Abstract is missing.
- Dataflow Notebooks: Encoding and Tracking Dependencies of CellsDavid Koop, Jay Patel. [doi]
- Provenance in DISC Systems: Reducing Space Overhead at RuntimeRalf Diestelkämper, Melanie Herschel, Priyanka Jadhav. [doi]
- Provenance-based Recommendations for Visual Data ExplorationHoussem Ben Lahmar, Melanie Herschel. [doi]
- Visualizing Provenance using ComicsAndreas Schreiber, Regina Struminski. [doi]
- Integrating Approximate Summarization with Provenance CaptureSeokki Lee, Xing Niu, Bertram Ludäscher, Boris Glavic. [doi]
- Answering Historical What-if Queries with Provenance, Reenactment, and Symbolic ExecutionBahareh Sadat Arab, Boris Glavic. [doi]
- Applying Provenance in APT Monitoring and Analysis: Practical Challenges for Scalable, Efficient and Trustworthy Distributed ProvenanceGraeme Jenkinson, Lucian Carata, Thomas Bytheway, Ripduman Sohan, Robert N. M. Watson, Jonathan Anderson, Brian J. Kidney, Amanda Strnad, Arun Thomas, George Neville-Neil. [doi]
- Expressiveness Benchmarking for System-Level ProvenanceSheung Chi Chan, Ashish Gehani, James Cheney, Ripduman Sohan, Hassaan Irshad. [doi]
- Automated Provenance Analytics: A Regular Grammar Based Approach with Applications in SecurityMark Lemay, Wajih Ul Hassan, Thomas Moyer, Nabil Schear, Warren Smith. [doi]
- ACCESSPROV: Tracking the Provenance of Access Control DecisionsFrank Capobianco, Christian Skalka, Trent Jaeger. [doi]
- Corroboration via Provenance PatternsLina Barakat, Phillip Taylor, Nathan Griffiths, Simon Miles. [doi]