A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
Applying the Virtual Data Provenance Model
[chapter]
2006
Lecture Notes in Computer Science
To support such analyses, we have developed a "virtual data system" that allows users first to define, then to invoke, and finally explore the provenance of procedures (and workflows comprising multiple ...
This property makes it straightforward for the virtual data system to record not only the recipe for producing any given data object but also sufficient information about the environment in which the recipe ...
We acknowledge the contributions to this work of Jens Voeckler, Jed Dobson, and members of the QuarkNet project. ...
doi:10.1007/11890850_16
fatcat:b3kbldaowvgebojqhqujfgsemm
Advances and Challenges for Scalable Provenance in Stream Processing Systems
[chapter]
2008
Lecture Notes in Computer Science
For example, emerging streaming applications in healthcare or finance call for data provenance, as illustrated in the Century stream processing infrastructure that we are building for supporting online ...
At anytime, given an output data element (e.g., a medical alert) generated by Century, the system must be able to retrieve the input and intermediate data elements that led to its generation. ...
by other PEs, directly influence our ability to accurately apply model-based provenance across PEs. ...
doi:10.1007/978-3-540-89965-5_26
fatcat:znratj32dre5rihd753ctmt6ce
Virtual data Grid middleware services for data-intensive science
2006
Concurrency and Computation
We describe the design and implementation of such middleware services in terms of a virtual data system interface called Chiron, and present virtual data integration examples from the QuarkNet education ...
The Chiron interface also serves as an online "educator" for virtual data applications. ...
The GriPhyN Virtual Data System was implemented by Gaurang Mehta, Karan Vahi, Jens Voeckler, and Yong Zhao. ...
doi:10.1002/cpe.968
fatcat:pxtqiiyg6fdohli2hzqkv7ut5a
Grid middleware services for virtual data discovery, composition, and integration
2004
Proceedings of the 2nd workshop on Middleware for grid computing -
We describe the services, architecture and application of the GriPhyN Virtual Data System, a suite of components and services that allow users to describe virtual data products in declarative terms, discover ...
In particular, we highlight and introduce Chiron, a portal facility that enables the interactive use of the virtual data system. ...
We plan to leverage knowledge representation techniques to enhance metadata annotation and search, and transform serviceoriented scripts into web service interfaces for advanced virtual data integration ...
doi:10.1145/1028493.1028503
dblp:conf/middleware/ZhaoWFVJQD04
fatcat:adsfwwoy7vhb7flyaggx7pbsza
Potency-directed similarity searching using support vector machines
2012
Journal of Cheminformatics
Applied to highthroughput screening data sets, this potency-directed SVM approach met or exceeded the recall performance of standard SVM ranking and led to a notable enrichment of highly potent hits in ...
Regardless of the applied methods, one typically attempts to distinguish "active" from "inactive" compounds. ...
Applied to highthroughput screening data sets, this potency-directed SVM approach met or exceeded the recall performance of standard SVM ranking and led to a notable enrichment of highly potent hits in ...
doi:10.1186/1758-2946-4-s1-p12
pmcid:PMC3341252
fatcat:tlnkjgicq5de7fh46coy4qwvhu
A Forensic Enabled Data Provenance Model for Public Cloud
2018
Journal of Digital Forensics, Security and Law
In this paper, the challenges of cloud architecture are identified, how this affects the existing forensic analysis and provenance techniques is discussed, and a model for efficient provenance collection ...
As a result, improvements in data provenance techniques became necessary. Provenance refers to the record describing the origin and other historical information about a piece of data. ...
This forensic enabled data provenance model also considers the storing of the data along with its metadata in the provenance log. ...
doi:10.15394/jdfsl.2018.1570
fatcat:xk7pqulkynawbhufdctadnhrdm
A Logic Programming Approach to Scientific Workflow Provenance Querying
[chapter]
2008
Lecture Notes in Computer Science
previous relational database based provenance model, virtual data schema, can be easily mapped to the FLOQ model; and iv) We show by examples that FLOQ is expressive enough to formulate common provenance ...
Moreover, we demonstrate that our previous relational database based provenance model, virtual data schema, can be easily mapped to the FLOQ model, and show by various examples that FLOQ is expressive ...
descriptions and apply them to more general workflow provenance problems, not limiting to the virtual data schema defined in the Swift system. ...
doi:10.1007/978-3-540-89965-5_5
fatcat:i5thodt4zzb6pcdo3pib7ha55e
Four level provenance support to achieve portable reproducibility of scientific workflows
2015
2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
Concerning the workflow execution environment we have differentiated four levels of provenance: infrastructural, environmental, workflow and data provenance. ...
The describers of the workflow model enable tracking the different versions of the workflow and their impacts on the execution. ...
Knowing this information the scientist can decide to apply for example an extra provenance policy with extra resource requirement, which stores the whole third party data or apply virtual machine towards ...
doi:10.1109/mipro.2015.7160272
dblp:conf/mipro/BanatiKK15
fatcat:oilznxalifb7hhik2sr2rkn57m
Semantic Provenance for Science Data Products: Application to Image Data Processing
2009
International Semantic Web Conference
Provenance metadata is especially vital to establishing trust, giving the user information on the conditions under which the data originated and any processing that was applied to generate the data product ...
These data services provide a particular challenge because there is decades of existing data whose provenance we will have to reconstruct, and because the quality of the final data product is highly sensitive ...
under the CREST program, grant number HRD-0734825. ...
dblp:conf/semweb/ZednikFMSC08
fatcat:iqbymmdxdbhhpldbcifmofqgum
Framework for Provenance based Virtual Machine Placement in Cloud
2015
International Journal of Education and Management Engineering
This algorithm refers to the history of data which is available in a global provenance database. By utilizing this provenance data, the system performance is improved. ...
This paper proposes a methodology for improving the throughput and effective utilization of resources by appropriately placing the Virtual Machine in the server that would be more productive. ...
According to the provenance data, Cloud Controller/Cloud Broker refers the data from global provenance data base and selects the most suitable Virtual Machine. 6. ...
doi:10.5815/ijeme.2015.01.03
fatcat:imtqk7n6pvb6pjr6ldutuex754
A survey of data provenance in e-science
2005
SIGMOD record
In this paper we create a taxonomy of data provenance characteristics and apply it to current research efforts in e-science, focusing primarily on scientific workflow approaches. ...
Data provenance, one kind of metadata, pertains to the derivation history of a data product starting from its original sources. ...
Provenance is used for on-demand regeneration of derived data ("virtual data"), comparison of data, and auditing data derivations. Chimera uses a process oriented model to record provenance. ...
doi:10.1145/1084805.1084812
fatcat:ldlsaejpmnclxi3rzz2mf2rk2q
LDV: Light-weight database virtualization
2015
2015 IEEE 31st International Conference on Data Engineering
We introduce a linked DB-operating system provenance model and show how to infer data dependencies based on temporal information about the DB operations performed by the application's process(es). ...
A LDV package includes, in addition to the application, either the DB management system (DBMS) and relevant data or, if the DBMS and/or data cannot be shared, just the application-DBMS communications for ...
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. ...
doi:10.1109/icde.2015.7113366
dblp:conf/icde/PhamMGF15
fatcat:syaqewvyengohbqbtddiq3e5l4
Semantically Documenting Virtual Reconstruction: Building a Path to Knowledge Provenance
2015
ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences
uses during the virtual reconstruction process and how they can be linked to the reconstruction output. ...
For our study we adopt the CIDOC-CRM ontological model, and its extensions CRMinf, CRMBa and CRMgeo as a starting point for modelling the arguments and relations. ...
This article would not have been possible without the support and the data of the archaeological site of Grand (Vosges, France) and its researchers' team under the supervision of T. ...
doi:10.5194/isprsannals-ii-5-w3-33-2015
fatcat:neoqr7vp6ndzliohgr3fxv53sy
Adopting Provenance-Based Access Control in OpenStack Cloud IaaS
[chapter]
2014
Lecture Notes in Computer Science
Toward this purpose, we introduce tenant-awareness to the P BACC [14] model by capturing tenant as contextual information in the attribute provenance data. ...
Built on this model, we present a cloud service architecture that provides PBAC authorization service and management. ...
Base PBAC Model (P BAC B ): The base PBAC Model (P BAC B ) [15] is an access control model which bases the authorization decision on provenance data. ...
doi:10.1007/978-3-319-11698-3_2
fatcat:famap5uavjby5gyyl47mneh3pu
From molecule to man: Decision support in individualized E-health
2006
Computer
Bridging the gaps Closing the computational gap in systems biology requires constructing, integrating, and managing a plethora of models. ...
At the same time, a technology push is occurring in computing resources and data availability. 5 In the field of high-performance computing, as computing advanced from sequential to parallel to distributed ...
This research was supported by the Dutch Virtual Laboratory for e-Science project and the European Union ViroLab grant INFSO-IST-027446. ...
doi:10.1109/mc.2006.380
fatcat:wqyjeku3lvfgvmfqmkmiaotajq
« Previous
Showing results 1 — 15 out of 224,185 results