نتایج جستجو برای: provenance

تعداد نتایج: 6338  

Journal: :JSW 2013
Xiao Wang Min Wang Yinghan Jin

Network forensic analysis and fault diagnosis are becoming increasingly important in network management and network security domain. This requires network management system has the ability to query network metadata, i.e. the network provenance functionality. For instance, network provenance can be used in tracking the path of dataflow through the network to obtain the source of message data. Th...

2011
Anderson Marinho Marta Mattoso Cláudia Maria Lima Werner Vanessa Braganholo Leonardo Gresta Paulino Murta

Running scientific workflows in distributed and heterogeneous environments has been motivating the definition of provenance gathering approaches that are loosely coupled to workflow management systems. We have developed a provenance management system named ProvManager to manage provenance data in distributed and heterogeneous environments independent of a specific Scientific Workflow Management...

2011
Wenchao Zhou Ling Ding Andreas Haeberlen Zachary G. Ives Boon Thau Loo

In this paper, we explore the use of provenance for analyzing execution dynamics in distributed systems. We argue that provenance could have significant practical benefits for system administrators, e.g., for reasoning about changes in a system’s state, diagnosing protocol misconfigurations, detecting intrusions, and pinpointing performance bottlenecks. However, to realize this vision, we must ...

2017
Qian Zhang Yang Cao Qiwen Wang Duc Vu Priyaa Thavasimani Timothy McPhillips Paolo Missier Peter Slaughter Christopher Jones Matthew B. Jones Bertram Ludäscher

We illustrate how combining retrospective and prospective provenance can yield scientifically meaningful hybrid provenance representations of the computational histories of data produced during a script run. We use scripts from multiple disciplines (astrophysics, climate science, biodiversity data curation, and social network analysis), implemented in Python, R, and MATLAB, to highlight the use...

2015
Adam M. Bates Kevin R. B. Butler Thomas Moyer

When performing automatic provenance collection within the operating system, inevitable storage overheads are made worse by the fact that much of the generated lineage is uninteresting, describing noise and background activities that lie outside the scope the system’s intended use. In this work, we propose a novel approach to policy-based provenance pruning – leverage the confinement properties...

2014
Amir Sezavar Keshavarz Trung Dong Huynh Luc Moreau

It is commonly believed that provenance can be utilised to form assessments about the quality, reliability or trustworthiness of data. Once presented with contradictory or questionable information, users can seek further validation by referring to its provenance. While there has been some effort to design principled methods to analyse provenance, the focus has mostly been on offline use of prov...

2014
Peer Brauer Andreas Czerniak Wilhelm Hasselbring

While creating or processing scientific data, it is very important to capture and to archive the corresponding provenance data. “Start smart and finish wise” is our approach for a provenance aware tooling, which helps data managers and scientists not only to manage their data, but also to capture their scientific data in the field, to record the provenance data, to store it for further analysis...

2010
M. David Allen Len Seligman Barbara Blaustein Adriane Chapman

There is a widespread recognition across MITRE’s sponsors of the importance of capturing the provenance of information (sometimes called lineage or pedigree). However, the technology for supporting capture and usage of provenance is relatively immature. While there has been much research, few commercial capabilities exist. In addition, there is neither a commonly understood concept of operation...

2012
Sérgio Manuel Serra da Cruz Maria Luiza Machado Campos Marta Mattoso

Provenance is a term used to describe the history, lineage or origins of a piece of data. In scientific experiments that are computationally intensive the data resources are produced in large-scale. Thus, as more scientific data are produced the importance of tracking and sharing its metadata grows. Therefore, it is desirable to make it easy to access, share, reuse, integrate and reason. To add...

Journal: :CoRR 2011
Wolfgang Gatterbauer Alexandra Meliou Dan Suciu

We show that the default-all propagation scheme for database annotations is dangerous. Dangerous here means that it can propagate annotations to the query output which are semantically irrelevant to the query the user asked. This is the result of considering all relationally equivalent queries and returning the union of their where-provenance in an attempt to define a propagation scheme that is...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید