We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,803 results
  1. Analyzing Discrepancies in Whole-Network Provenance

    Data provenance describes the origins of a digital object. This information is particularly useful when analyzing distributed workflows because...
    Raza Ahmad, Aniket Modi, ... Ashish Gehani in Critical Infrastructure Protection XVII
    Conference paper 2024
  2. Smart flow: a provenance-supported smart contract workflow architecture

    As blockchain technology continues to mature, its potential for use in workflow systems has garnered considerable attention. However, the adoption of...

    Dani Mertens, Jeha Kim, ... Choonhwa Lee in Cluster Computing
    Article 08 April 2024
  3. Encoding feature set information in heterogeneous graph neural networks for game provenance

    Abstract

    Game Provenance has been proposed and employed for Game Analytics tasks as they capture game session data in detail and allow exploratory...

    Sidney Melo, Luís Fernando Bicalho, ... Aline Paes in Applied Intelligence
    Article 21 October 2023
  4. Tracking social provenance in chains of retweets

    In the era of massive sharing of information, the term social provenance is used to denote the ownership, source or origin of a piece of information...

    Sara Migliorini, Mauro Gambini, ... Alberto Belussi in Knowledge and Information Systems
    Article Open access 09 May 2023
  5. Ontology of Product Provenance for Value Networks

    The economic issues surrounding value networks have received much attention from the research community in business modeling. However, other aspects...
    Conference paper 2023
  6. BinAlign: Alignment Padding Based Compiler Provenance Recovery

    Compiler provenance is significant in investigating the source-level indicators of binary code, like development-environment, source compiler, and...
    Maliha Ismail, Yan Lin, ... Debin Gao in Information Security and Privacy
    Conference paper 2023
  7. Efficient Blockchain Data Trusty Provenance Based on the W3C PROV Model

    Data provenance can effectively ensure the correctness of data mining results. To realize efficient and trusty data provenance, we propose an...
    Zhongming Yao, Zhiqiong Wang, ... Junming Xu in Advanced Data Mining and Applications
    Conference paper 2023
  8. Workflow Provenance with PREMIS

    In much the same way that ProvONE extends PROV beyond its original boundaries to address the full temporal spectrum of provenance, this chapter takes...
    Rhiannon Bettivia, Yi-Yun Cheng, Michael Robert Gryk in Documenting the Future: Navigating Provenance Metadata Standards
    Chapter 2022
  9. Image Provenance Analysis

    The literature of multimedia forensics is mainly dedicated to the analysis of single assets (such as sole image or video files), aiming at...
    Daniel Moreira, William Theisen, ... Anderson Rocha in Multimedia Forensics
    Chapter Open access 2022
  10. Using the uniqueness of global identifiers to determine the provenance of Python software source code

    We consider the problem of identifying the provenance of free/open source software (FOSS) and specifically the need of identifying where reused...

    Yiming Sun, Daniel German, Stefano Zacchiroli in Empirical Software Engineering
    Article 20 July 2023
  11. Visionary: a framework for analysis and visualization of provenance data

    Provenance is recognized as a central challenge to establish the reliability and provide security in computational systems. In scientific workflows,...

    Weiner de Oliveira, Regina Braga, ... Gabriellla Castro in Knowledge and Information Systems
    Article 04 January 2022
  12. Automated and non-intrusive provenance capture with UML2PROV

    Data provenance is a form of knowledge graph providing an account of what a system performs, describing the data involved, and the processes carried...

    Carlos Sáenz-Adán, Francisco J. García-Izquierdo, ... Luc Moreau in Computing
    Article Open access 10 December 2021
  13. Provenance-Preserving Analysis and Rewrite of Quantum Workflows for Hybrid Quantum Algorithms

    Quantum applications are hybrid, i.e., they comprise quantum and classical programs, which must be orchestrated. Workflows are a proven solution for...

    Benjamin Weder, Johanna Barzen, ... Frank Leymann in SN Computer Science
    Article Open access 23 February 2023
  14. Systematic Literature Review on Data Provenance in Internet of Things

    Internet of Things(IoT) is a concept that develops day by day and is now an indispensable part of our lives. Although it has been developed a lot, it...
    Conference paper 2022
  15. Big social data provenance framework for Zero-Information Loss Key-Value Pair (KVP) Database

    Social media has been playing a vital importance in information sharing at massive scale due to its easy access, low cost, and faster dissemination...

    Asma Rani, Navneet Goyal, Shashi K. Gadia in International Journal of Data Science and Analytics
    Article 09 November 2021
  16. An evolutionary algorithmic framework cloud based evidence collection architecture

    Forensic in cloud computing is an advancement of evolutionary modern forensic science that protects against cyber criminals. Single centralize point...

    Neeraj Kumar Rathore, Yunus Khan, ... Sunita Varma in Multimedia Tools and Applications
    Article 20 March 2023
  17. A Provenance-based Execution Strategy for Variant GPU-accelerated Scientific Workflows in Clouds

    Several complex scientific simulations process large amounts of distributed and heterogeneous data. These simulations are commonly modeled as...

    Murilo B. Stockinger, Marcos A. Guerine, ... Daniel de Oliveira in Journal of Grid Computing
    Article 27 October 2022
  18. ProML: A Decentralised Platform for Provenance Management of Machine Learning Software Systems

    Large-scale Machine Learning (ML) based Software Systems are increasingly developed by distributed teams situated in different trust domains. Insider...
    Nguyen Khoi Tran, Bushra Sabir, ... Justin Lipman in Software Architecture
    Conference paper 2022
  19. Secure Data Transfer and Provenance for Distributed Healthcare

    The rise of the Internet of Things (IoT) has enabled a shift to a smart, remote, and more distributed healthcare ecosystem supported by...
    Anna Lito Michala, Hani Attar, Ioannis Vourganas in Intelligent Healthcare
    Chapter 2022
  20. ProvAnalyser: A Framework for Scientific Workflows Provenance

    The increasing ability of data-driven science is resulting in a growing need for applications that are under the control of data-centric workflows,...
    Anila Sahar Butt, Peter Fitch in Model-Driven Engineering and Software Development
    Conference paper 2021
Did you find what you were looking for? Share feedback.