Sciweavers

76 search results - page 11 / 16
» The Provenance of Workflow Upgrades
Sort
View
ATAL
2008
Springer
13 years 9 months ago
Using SOA Provenance to Implement Norm Enforcement in e-Institutions
In the last 10 years several approaches and technologies other than MAS (such as Web services and Grid computing) have emerged, with the support of the industry, providing their o...
Javier Vázquez-Salceda, Sergio Álvar...
IGARSS
2009
13 years 5 months ago
Using SensorML to Describe Scientific Workflows in Distributed Web Service Environments
Scientific Workflows provides a technology that facilitates researchers by allowing them to capture in a machine processable manner the method relating to some research. This incr...
Terence L. van Zyl, Anwar Vahed, Graeme McFerren, ...
LREC
2010
136views Education» more  LREC 2010»
13 years 9 months ago
LoonyBin: Keeping Language Technologists Sane through Automated Management of Experimental (Hyper)Workflows
Many contemporary language technology systems are characterized by long pipelines of tools with complex dependencies. Too often, these workflows are implemented by ad hoc scripts;...
Jonathan H. Clark, Alon Lavie
TASE
2010
IEEE
13 years 2 months ago
Clear and Precise Specification of Ecological Data Management Processes and Dataset Provenance
Abstract--With the availability of powerful computational and communication systems, scientists now readily access large, complicated derived datasets and build on those results to...
Leon J. Osterweil, Lori A. Clarke, Aaron M. Elliso...
ACSAC
2000
IEEE
13 years 11 months ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr