Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
Banzhaf Values for Facts in Query Answering
Proceedings of the ACM on Management of Data (PACMMOD), Volume 2, Issue 3Article No.: 123, Pages 1–26https://doi.org/10.1145/3654926Quantifying the contribution of database facts to query answers has been studied as means of explanation. The Banzhaf value, originally developed in Game Theory, is a natural measure of fact contribution, yet its efficient computation for select-project-...
- research-articleJune 2022
PROV-IO: An I/O-Centric Provenance Framework for Scientific Data on HPC Systems
HPDC '22: Proceedings of the 31st International Symposium on High-Performance Parallel and Distributed ComputingPages 213–226https://doi.org/10.1145/3502181.3531477cData provenance, or data lineage, describes the life cycle of data. In scientific workflows on HPC systems, scientists often seek diverse provenance (e.g., origins of data products, usage patterns of datasets). Unfortunately, existing provenance ...
- research-articleJune 2022
Efficient approximate search for sets of lineage vectors
TaPP '22: Proceedings of the 14th International Workshop on the Theory and Practice of ProvenanceArticle No.: 5, Pages 1–8https://doi.org/10.1145/3530800.3534532One can approximate the lineage of a Database (DB) tuple using a small set of low dimensional vectors. To identify actual lineage tuples using these vector sets, given a set of vectors (of the target tuple), one needs to locate "close" sets of vectors ...
- research-articleJune 2022
Towards practical approximate lineage
TaPP '22: Proceedings of the 14th International Workshop on the Theory and Practice of ProvenanceArticle No.: 3, Pages 1–8https://doi.org/10.1145/3530800.3534530Traditionally, provenance and lineage mainly referred to query results. We take a more holistic approach. We consider a system in which tuples (records) that are produced by a query may affect other tuple insertions into the DB, as part of a normal ...
- research-articleOctober 2020
Towards Inferring Queries from Simple and Partial Provenance Examples
CIKM '20: Proceedings of the 29th ACM International Conference on Information & Knowledge ManagementPages 3273–3276https://doi.org/10.1145/3340531.3417451The field of query-by-example aims at inferring queries from output examples given by non-expert users, by finding the underlying logic that binds the examples. However, for a very small set of examples, it is difficult to correctly infer such logic. To ...
-
- research-articleApril 2020
Interpreting the Tape of Life: Ancestry-Based Analyses Provide Insights and Intuition about Evolutionary Dynamics
Fine-scale evolutionary dynamics can be challenging to tease out when focused on the broad brush strokes of whole populations over long time spans. We propose a suite of diagnostic analysis techniques that operate on lineages and phylogenies in digital ...
- posterMay 2018
POSTER: A Framework for Phylogenetic Analysis in Mobile Environment
ASIACCS '18: Proceedings of the 2018 on Asia Conference on Computer and Communications SecurityPages 825–827https://doi.org/10.1145/3196494.3201588To maximize the probability of successful attacks and reduce the odds of being detected, malware developers implement different versions of the same malicious payloads. As a matter of fact, malware writers often generate new malicious code starting from ...
- abstractNovember 2017
Development of a visual analytics system for cell division dynamics in early C.elegans embryos
SA '17: SIGGRAPH Asia 2017 Symposium on VisualizationArticle No.: 19, Pages 1–8https://doi.org/10.1145/3139295.3139310In order to elucidate the developmental mechanisms of multicellular organisms, it is important to quantify the spatiotemporal features (phenotypic characteristics) of cells appearing during cell division and to analyze their relationships (correlations)...
- research-articleJuly 2016
Visualizing Genetic Programming Ancestries
GECCO '16 Companion: Proceedings of the 2016 on Genetic and Evolutionary Computation Conference CompanionPages 1419–1426https://doi.org/10.1145/2908961.2931741Previous work has demonstrated the utility of graph databases as a tool for collecting, analyzing, and visualizing ancestry in evolutionary computation runs. That work focused on sections of individual runs, whereas this paper illustrates the ...
- ArticleJuly 2015
Recent advances in computer architecture: the opportunities and challenges for provenance
- Nikilesh Balakrishnan,
- Thomas Bytheway,
- Lucian Carata,
- Oliver R. A. Chick,
- James Snee,
- Sherif Akoush,
- Ripduman Sohan,
- Margo Seltzer,
- Andy Hopper
In recent years several hardware and systems fields have made advances in technology that open new opportunities and challenges for provenance systems. In this paper we look at such technologies and discuss the implications they have for provenance. ...
- ArticleNovember 2012
Selecting Materialized Views Based on Top-k Query Algorithm for Lineage Tracing
GCIS '12: Proceedings of the 2012 Third Global Congress on Intelligent SystemsPages 46–49https://doi.org/10.1109/GCIS.2012.28Lineage tracing queries help to locate updated views quickly in data warehouse. Materialized views can improve the efficiency of the data lineage tracing and view maintenance. This paper, a method to select materialized views using Top-k query algorithm ...
- research-articleOctober 2012
A qualitative metasynthesis of activity theory in SIGDOC proceedings 2001-2011
- Jennifer Stewart,
- Nicki Litherland Baker,
- Sarah Chaney,
- Elmar Hashimov,
- Elizabeth Imafuji,
- Brian McNely,
- Laura Romano
SIGDOC '12: Proceedings of the 30th ACM international conference on Design of communicationPages 341–348https://doi.org/10.1145/2379057.2379120Activity theory has become an increasingly important theoretical framework for practitioners and researchers in a wide variety of fields. Offering a set of tools for exploring and theorizing everyday practice, activity theory has proven to be a useful ...
- ArticleSeptember 2012
Implementing a data lineage tracker
DaWaK'12: Proceedings of the 14th international conference on Data Warehousing and Knowledge DiscoveryPages 390–403https://doi.org/10.1007/978-3-642-32584-7_32Everyday business users face the tracking of the origin of information used in calculations and business decisions. Knowing the origin and lineage of data can help in the decision making process, provide a clear audit trail for regulation, and answer ...
- research-articleJune 2011
Sensitivity analysis and explanations for robust query evaluation in probabilistic databases
SIGMOD '11: Proceedings of the 2011 ACM SIGMOD International Conference on Management of dataPages 841–852https://doi.org/10.1145/1989323.1989411Probabilistic database systems have successfully established themselves as a tool for managing uncertain data. However, much of the research in this area has focused on efficient query evaluation and has largely ignored two key issues that commonly ...
- ArticleJune 2011
Policy-Based Integration of Provenance Metadata
POLICY '11: Proceedings of the 2011 IEEE International Symposium on Policies for Distributed Systems and NetworksPages 149–152https://doi.org/10.1109/POLICY.2011.12Reproducibility has been a cornerstone of the scientific method for hundreds of years. The range of sources from which data now originates, the diversity of the individual manipulations performed, and the complexity of the orchestrations of these ...
- research-articleMay 2011
Tracing the provenance of linked data using voiD
- Tope Omitola,
- Landong Zuo,
- Christopher Gutteridge,
- Ian C. Millard,
- Hugh Glaser,
- Nicholas Gibbins,
- Nigel Shadbolt
WIMS '11: Proceedings of the International Conference on Web Intelligence, Mining and SemanticsArticle No.: 17, Pages 1–7https://doi.org/10.1145/1988688.1988709In the open world of the (Semantic) web, a world where increasingly diverse materials from disparate sources of different qualities are being made available, an automatic mechanism for the provision of provenance information of these sources is needed. ...
- research-articleMarch 2011
Identifying the provenance of correlated anomalies
SAC '11: Proceedings of the 2011 ACM Symposium on Applied ComputingPages 224–229https://doi.org/10.1145/1982185.1982236Identifying when anomalous activity is correlated in a distributed system is useful for a range of applications from intrusion detection to tracking quality of service. The more specific the logs, the more precise the analysis they allow. However, ...
- opinionJanuary 2011
Guest Editors' Introduction: Provenance in Web Applications
IEEE Internet Computing (IEEECS_INTERNET), Volume 15, Issue 1Pages 17–21https://doi.org/10.1109/MIC.2011.9Provenance, from the French word provenir, "to come from," means the origin, or the source, of something, or the history of an object's ownership or location. A digital object's provenance (also referred to as its audit trail or lineage) contains ...
- ArticleSeptember 2010
Managing lineage and uncertainty under a data exchange setting
SUM'10: Proceedings of the 4th international conference on Scalable uncertainty managementPages 28–41We present a data exchange framework that is capable of exchanging uncertain data with lineage and give meaningful certain answers on queries posed on the target schema. The data are stored in a database with uncertainty and lineage (ULDB) which ...
- research-articleJune 2010
Efficient querying of distributed provenance stores
HPDC '10: Proceedings of the 19th ACM International Symposium on High Performance Distributed ComputingPages 613–621https://doi.org/10.1145/1851476.1851567Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at remote hosts and submitted to a central provenance management service. In ...