Filters








120,719 Hits in 7.8 sec

Case Provenance: The Value of Remembering Case Sources [chapter]

David Leake, Matthew Whitehead
Lecture Notes in Computer Science  
Case-based reasoning systems routinely record the results of prior problem-solving, but not the provenance of new cases: the way in which the new cases were derived.  ...  It illustrates the use of provenance information with studies of the application of provenance information to guide case-base maintenance.  ...  Acknowledgment We thank Steven Bogaerts and the reviewers for helpful comments.  ... 
doi:10.1007/978-3-540-74141-1_14 fatcat:rwcloml55zgblk5rurh7yz4ktm

Beyond Doubt: The Case Against 'Not Proven'

James Chalmers, Fiona Leverick, Vanessa E. Munro
2021 Modern law review  
The not proven verdict, regarded by many as an intermediate option between the other two, has been the subject of a long-running debate as to whether it should be abolished.  ...  Scotland, unusually, has three verdicts in criminal trials: guilty, not guilty, and not proven.  ...  First, we set the scene by outlining a brief history of the not proven verdict, before discussing our data sources.  ... 
doi:10.1111/1468-2230.12707 fatcat:e3kem2t2lzbtpkijotep744ujm

Computational Provenance

Cl Silva, Joel E. Tohline
2008 Computing in science & engineering (Print)  
Acknowledgments This work was funded by the US National Science Foundation, the US Department of Energy, and an IBM Faculty Award. reference M. Schwab, N. Karrenbach, and J.  ...  Ultimately, provenance helps determine an object's value, accuracy, and authorship.  ...  Most dictionaries define provenance as an object's source or origin-a record of an item's ultimate derivation and passage through various owners.  ... 
doi:10.1109/mcse.2008.71 fatcat:nsdyq54dhrdnvjulp4xtzvcj6a

The case for physician assisted suicide: not (yet) proven

B Steinbock
2005 Journal of Medical Ethics  
At present, the case for legalising PAS seems to me to be still-in the words of the Scottish verdict-not proven.  ...  '''I just have my doubts because of the source of the material,' Mr Swenson said.  ... 
doi:10.1136/jme.2003.005801 pmid:15800366 pmcid:PMC1734121 fatcat:dim4jjvvsrco3aackgzb7rc2fm

Clustering provenance facilitating provenance exploration through data abstraction

Linus Karsai, Alan Fekete, Judy Kay, Paolo Missier
2016 Proceedings of the Workshop on Human-In-the-Loop Data Analytics - HILDA '16  
understand the provenance of key digital objects.  ...  This unsolved problem is especially challenging for the case of novice and intermittent users and complex provenance graphs. We tackle this by creating an interface based on a clustering approach.  ...  Viewing the provenance of this report shows which sources have been used (e.g. Fit-Bit 1 data to track steps, Withings 2 scale to track weight) and what processes analysed them.  ... 
doi:10.1145/2939502.2939508 dblp:conf/sigmod/KarsaiFKM16 fatcat:sksjd7w4vveinoae4b54su4sca

CANCER OF THE STOMACH: REVIEW OF FIFTY OPERATIVELY AND PATHOLOGICALLY PROVEN CASES

John B. Fitts
1923 Southern medical journal (Birmingham, Ala. Print)  
The glycyltryptophan test is variable and was not used in our series. Smithies reports that he found it positive in one- third of proven cases.  ...  CANCER OF THE STOMACH: REVIEW OF FIFTY OPERATIVELY AND PATHOLOGICALLY PROVEN CASES* By JOHN B. Fitts, A.B., M.D., Associate in Medicine, School of Medicine, Emory University, Atlanta, Ga.  ... 
doi:10.1097/00007611-192308000-00004 fatcat:6bev7vzb3nh4riukrlnl6dm4om

Data Provenance

Peter Buneman, Wang-Chiew Tan
2019 SIGMOD record  
We used CPR to make two systems durable: (1) a custom in-memory transactional database; and (2) FASTER, our state-of-theart, scalable, larger-than-memory key-value store.  ...  Proposals for causality-based definitions of fairness can correctly model some of these situations, but they rely on background knowledge of the underlying causal models.  ...  The content is solely the responsibility of the authors and does not necessarily represent the official views of the NIH. We thank NVIDIA Corporation for donating the Titan Xp GPU used for this work.  ... 
doi:10.1145/3316416.3316418 fatcat:u4lmbha4fjgajlc46r66ryh7vi

Flow-Based Provenance

Sabah Al-Fedaghi
2017 Informing Science  
We have redrawn several case studies in the framework of our proposed model in order to compare and evaluate it against OPM for representing these cases.  ...  Methodology: Without loss of generality, the focus of this paper is on OPM depiction of provenance in terms of a directed graph.  ...  That section is followed by two main sections, PROVENANCE OF A CAKE and PROVENANCE OF A COFFEE SHOP, in which the proposed modeling language is applied to two known modeling case studies from the literature  ... 
doi:10.28945/3665 fatcat:epi7zzzkzvar5hqhrt2v7dy34u

Neurocognitive functions and brain atrophy after proven neuroborreliosis: a case-control study

Holger Schmidt, Marija Djukic, Klaus Jung, Manfred Holzgraefe, Peter Dechent, Nicole von Steinbüchel, Joachim Blocher, Helmut Eiffert, Carsten Schmidt-Samoa
2015 BMC Neurology  
Conclusion: The mean cognitive functions of patients after proven NB were in the normal range.  ...  However, a lower performance was found for the frontal executive function z-values (mean ± SD -0.29 ± 0.60 vs. 0.09 ± 0.60; p = 0.0059) of NB patients.  ...  in the writing of the review, nor was the decision to submit the paper to BMC NEUROLOGY influenced by the funding sources.  ... 
doi:10.1186/s12883-015-0386-1 pmid:26286440 pmcid:PMC4545711 fatcat:nrtlrnhrqfglhepqr7gc5m4gum

Replacing conjectures by positive knowledge: Inferring proven precise worst-case execution time bounds using symbolic execution

Jens Knoop, Laura Kovács, Jakob Zwirchmayr
2017 Journal of symbolic computation  
In practice most important is the worst-case execution time (WCET) of an ESS, that is, the maximal running time of the system on a specified hardware.  ...  Moreover, our approach improves the quality of the underlying WCET analysis, since it automatically tightens the bound until it is proven precise, thereby improving the precision of the initially computed  ...  We acknowledge funding from the Vienna University of Technology, the Austrian research project FWF S11409-N23, the ERC Starting Grant 2014 SYMCAR 639270, the Wallenberg Academy Fellowship 2014, and the  ... 
doi:10.1016/j.jsc.2016.07.023 fatcat:q6ryk5iwdvhc3gi56zzo5hun2q

Provenance management in curated databases

Peter Buneman, Adriane Chapman, James Cheney
2006 Proceedings of the 2006 ACM SIGMOD international conference on Management of data - SIGMOD '06  
Provenance information concerning the creation, attribution, or version history of such data is crucial for assessing its integrity and scientific value.  ...  Curated databases in bioinformatics and other disciplines are the result of a great deal of manual annotation, correction and transfer of data from other sources.  ...  This work was supported by NSF through a graduate fellowship, by NIH project 1-U54-DA021519-01A1, by EPSRC project R37476 and by funding from the Royal Society.  ... 
doi:10.1145/1142473.1142534 dblp:conf/sigmod/BunemanCC06 fatcat:fgbi3rlnqjffzmdlylnl6bbzwe

KnowledgePearls: Provenance-Based Visualization Retrieval

Holger Stitz, Samuel Gratzl, Harald Piringer, Thomas Zichner, Marc Streit
2018 IEEE Transactions on Visualization and Computer Graphics  
Users can query the provenance graph for visualization states using the search side panel (c).  ...  Depending on the use case, this definition may be provided explicitly by the user by formulating a search query or inferred from given reference states.  ...  This work was supported in part by Boehringer Ingelheim Regional Center Vienna, the Austrian Science Fund (FWF P27975-NBL), and the State of Upper Austria (FFG 851460).  ... 
doi:10.1109/tvcg.2018.2865024 pmid:30136970 fatcat:stdcdtlcovgizdxwjbg4ceohzi

A core calculus for provenance inspection

Wilmer Ricciotti
2017 Proceedings of the 19th International Symposium on Principles and Practice of Declarative Programming - PPDP '17  
the goal of making provenance widely available.  ...  Engineering a software system to make it provenance-aware by means of ad-hoc instrumentation requires a substantial effort: the development of general-purpose infrastructure is thus very important to achieve  ...  time propagating provenance annotations from the source expression to the final value.  ... 
doi:10.1145/3131851.3131871 dblp:conf/ppdp/Ricciotti17 fatcat:imkeuvd6jnhtnnxosdgoz67d7i

A General-Purpose Provenance Library

Peter Macko, Margo I. Seltzer
2012 Workshop on the Theory and Practice of Provenance  
We present the Core Provenance Library (CPL), a portable, multi-lingual library that application programmers can easily incorporate into a variety of tools to collect and integrate provenance.  ...  Although the manual instrumentation adds extra work for application programmers, we show that in most cases, the work is minimal, and the resulting system solves several problems that plague more constrained  ...  Use Cases We have used the CPL in two projects: GraphDB Bench (a part of the Tinkubator [11] project) and Kepler [2] .  ... 
dblp:conf/tapp/MackoS12 fatcat:xh2gdrqdzfcxnktexwxkwpyqcq

Using provenance to debug changing ontologies

Simon Schenk, Renata Dividino, Steffen Staab
2011 Journal of Web Semantics  
In this paper we propose a formalization of provenance, which allows for the computation of provenance for inferences and inconsistencies.  ...  When judging changes of automatically inferred knowledge and when debugging such evolving ontologies, the provenance of axioms (e.g. agent, trust degree and modification time) needs to be taken into account  ...  Remember that we are looking for the pinpoint with the highest provenance label and that the provenance label of the pinpoint is the infimum of the provenance labels of its axioms.  ... 
doi:10.1016/j.websem.2011.06.009 fatcat:5dkguhyaevgaflzysufih2vyju
« Previous Showing results 1 — 15 out of 120,719 results