012»
11 years 9 months ago
Recomputing Materialized Instances after Changes to Mappings and Data
—A major challenge faced by today’s information systems is that of evolution as data usage evolves or new data resources become available. Modern organizations sometimes exchan...
Todd J. Green, Zachary G. Ives