- Amsterdamer, Y. et al. Putting lipstick on pig: Enabling database-style workflow provenance. In Proceedings of the VLDB Endowment 5, 4 (2011), 346--357. Google ScholarDigital Library
- Biton, O., Cohen-Boulakia, S. and Davidson, S.B. ZOOM*UserViews: Querying relevant provenance in workflow systems. In Proceedings of the 33rd International Conference on Very Large Databases, (2007), 366--1369. Google ScholarDigital Library
- Blum, M. Coin flipping by telephone: a protocol for solving impossible problems. In Advances in Cryptology---A Report on CRYPTO '81, (1982).Google Scholar
- Borkin, M.A. et al. Evaluation of filesystem provenance visualization tools. IEEE Transactions on Visualization and Computer Graphics 19, 12 (2013), 2476--2485. Google ScholarDigital Library
- Braun, U., Shinnar, A., Seltzer, M. 2008. Securing provenance. In Proceedings of the 3rd Usenix Workshop on Hot Topics in Security, (2008), 1--5. Google ScholarDigital Library
- Braun, U. et al. Issues in automatic provenance collection. In Proceedings of the International Conference on Provenance and Annotation of Data, (2006), 171--183. Google ScholarDigital Library
- Buneman, P., Khanna, S. and Tan, W.C. Why and where: A characterization of data provenance. In Proceedings of the 8th International Conference on Database Theory, (2002), 316--330. Google ScholarDigital Library
- Callahan, S.P. et al. Towards process provenance for existing applications. In Proceedings of the 2nd International Provenance and Annotation Workshop, (2008), 120--127.Google Scholar
- Cui, Y., Widom, J. and Wiener, J.L. Tracing the lineage of view data in a warehousing environment. ACM Transactions on Database Systems 25, 2 (2000), 179--227. Google ScholarDigital Library
- Freire, J. et al. Managing rapidly evolving scientific workflows. In Proceedings of the International Conference on Provenance and Annotation of Data, (2006), 10--18. Google ScholarDigital Library
- Gates, C. and Bishop, M. One of these records is not like the others. In Proceedings of the 3rd Usenix Workshop on the Theory and Practice of Provenance, (2011).Google Scholar
- Gehani, A. and Tariq, D. SPADE: Support for provenance auditing in distributed environments. In Proceedings of the 13th International Middleware Conference, (2012), 101--120. Google ScholarDigital Library
- Green, T. J., Karvounarakis, G., Tannen, V. Provenance semirings. In Proceedings of the 26th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, (2007), 31--40. Google ScholarDigital Library
- Guo, P.J., and Seltzer, M. Burrito: Wrapping your lab notebook in computational infrastructure. In Proceedings of the 4th Usenix Conference on Theory and Practice of Provenance, (2012) 7--7. Google ScholarDigital Library
- Halevy, D. and Shamir, A. The LSD broadcast encryption scheme. In Advances in Cryptology, (2002), 47--60. Google ScholarDigital Library
- Hasan, R., Sion, R. and Winslett, M. The case of the fake Picasso: preventing history forgery with secure provenance. In Proceedings of the 7th Conference on File and Storage Technologies, (2009), 1--14. Google ScholarDigital Library
- Macko, P. and Seltzer, M. A general-purpose provenance library. In Proceedings of the 4th Usenix Conference on Theory and Practice of Provenance, (2012), 6--6. Google ScholarDigital Library
- Macko, P. and Seltzer, M. Provenance Map Orbiter: interactive exploration of large provenance graphs. In Proceedings of the 3rd Conference on Theory and Practice of Provenance, (2011)Google Scholar
- McDaniel, P. et al. Towards a secure and efficient system for end-to-end provenance. In Proceedings of the 2nd Conference on Theory and Practice of Provenance, (2010), 2--2. Google ScholarDigital Library
- Moreau, L. and Missier, P. PROV-DM: The PROV Data Model. Technical Report. World Wide Web Consortium, 2013.Google Scholar
- Moreau, L., et al. The Open Provenance Model Core Specification (V1.1). Future Generations Computer Systems 27, 6 (2011), 743--756. Google ScholarDigital Library
- Muniswamy-Reddy, K.-K., et al. Layering in provenance systems. In Proceedings of the Usenix Annual Technical Conference, 2009. Google ScholarDigital Library
- Muniswamy-Reddy, K.-K., et al. Provenance-aware storage systems. In Proceedings of the Usenix Annual Technical Conference, (2006), 43--56. Google ScholarDigital Library
- Park, H., Ikeda, R. and Widom, J. RAMP: A system for capturing and tracing provenance in MapReduce workflows. In Proceedings of the 37th International Conference on Very Large Databases, (2011).Google Scholar
- Saxena, P., Sekar, R. and Puranik, V. Efficient fine-grained binary instrumentation with applications to taint-tracking. In Proceedings of the 6th Annual IEEE/ACM International Symposium on Code Generation and Optimization, (2008), 74--83. Google ScholarDigital Library
- Scheidegger, C., et al. Tackling the provenance challenge one layer at a time. Concurrency and Computation: Practice and Experience 20, 5 (2008), 473--483. Google ScholarDigital Library
- Shamir, A. 1979. How to share a secret. Commun. ACM 22, 11 (Nov. 1979), 612--613. Google ScholarDigital Library
- Widom, J. Trio: A system for integrated management of data, accuracy, and lineage. Technical Report 2004-40, 2004.Google Scholar
Index Terms
- A primer on provenance
Recommendations
An Improved Natural PCR-RFLP Primer Design Method
BIBE '11: Proceedings of the 2011 IEEE 11th International Conference on Bioinformatics and BioengineeringThe polymerase chain reaction restriction fragment length polymorphism (PCR-RFLP) technique is often used in laboratories and many basic research studies of complex genetic diseases associated with single nucleotide polymorphisms (SNP). When performing ...
Dual-genome primer design for construction of DNA microarrays
Motivation: Microarray experiments using probes covering a whole transcriptome are expensive to initiate, and a major part of the costs derives from synthesizing gene-specific PCR primers or hybridization probes. The high costs may force researchers ...
Comments