callback( { "result":{ "query":":facetid:toc:\"db/conf/ipaw/ipaw2014.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"197.63" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"39", "@dc":"39", "@oc":"39", "@id":"43407886", "text":":facetid:toc:db/conf/ipaw/ipaw2014.bht" } }, "hits":{ "@total":"39", "@computed":"39", "@sent":"39", "@first":"0", "hit":[{ "@score":"1", "@id":"3670245", "info":{"authors":{"author":[{"@pid":"l/BertramLudascher","text":"Bertram Ludäscher"},{"@pid":"54/6437","text":"Beth Plale"}]},"title":"Provenance and Annotation of Data and Processes - 5th International Provenance and Annotation Workshop, IPAW 2014, Cologne, Germany, June 9-13, 2014. Revised Selected Papers","venue":["IPAW","Lecture Notes in Computer Science"],"volume":"8628","publisher":"Springer","year":"2015","type":"Editorship","key":"conf/ipaw/2014","doi":"10.1007/978-3-319-16462-5","ee":"https://doi.org/10.1007/978-3-319-16462-5","url":"https://dblp.org/rec/conf/ipaw/2014"}, "url":"URL#3670245" }, { "@score":"1", "@id":"3900491", "info":{"authors":{"author":[{"@pid":"17/7558","text":"Mufajjul Ali"},{"@pid":"31/5619","text":"Luc Moreau 0001"}]},"title":"A Provenance-Based Policy Control Framework for Cloud Services.","venue":"IPAW","pages":"127-138","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/AliM14","doi":"10.1007/978-3-319-16462-5_10","ee":"https://doi.org/10.1007/978-3-319-16462-5_10","url":"https://dblp.org/rec/conf/ipaw/AliM14"}, "url":"URL#3900491" }, { "@score":"1", "@id":"3900492", "info":{"authors":{"author":[{"@pid":"02/3013","text":"M. David Allen"},{"@pid":"54/4551","text":"Adriane Chapman"},{"@pid":"16/662","text":"Barbara T. Blaustein"}]},"title":"Engineering Choices for Open World Provenance.","venue":"IPAW","pages":"242-253","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/AllenCB14","doi":"10.1007/978-3-319-16462-5_25","ee":"https://doi.org/10.1007/978-3-319-16462-5_25","url":"https://dblp.org/rec/conf/ipaw/AllenCB14"}, "url":"URL#3900492" }, { "@score":"1", "@id":"3900493", "info":{"authors":{"author":[{"@pid":"95/1296","text":"Pinar Alper"},{"@pid":"39/3585","text":"Khalid Belhajjame"},{"@pid":"g/CaroleAGoble","text":"Carole A. Goble"},{"@pid":"s/PinarSenkul","text":"Pinar Karagoz"}]},"title":"LabelFlow: Exploiting Workflow Provenance to Surface Scientific Data Provenance.","venue":"IPAW","pages":"84-96","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/AlperBGK14","doi":"10.1007/978-3-319-16462-5_7","ee":"https://doi.org/10.1007/978-3-319-16462-5_7","url":"https://dblp.org/rec/conf/ipaw/AlperBGK14"}, "url":"URL#3900493" }, { "@score":"1", "@id":"3900494", "info":{"authors":{"author":[{"@pid":"160/4572","text":"Thiago Silva Barbosa"},{"@pid":"160/4557","text":"Ednaldo O. Santos"},{"@pid":"160/4624","text":"Gustavo B. Lyra"},{"@pid":"65/591","text":"Sérgio Manuel Serra da Cruz"}]},"title":"Using Well-Founded Provenance Ontologies to Query Meteorological Data.","venue":"IPAW","pages":"267-270","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/BarbosaSLC14","doi":"10.1007/978-3-319-16462-5_30","ee":"https://doi.org/10.1007/978-3-319-16462-5_30","url":"https://dblp.org/rec/conf/ipaw/BarbosaSLC14"}, "url":"URL#3900494" }, { "@score":"1", "@id":"3900495", "info":{"authors":{"author":[{"@pid":"154/4626","text":"Stanislav Beran"},{"@pid":"25/2496","text":"Edoardo Pignotti"},{"@pid":"e/PEdwards","text":"Peter Edwards"}]},"title":"Interrogating Capabilities of IoT Devices.","venue":"IPAW","pages":"197-202","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/BeranPE14","doi":"10.1007/978-3-319-16462-5_15","ee":"https://doi.org/10.1007/978-3-319-16462-5_15","url":"https://dblp.org/rec/conf/ipaw/BeranPE14"}, "url":"URL#3900495" }, { "@score":"1", "@id":"3900496", "info":{"authors":{"author":[{"@pid":"138/6389","text":"Peer C. Brauer"},{"@pid":"117/9728","text":"Florian Fittkau"},{"@pid":"h/WilhelmHasselbring","text":"Wilhelm Hasselbring"}]},"title":"The Aspect-Oriented Architecture of the CAPS Framework for Capturing, Analyzing and Archiving Provenance Data.","venue":"IPAW","pages":"223-225","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/BrauerFH14","doi":"10.1007/978-3-319-16462-5_19","ee":"https://doi.org/10.1007/978-3-319-16462-5_19","url":"https://dblp.org/rec/conf/ipaw/BrauerFH14"}, "url":"URL#3900496" }, { "@score":"1", "@id":"3900497", "info":{"authors":{"author":[{"@pid":"77/9854","text":"Mingmin Chen"},{"@pid":"142/2966","text":"Shizhuo Yu"},{"@pid":"154/2992","text":"Parisa Kianmajd"},{"@pid":"214/9260","text":"Nico M. Franz"},{"@pid":"58/576","text":"Shawn Bowers"},{"@pid":"l/BertramLudascher","text":"Bertram Ludäscher"}]},"title":"Provenance for Explaining Taxonomy Alignments.","venue":"IPAW","pages":"258-260","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/ChenYKFBL14","doi":"10.1007/978-3-319-16462-5_27","ee":"https://doi.org/10.1007/978-3-319-16462-5_27","url":"https://dblp.org/rec/conf/ipaw/ChenYKFBL14"}, "url":"URL#3900497" }, { "@score":"1", "@id":"3900498", "info":{"authors":{"author":[{"@pid":"96/3253","text":"James Cheney"},{"@pid":"27/2651","text":"Roly Perera"}]},"title":"An Analytical Survey of Provenance Sanitization.","venue":"IPAW","pages":"113-126","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/CheneyP14","doi":"10.1007/978-3-319-16462-5_9","ee":"https://doi.org/10.1007/978-3-319-16462-5_9","url":"https://dblp.org/rec/conf/ipaw/CheneyP14"}, "url":"URL#3900498" }, { "@score":"1", "@id":"3900499", "info":{"authors":{"author":[{"@pid":"17/10822","text":"Flavio Costa"},{"@pid":"90/2984","text":"Vítor Silva 0003"},{"@pid":"68/7553-1","text":"Daniel de Oliveira 0001"},{"@pid":"75/2286","text":"Kary A. C. S. Ocaña"},{"@pid":"m/MartaLQueirosMattoso","text":"Marta Mattoso"}]},"title":"Towards Supporting Provenance Gathering and Querying in Different Database Approaches.","venue":"IPAW","pages":"254-257","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/CostaSOOM14","doi":"10.1007/978-3-319-16462-5_26","ee":"https://doi.org/10.1007/978-3-319-16462-5_26","url":"https://dblp.org/rec/conf/ipaw/CostaSOOM14"}, "url":"URL#3900499" }, { "@score":"1", "@id":"3900500", "info":{"authors":{"author":[{"@pid":"65/591","text":"Sérgio Manuel Serra da Cruz"},{"@pid":"80/10831","text":"André Luiz de Castro Leal"}]},"title":"Enhancing Provenance Representation with Knowledge Based on NFR Conceptual Modeling: A Softgoal Catalog Approach.","venue":"IPAW","pages":"235-238","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/CruzL14","doi":"10.1007/978-3-319-16462-5_23","ee":"https://doi.org/10.1007/978-3-319-16462-5_23","url":"https://dblp.org/rec/conf/ipaw/CruzL14"}, "url":"URL#3900500" }, { "@score":"1", "@id":"3900501", "info":{"authors":{"author":[{"@pid":"26/1049","text":"Víctor Cuevas-Vicenttín"},{"@pid":"l/BertramLudascher","text":"Bertram Ludäscher"},{"@pid":"28/1062","text":"Paolo Missier"}]},"title":"Provenance-Based Searching and Ranking for Scientific Workflows.","venue":"IPAW","pages":"209-214","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/Cuevas-Vicenttin14","doi":"10.1007/978-3-319-16462-5_17","ee":"https://doi.org/10.1007/978-3-319-16462-5_17","url":"https://dblp.org/rec/conf/ipaw/Cuevas-Vicenttin14"}, "url":"URL#3900501" }, { "@score":"1", "@id":"3900502", "info":{"authors":{"author":[{"@pid":"26/1049","text":"Víctor Cuevas-Vicenttín"},{"@pid":"154/2992","text":"Parisa Kianmajd"},{"@pid":"l/BertramLudascher","text":"Bertram Ludäscher"},{"@pid":"28/1062","text":"Paolo Missier"},{"@pid":"04/5404","text":"Fernando Seabra Chirigati"},{"@pid":"78/5628","text":"Yaxing Wei"},{"@pid":"54/1720","text":"David Koop"},{"@pid":"25/9884","text":"Saumen C. Dey"}]},"title":"Provenance Storage, Querying, and Visualization in PBase.","venue":"IPAW","pages":"239-241","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/Cuevas-Vicenttin14a","doi":"10.1007/978-3-319-16462-5_24","ee":"https://doi.org/10.1007/978-3-319-16462-5_24","url":"https://dblp.org/rec/conf/ipaw/Cuevas-Vicenttin14a"}, "url":"URL#3900502" }, { "@score":"1", "@id":"3900503", "info":{"authors":{"author":[{"@pid":"25/9884","text":"Saumen C. Dey"},{"@pid":"45/329-3","text":"Sven Köhler 0003"},{"@pid":"58/576","text":"Shawn Bowers"},{"@pid":"l/BertramLudascher","text":"Bertram Ludäscher"}]},"title":"Computing Location-Based Lineage from Workflow Specifications to Optimize Provenance Queries.","venue":"IPAW","pages":"180-193","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/Dey0BL14","doi":"10.1007/978-3-319-16462-5_14","ee":"https://doi.org/10.1007/978-3-319-16462-5_14","url":"https://dblp.org/rec/conf/ipaw/Dey0BL14"}, "url":"URL#3900503" }, { "@score":"1", "@id":"3900504", "info":{"authors":{"author":[{"@pid":"147/5256","text":"Hugo Firth"},{"@pid":"28/1062","text":"Paolo Missier"}]},"title":"ProvGen: Generating Synthetic PROV Graphs with Predictable Structure.","venue":"IPAW","pages":"16-27","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/FirthM14","doi":"10.1007/978-3-319-16462-5_2","ee":"https://doi.org/10.1007/978-3-319-16462-5_2","url":"https://dblp.org/rec/conf/ipaw/FirthM14"}, "url":"URL#3900504" }, { "@score":"1", "@id":"3900505", "info":{"authors":{"author":[{"@pid":"63/1981","text":"Luiz M. R. Gadelha Jr."},{"@pid":"m/MartaLQueirosMattoso","text":"Marta Mattoso"}]},"title":"Applying Provenance to Protect Attribution in Distributed Computational Scientific Experiments.","venue":"IPAW","pages":"139-151","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/GadelhaM14","doi":"10.1007/978-3-319-16462-5_11","ee":"https://doi.org/10.1007/978-3-319-16462-5_11","url":"https://dblp.org/rec/conf/ipaw/GadelhaM14"}, "url":"URL#3900505" }, { "@score":"1", "@id":"3900506", "info":{"authors":{"author":[{"@pid":"36/10486","text":"Daniel Garijo"},{"@pid":"88/2686","text":"Yolanda Gil"},{"@pid":"h/AndreasHarth","text":"Andreas Harth"}]},"title":"Challenges for Provenance Analytics Over Geospatial Data.","venue":"IPAW","pages":"261-263","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/GarijoGH14","doi":"10.1007/978-3-319-16462-5_28","ee":"https://doi.org/10.1007/978-3-319-16462-5_28","url":"https://dblp.org/rec/conf/ipaw/GarijoGH14"}, "url":"URL#3900506" }, { "@score":"1", "@id":"3900507", "info":{"authors":{"author":[{"@pid":"16/9636","text":"Devarshi Ghoshal"},{"@pid":"c/ArunChauhan","text":"Arun Chauhan 0001"},{"@pid":"54/6437","text":"Beth Plale"}]},"title":"Regenerating and Quantifying Quality of Benchmarking Data Using Static and Dynamic Provenance.","venue":"IPAW","pages":"56-67","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/GhoshalCP14","doi":"10.1007/978-3-319-16462-5_5","ee":"https://doi.org/10.1007/978-3-319-16462-5_5","url":"https://dblp.org/rec/conf/ipaw/GhoshalCP14"}, "url":"URL#3900507" }, { "@score":"1", "@id":"3900508", "info":{"authors":{"author":[{"@pid":"g/FaustoGiunchiglia","text":"Fausto Giunchiglia"},{"@pid":"160/4482","text":"Moaz Reyad"}]},"title":"Provenance in Open Data Entity-Centric Aggregation.","venue":"IPAW","pages":"232-234","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/GiunghigliaR14","doi":"10.1007/978-3-319-16462-5_22","ee":"https://doi.org/10.1007/978-3-319-16462-5_22","url":"https://dblp.org/rec/conf/ipaw/GiunghigliaR14"}, "url":"URL#3900508" }, { "@score":"1", "@id":"3900509", "info":{"authors":{"author":[{"@pid":"14/2726","text":"Rinke Hoekstra"},{"@pid":"g/PTGroth","text":"Paul Groth"}]},"title":"PROV-O-Viz - Understanding the Role of Activities in Provenance.","venue":"IPAW","pages":"215-220","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/HoekstraG14","doi":"10.1007/978-3-319-16462-5_18","ee":"https://doi.org/10.1007/978-3-319-16462-5_18","url":"https://dblp.org/rec/conf/ipaw/HoekstraG14"}, "url":"URL#3900509" }, { "@score":"1", "@id":"3900510", "info":{"authors":{"author":[{"@pid":"74/4037","text":"Trung Dong Huynh"},{"@pid":"31/5619","text":"Luc Moreau 0001"}]},"title":"ProvStore: A Public Provenance Repository.","venue":"IPAW","pages":"275-277","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/HuynhM14","doi":"10.1007/978-3-319-16462-5_32","ee":"https://doi.org/10.1007/978-3-319-16462-5_32","url":"https://dblp.org/rec/conf/ipaw/HuynhM14"}, "url":"URL#3900510" }, { "@score":"1", "@id":"3900511", "info":{"authors":{"author":[{"@pid":"160/4552","text":"Amir Sezavar Keshavarz"},{"@pid":"74/4037","text":"Trung Dong Huynh"},{"@pid":"31/5619","text":"Luc Moreau 0001"}]},"title":"Provenance for Online Decision Making.","venue":"IPAW","pages":"44-55","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/KeshavarzHM14","doi":"10.1007/978-3-319-16462-5_4","ee":"https://doi.org/10.1007/978-3-319-16462-5_4","url":"https://dblp.org/rec/conf/ipaw/KeshavarzHM14"}, "url":"URL#3900511" }, { "@score":"1", "@id":"3900512", "info":{"authors":{"author":[{"@pid":"32/8503","text":"Timothy Lebo"},{"@pid":"55/4726","text":"Patrick West"},{"@pid":"m/DLMcGuinness","text":"Deborah L. McGuinness"}]},"title":"Walking into the Future with PROV Pingback: An Application to OPeNDAP Using Prizms.","venue":"IPAW","pages":"31-43","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/LeboWM14","doi":"10.1007/978-3-319-16462-5_3","ee":"https://doi.org/10.1007/978-3-319-16462-5_3","url":"https://dblp.org/rec/conf/ipaw/LeboWM14"}, "url":"URL#3900512" }, { "@score":"1", "@id":"3900513", "info":{"authors":{"author":[{"@pid":"l/BSLerner","text":"Barbara Staudt Lerner"},{"@pid":"57/2009","text":"Emery R. Boose"}]},"title":"RDataTracker and DDG Explorer - Capture, Visualization and Querying of Provenance from R Scripts.","venue":"IPAW","pages":"288-290","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/LernerB14","doi":"10.1007/978-3-319-16462-5_36","ee":"https://doi.org/10.1007/978-3-319-16462-5_36","url":"https://dblp.org/rec/conf/ipaw/LernerB14"}, "url":"URL#3900513" }, { "@score":"1", "@id":"3900514", "info":{"authors":{"author":[{"@pid":"19/3756","text":"Milan Markovic"},{"@pid":"e/PEdwards","text":"Peter Edwards"},{"@pid":"17/507","text":"David Corsar"}]},"title":"SC-PROV: A Provenance Vocabulary for Social Computation.","venue":"IPAW","pages":"285-287","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/MarkovicEC14","doi":"10.1007/978-3-319-16462-5_35","ee":"https://doi.org/10.1007/978-3-319-16462-5_35","url":"https://dblp.org/rec/conf/ipaw/MarkovicEC14"}, "url":"URL#3900514" }, { "@score":"1", "@id":"3900515", "info":{"authors":{"author":[{"@pid":"35/9913","text":"Joan Masó"},{"@pid":"160/4546","text":"Guillem Closa"},{"@pid":"88/2686","text":"Yolanda Gil"}]},"title":"Applying W3C PROV to Express Geospatial Provenance at Feature and Attribute Level.","venue":"IPAW","pages":"271-274","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/MasoCG14","doi":"10.1007/978-3-319-16462-5_31","ee":"https://doi.org/10.1007/978-3-319-16462-5_31","url":"https://dblp.org/rec/conf/ipaw/MasoCG14"}, "url":"URL#3900515" }, { "@score":"1", "@id":"3900516", "info":{"authors":{"author":[{"@pid":"75/860","text":"Richard McClatchey"},{"@pid":"09/4119","text":"Jetendr Shamdasani"},{"@pid":"32/2952","text":"Andrew Branson"},{"@pid":"00/909","text":"Kamran Munir"}]},"title":"Provenance Support for Medical Research.","venue":"IPAW","pages":"291-293","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/McClatcheySBM14","doi":"10.1007/978-3-319-16462-5_37","ee":"https://doi.org/10.1007/978-3-319-16462-5_37","url":"https://dblp.org/rec/conf/ipaw/McClatcheySBM14"}, "url":"URL#3900516" }, { "@score":"1", "@id":"3900517", "info":{"authors":{"author":[{"@pid":"28/1062","text":"Paolo Missier"},{"@pid":"b/JeremyBryans","text":"Jeremy W. Bryans"},{"@pid":"30/6114","text":"Carl Gamble"},{"@pid":"76/3626","text":"Vasa Curcin"},{"@pid":"133/0864","text":"Roxana Dánger"}]},"title":"ProvAbs: Model, Policy, and Tooling for Abstracting PROV Graphs.","venue":"IPAW","pages":"3-15","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/MissierBGCD14","doi":"10.1007/978-3-319-16462-5_1","ee":"https://doi.org/10.1007/978-3-319-16462-5_1","url":"https://dblp.org/rec/conf/ipaw/MissierBGCD14"}, "url":"URL#3900517" }, { "@score":"1", "@id":"3900518", "info":{"authors":{"author":[{"@pid":"25/3645","text":"Leonardo Murta 0001"},{"@pid":"84/2055","text":"Vanessa Braganholo"},{"@pid":"04/5404","text":"Fernando Chirigati"},{"@pid":"54/1720","text":"David Koop"},{"@pid":"f/JulianaFreire","text":"Juliana Freire"}]},"title":"noWorkflow: Capturing and Analyzing Provenance of Scripts.","venue":"IPAW","pages":"71-83","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/MurtaBCKF14","doi":"10.1007/978-3-319-16462-5_6","ee":"https://doi.org/10.1007/978-3-319-16462-5_6","url":"https://dblp.org/rec/conf/ipaw/MurtaBCKF14"}, "url":"URL#3900518" }, { "@score":"1", "@id":"3900519", "info":{"authors":{"author":[{"@pid":"119/6545","text":"Tom De Nies"},{"@pid":"17/8212","text":"Robert Meusel"},{"@pid":"79/7737","text":"Dominique Ritze"},{"@pid":"22/5420-1","text":"Kai Eckert 0001"},{"@pid":"55/9872","text":"Anastasia Dimou"},{"@pid":"51/10211","text":"Laurens De Vocht"},{"@pid":"14/9377","text":"Ruben Verborgh"},{"@pid":"29/5203","text":"Erik Mannens"},{"@pid":"86/4708","text":"Rik Van de Walle"}]},"title":"A Lightweight Provenance Pingback and Query Service for Web Publications.","venue":"IPAW","pages":"203-208","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/NiesMR0DVVMW14","doi":"10.1007/978-3-319-16462-5_16","ee":"https://doi.org/10.1007/978-3-319-16462-5_16","url":"https://dblp.org/rec/conf/ipaw/NiesMR0DVVMW14"}, "url":"URL#3900519" }, { "@score":"1", "@id":"3900520", "info":{"authors":{"author":[{"@pid":"125/3382","text":"Diogo Nunes"},{"@pid":"160/4688","text":"Carlos Werly"},{"@pid":"25/1849","text":"Gizelle Kupac Vianna"},{"@pid":"65/591","text":"Sérgio Manuel Serra da Cruz"}]},"title":"Early Discovery of Tomato Foliage Diseases Based on Data Provenance and Pattern Recognition.","venue":"IPAW","pages":"229-231","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/NunesWVC14","doi":"10.1007/978-3-319-16462-5_21","ee":"https://doi.org/10.1007/978-3-319-16462-5_21","url":"https://dblp.org/rec/conf/ipaw/NunesWVC14"}, "url":"URL#3900520" }, { "@score":"1", "@id":"3900521", "info":{"authors":{"author":[{"@pid":"115/4539","text":"Wellington Moreira de Oliveira"},{"@pid":"68/7553-1","text":"Daniel de Oliveira 0001"},{"@pid":"84/2055","text":"Vanessa Braganholo"}]},"title":"Experiencing PROV-Wf for Provenance Interoperability in SWfMSs.","venue":"IPAW","pages":"294-296","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/OliveiraOB14","doi":"10.1007/978-3-319-16462-5_38","ee":"https://doi.org/10.1007/978-3-319-16462-5_38","url":"https://dblp.org/rec/conf/ipaw/OliveiraOB14"}, "url":"URL#3900521" }, { "@score":"1", "@id":"3900522", "info":{"authors":{"author":[{"@pid":"47/8838","text":"Heather S. Packer"},{"@pid":"31/5619","text":"Luc Moreau 0001"}]},"title":"Sentence Templating for Explaining Provenance.","venue":"IPAW","pages":"278-280","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/PackerM14","doi":"10.1007/978-3-319-16462-5_33","ee":"https://doi.org/10.1007/978-3-319-16462-5_33","url":"https://dblp.org/rec/conf/ipaw/PackerM14"}, "url":"URL#3900522" }, { "@score":"1", "@id":"3900523", "info":{"authors":{"author":[{"@pid":"55/1497","text":"Quan Pham"},{"@pid":"m/TanuMalik","text":"Tanu Malik"},{"@pid":"f/IanTFoster","text":"Ian T. Foster"}]},"title":"Auditing and Maintaining Provenance in Software Packages.","venue":"IPAW","pages":"97-109","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/PhamMF14","doi":"10.1007/978-3-319-16462-5_8","ee":"https://doi.org/10.1007/978-3-319-16462-5_8","url":"https://dblp.org/rec/conf/ipaw/PhamMF14"}, "url":"URL#3900523" }, { "@score":"1", "@id":"3900524", "info":{"authors":{"author":[{"@pid":"129/5627","text":"Tianhong Song"},{"@pid":"25/9884","text":"Saumen C. Dey"},{"@pid":"58/576","text":"Shawn Bowers"},{"@pid":"l/BertramLudascher","text":"Bertram Ludäscher"}]},"title":"Improving Workflow Design Using Abstract Provenance Graphs.","venue":"IPAW","pages":"226-228","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/SongDBL14","doi":"10.1007/978-3-319-16462-5_20","ee":"https://doi.org/10.1007/978-3-319-16462-5_20","url":"https://dblp.org/rec/conf/ipaw/SongDBL14"}, "url":"URL#3900524" }, { "@score":"1", "@id":"3900525", "info":{"authors":{"author":[{"@pid":"81/4620","text":"Manolis Stamatogiannakis"},{"@pid":"g/PTGroth","text":"Paul Groth"},{"@pid":"91/800","text":"Herbert Bos"}]},"title":"Looking Inside the Black-Box: Capturing Data Provenance Using Dynamic Instrumentation.","venue":"IPAW","pages":"155-167","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/Stamatogiannakis14","doi":"10.1007/978-3-319-16462-5_12","ee":"https://doi.org/10.1007/978-3-319-16462-5_12","url":"https://dblp.org/rec/conf/ipaw/Stamatogiannakis14"}, "url":"URL#3900525" }, { "@score":"1", "@id":"3900526", "info":{"authors":{"author":[{"@pid":"88/6579","text":"Adianto Wibisono"},{"@pid":"151/0108","text":"Peter Bloem"},{"@pid":"90/8354","text":"Gerben Klaas Dirk de Vries"},{"@pid":"g/PTGroth","text":"Paul Groth"},{"@pid":"22/6302","text":"Adam Belloum"},{"@pid":"88/363","text":"Marian Bubak"}]},"title":"Generating Scientific Documentation for Computational Experiments Using Provenance.","venue":"IPAW","pages":"168-179","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/WibisonoBVGBB14","doi":"10.1007/978-3-319-16462-5_13","ee":"https://doi.org/10.1007/978-3-319-16462-5_13","url":"https://dblp.org/rec/conf/ipaw/WibisonoBVGBB14"}, "url":"URL#3900526" }, { "@score":"1", "@id":"3900527", "info":{"authors":{"author":[{"@pid":"09/10285","text":"Marcin Wylot"},{"@pid":"71/5578","text":"Philippe Cudré-Mauroux"},{"@pid":"g/PTGroth","text":"Paul Groth"}]},"title":"Adaptive RDF Query Processing Based on Provenance.","venue":"IPAW","pages":"264-266","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/WylotCG14","doi":"10.1007/978-3-319-16462-5_29","ee":"https://doi.org/10.1007/978-3-319-16462-5_29","url":"https://dblp.org/rec/conf/ipaw/WylotCG14"}, "url":"URL#3900527" }, { "@score":"1", "@id":"3900528", "info":{"authors":{"author":[{"@pid":"72/4045","text":"Peng Yue"},{"@pid":"24/6205","text":"Xia Guo"},{"@pid":"25/10133","text":"Mingda Zhang"},{"@pid":"153/9350","text":"Liangcun Jiang"}]},"title":"Extending PROV Data Model for Provenance-Aware Sensor Web.","venue":"IPAW","pages":"281-284","year":"2014","type":"Conference and Workshop Papers","access":"open","key":"conf/ipaw/YueGZJ14","doi":"10.1007/978-3-319-16462-5_34","ee":"https://doi.org/10.1007/978-3-319-16462-5_34","url":"https://dblp.org/rec/conf/ipaw/YueGZJ14"}, "url":"URL#3900528" } ] } } } )