224,185 Hits in 4.3 sec

Applying the Virtual Data Provenance Model [chapter]

Yong Zhao, Michael Wilde, Ian Foster
2006 Lecture Notes in Computer Science  
To support such analyses, we have developed a "virtual data system" that allows users first to define, then to invoke, and finally explore the provenance of procedures (and workflows comprising multiple  ...  This property makes it straightforward for the virtual data system to record not only the recipe for producing any given data object but also sufficient information about the environment in which the recipe  ...  We acknowledge the contributions to this work of Jens Voeckler, Jed Dobson, and members of the QuarkNet project.  ... 
doi:10.1007/11890850_16 fatcat:b3kbldaowvgebojqhqujfgsemm

Advances and Challenges for Scalable Provenance in Stream Processing Systems [chapter]

Archan Misra, Marion Blount, Anastasios Kementsietsidis, Daby Sow, Min Wang
2008 Lecture Notes in Computer Science  
For example, emerging streaming applications in healthcare or finance call for data provenance, as illustrated in the Century stream processing infrastructure that we are building for supporting online  ...  At anytime, given an output data element (e.g., a medical alert) generated by Century, the system must be able to retrieve the input and intermediate data elements that led to its generation.  ...  by other PEs, directly influence our ability to accurately apply model-based provenance across PEs.  ... 
doi:10.1007/978-3-540-89965-5_26 fatcat:znratj32dre5rihd753ctmt6ce

Virtual data Grid middleware services for data-intensive science

Yong Zhao, Michael Wilde, Ian Foster, Jens Voeckler, James Dobson, Eric Gilbert, Thomas Jordan, Elizabeth Quigg
2006 Concurrency and Computation  
We describe the design and implementation of such middleware services in terms of a virtual data system interface called Chiron, and present virtual data integration examples from the QuarkNet education  ...  The Chiron interface also serves as an online "educator" for virtual data applications.  ...  The GriPhyN Virtual Data System was implemented by Gaurang Mehta, Karan Vahi, Jens Voeckler, and Yong Zhao.  ... 
doi:10.1002/cpe.968 fatcat:pxtqiiyg6fdohli2hzqkv7ut5a

Grid middleware services for virtual data discovery, composition, and integration

Yong Zhao, Michael Wilde, Ian Foster, Jens Voeckler, Thomas Jordan, Elizabeth Quigg, James Dobson
2004 Proceedings of the 2nd workshop on Middleware for grid computing -  
We describe the services, architecture and application of the GriPhyN Virtual Data System, a suite of components and services that allow users to describe virtual data products in declarative terms, discover  ...  In particular, we highlight and introduce Chiron, a portal facility that enables the interactive use of the virtual data system.  ...  We plan to leverage knowledge representation techniques to enhance metadata annotation and search, and transform serviceoriented scripts into web service interfaces for advanced virtual data integration  ... 
doi:10.1145/1028493.1028503 dblp:conf/middleware/ZhaoWFVJQD04 fatcat:adsfwwoy7vhb7flyaggx7pbsza

Potency-directed similarity searching using support vector machines

Kathrin Heikamp, Anne M Wassermann, Jürgen Bajorath
2012 Journal of Cheminformatics  
Applied to highthroughput screening data sets, this potency-directed SVM approach met or exceeded the recall performance of standard SVM ranking and led to a notable enrichment of highly potent hits in  ...  Regardless of the applied methods, one typically attempts to distinguish "active" from "inactive" compounds.  ...  Applied to highthroughput screening data sets, this potency-directed SVM approach met or exceeded the recall performance of standard SVM ranking and led to a notable enrichment of highly potent hits in  ... 
doi:10.1186/1758-2946-4-s1-p12 pmcid:PMC3341252 fatcat:tlnkjgicq5de7fh46coy4qwvhu

A Forensic Enabled Data Provenance Model for Public Cloud

Shariful Haque, Travis Atkison
2018 Journal of Digital Forensics, Security and Law  
In this paper, the challenges of cloud architecture are identified, how this affects the existing forensic analysis and provenance techniques is discussed, and a model for efficient provenance collection  ...  As a result, improvements in data provenance techniques became necessary. Provenance refers to the record describing the origin and other historical information about a piece of data.  ...  This forensic enabled data provenance model also considers the storing of the data along with its metadata in the provenance log.  ... 
doi:10.15394/jdfsl.2018.1570 fatcat:xk7pqulkynawbhufdctadnhrdm

A Logic Programming Approach to Scientific Workflow Provenance Querying [chapter]

Yong Zhao, Shiyong Lu
2008 Lecture Notes in Computer Science  
previous relational database based provenance model, virtual data schema, can be easily mapped to the FLOQ model; and iv) We show by examples that FLOQ is expressive enough to formulate common provenance  ...  Moreover, we demonstrate that our previous relational database based provenance model, virtual data schema, can be easily mapped to the FLOQ model, and show by various examples that FLOQ is expressive  ...  descriptions and apply them to more general workflow provenance problems, not limiting to the virtual data schema defined in the Swift system.  ... 
doi:10.1007/978-3-540-89965-5_5 fatcat:i5thodt4zzb6pcdo3pib7ha55e

Four level provenance support to achieve portable reproducibility of scientific workflows

A. Banati, P. Kacsuk, M. Kozlovszky
2015 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)  
Concerning the workflow execution environment we have differentiated four levels of provenance: infrastructural, environmental, workflow and data provenance.  ...  The describers of the workflow model enable tracking the different versions of the workflow and their impacts on the execution.  ...  Knowing this information the scientist can decide to apply for example an extra provenance policy with extra resource requirement, which stores the whole third party data or apply virtual machine towards  ... 
doi:10.1109/mipro.2015.7160272 dblp:conf/mipro/BanatiKK15 fatcat:oilznxalifb7hhik2sr2rkn57m

Semantic Provenance for Science Data Products: Application to Image Data Processing

Stephan Zednik, Peter Fox, Deborah L. McGuinness, Paulo Pinheiro da Silva, Cynthia Chang
2009 International Semantic Web Conference  
Provenance metadata is especially vital to establishing trust, giving the user information on the conditions under which the data originated and any processing that was applied to generate the data product  ...  These data services provide a particular challenge because there is decades of existing data whose provenance we will have to reconstruct, and because the quality of the final data product is highly sensitive  ...  under the CREST program, grant number HRD-0734825.  ... 
dblp:conf/semweb/ZednikFMSC08 fatcat:iqbymmdxdbhhpldbcifmofqgum

Framework for Provenance based Virtual Machine Placement in Cloud

R. Narayani, W. Aisha Banu
2015 International Journal of Education and Management Engineering  
This algorithm refers to the history of data which is available in a global provenance database. By utilizing this provenance data, the system performance is improved.  ...  This paper proposes a methodology for improving the throughput and effective utilization of resources by appropriately placing the Virtual Machine in the server that would be more productive.  ...  According to the provenance data, Cloud Controller/Cloud Broker refers the data from global provenance data base and selects the most suitable Virtual Machine. 6.  ... 
doi:10.5815/ijeme.2015.01.03 fatcat:imtqk7n6pvb6pjr6ldutuex754

A survey of data provenance in e-science

Yogesh L. Simmhan, Beth Plale, Dennis Gannon
2005 SIGMOD record  
In this paper we create a taxonomy of data provenance characteristics and apply it to current research efforts in e-science, focusing primarily on scientific workflow approaches.  ...  Data provenance, one kind of metadata, pertains to the derivation history of a data product starting from its original sources.  ...  Provenance is used for on-demand regeneration of derived data ("virtual data"), comparison of data, and auditing data derivations. Chimera uses a process oriented model to record provenance.  ... 
doi:10.1145/1084805.1084812 fatcat:ldlsaejpmnclxi3rzz2mf2rk2q

LDV: Light-weight database virtualization

Quan Pham, Tanu Malik, Boris Glavic, Ian Foster
2015 2015 IEEE 31st International Conference on Data Engineering  
We introduce a linked DB-operating system provenance model and show how to infer data dependencies based on temporal information about the DB operations performed by the application's process(es).  ...  A LDV package includes, in addition to the application, either the DB management system (DBMS) and relevant data or, if the DBMS and/or data cannot be shared, just the application-DBMS communications for  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1109/icde.2015.7113366 dblp:conf/icde/PhamMGF15 fatcat:syaqewvyengohbqbtddiq3e5l4

Semantically Documenting Virtual Reconstruction: Building a Path to Knowledge Provenance

G. Bruseker, A. Guillem, N. Carboni
2015 ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
uses during the virtual reconstruction process and how they can be linked to the reconstruction output.  ...  For our study we adopt the CIDOC-CRM ontological model, and its extensions CRMinf, CRMBa and CRMgeo as a starting point for modelling the arguments and relations.  ...  This article would not have been possible without the support and the data of the archaeological site of Grand (Vosges, France) and its researchers' team under the supervision of T.  ... 
doi:10.5194/isprsannals-ii-5-w3-33-2015 fatcat:neoqr7vp6ndzliohgr3fxv53sy

Adopting Provenance-Based Access Control in OpenStack Cloud IaaS [chapter]

Dang Nguyen, Jaehong Park, Ravi Sandhu
2014 Lecture Notes in Computer Science  
Toward this purpose, we introduce tenant-awareness to the P BACC [14] model by capturing tenant as contextual information in the attribute provenance data.  ...  Built on this model, we present a cloud service architecture that provides PBAC authorization service and management.  ...  Base PBAC Model (P BAC B ): The base PBAC Model (P BAC B ) [15] is an access control model which bases the authorization decision on provenance data.  ... 
doi:10.1007/978-3-319-11698-3_2 fatcat:famap5uavjby5gyyl47mneh3pu

From molecule to man: Decision support in individualized E-health

P.M.A. Sloot, A. Tirado-Ramos, I. Altintas, M. Bubak, C. Boucher
2006 Computer  
Bridging the gaps Closing the computational gap in systems biology requires constructing, integrating, and managing a plethora of models.  ...  At the same time, a technology push is occurring in computing resources and data availability. 5 In the field of high-performance computing, as computing advanced from sequential to parallel to distributed  ...  This research was supported by the Dutch Virtual Laboratory for e-Science project and the European Union ViroLab grant INFSO-IST-027446.  ... 
doi:10.1109/mc.2006.380 fatcat:wqyjeku3lvfgvmfqmkmiaotajq
« Previous Showing results 1 — 15 out of 224,185 results