Abstract is missing.
- Provenance Management in Databases Under Schema EvolutionShi Gao, Carlo Zaniolo. [doi]
- Tag-based Information Flow Analysis for Document Classification in ProvenanceJyothsna Rachapalli, Murat Kantarcioglu, Bhavani M. Thuraisingham. [doi]
- It's About the Data: Provenance as a Tool for Assessing Data FitnessAdriane Chapman, M. David Allen, Barbara T. Blaustein. [doi]
- BioLite, a Lightweight Bioinformatics Framework with Automated Tracking of Diagnostics and ProvenanceMark Howison, Nicholas A. Sinnott-Armstrong, Casey W. Dunn. [doi]
- Experiment Explorer: Lightweight Provenance Search over MetadataDelmar B. Davis, Hazeline U. Asuncion, Ghaleb Abdulla. [doi]
- Hierarchical Models of ProvenancePeter Buneman, James Cheney, Egor V. Kostylev. [doi]
- Provenance as a Security ControlAndrew Martin, John Lyle, Cornelius Namiluko. [doi]
- A General-Purpose Provenance LibraryPeter Macko, Margo Seltzer. [doi]
- Datalog as a Lingua Franca for Provenance Querying and ReasoningSaumen C. Dey, Sven Köhler 0003, Shawn Bowers, Bertram Ludäscher. [doi]
- Provenance Support for ReworkXiang Zhao, Barbara Staudt Lerner, Leon J. Osterweil, Emery R. Boose, Aaron M. Ellison. [doi]
- Towards Automated Collection of Application-Level Data ProvenanceDawood Tariq, Maisem Ali, Ashish Gehani. [doi]
- Dependency Path Patterns as the Foundation of Access Control in Provenance-aware SystemsDang Nguyen 0001, Jaehong Park, Ravi Sandhu. [doi]
- Querying Provenance for Ranking and RecommendingZachary G. Ives, Andreas Haeberlen, Tao Feng, Wolfgang Gatterbauer. [doi]
- BURRITO: Wrapping Your Lab Notebook in Computational InfrastructurePhilip J. Guo, Margo Seltzer. [doi]
- Toward Provenance-Based Security for Configuration LanguagesPaul Anderson, James Cheney. [doi]
- Toward Provenance Capturing as Cross-Cutting ConcernMartin Schäler, Sandro Schulze, Gunter Saake. [doi]